• Title/Summary/Keyword: IPTV보안

Search Result 73, Processing Time 0.025 seconds

Smartcard Authentication for IPTV Contents Protection (IPTV의 콘텐츠 보호를 위한 스마트카드 인증시스템)

  • Hwang, Jin-Wook;Kim, Sun-Jae;Oh, Hae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.699-700
    • /
    • 2009
  • IPTV(Internet protocol TV)가 상용화되고 가입자 수가 증가하면서 제공하는 콘텐츠의 양이 많아지고 많은 정보를 얻게 되었다. 이러한 많은 콘텐츠의 저작권을 보호하기 위해 수신제한시스템(Conditinal Access System, CAS)과 DRM(Digital Right Management) 기술이 사용되고 있다. 하지만 나날이 발전하는 개인정보의 유출과 해킹을 통한 불법 다운로드, 복제에서 저작권이 위협을 받고 있다. 따라서 현재 서비스 제공자들은 콘텐츠의 저작권을 보호하기 위한 많은 연구들이 진행되고 있다. 본 논문에서는 IPTV에서의 스마트카드를 이용한 인증체계 시스템을 제시하여 기존의 보안시스템보다 더 강화된 보안을 구축 할 수 있다.

A Convergence Technology of IPTV-RFID against Clone Attack (Clone 공격에 강한 IPTV-RFID 융합 기술)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.145-156
    • /
    • 2010
  • Now a days, the development of TV and internet like communicational technique makes IPTV service which combines internet with multimedia contents increase. But when a user gets service in specific place, the certification process and user's ID check in IPTV service is complicate so that there occurs communicational difficulty like increasing illegal users and service delay etc. This paper proposes communication security mechanism to prevent Clone attack which happens in wireless section by efficiently extracting illegal user. The proposed mechanism performs key distribution procedure, inter certification procedure, and key initiation procedure by putting security agent in RFID-USB for RFID tags users use to perform plug-and-plug function. Also, the proposed mechanism updates the hased token value by its ID and the random number which RFID-USB creates whenever a user accesses in the area of RFID-USB so that it protects reply attack and man-in-the-middle attack which happen often in the area of wireless section.

PKI/PMI based Access Control System on IPTV (IPTV에서 PKI/PMI기반의 권한 제어시스템)

  • Shuai, Wang;Jo, In-June
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.781-784
    • /
    • 2009
  • IPTV, which is convergence of Communication and Broadcasting, has improved quickly recently. This service can provide high quality and various services to their customers, such as choosing channels freely, VOD and many kinds of Interactive service. As the technology of IPTV rapid development, more and more people worry about its disadvantages during the spread and apply, for instance, the illegal application, illegal copy, access authority abuse and the danger of the IPTV contents. This paper will provide the solution to solve these problems, through the Public Key Certificate of PKI(Public Key Infrastructure) and the Attribute Certificate of PMI(Privilege Management Infrastructure).

  • PDF

Program-Value Aware Adaptive Group-Key Rekeying for IPTV (IPTV 를 위한 프로그램 가치를 고려하는 적응적인 그룹 키 갱신 방법)

  • Sangho Lee;Yuna Kim;Jong Kim;Zino Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1437-1440
    • /
    • 2008
  • 인터넷 프로토콜 텔레비전(IPTV) 시스템에서 특정 프로그램을 허가된 가입자에게만 전달하기 위해 그룹 키 관리 방법을 이용 할 수 있다. 그러나 기존의 그룹 키 관리 방법은 가입자의 수가 많아지거나 가입자가 서비스에 자주 가입하고 탈퇴할 수록 서버의 부하가 커진다는 문제점이 있다. 이를 해결하기 위한 많은 연구들이 진행되어 왔지만 해당 연구들은 IPTV 시스템의 특성을 고려치 못했다는 단점이 있다. 우리는 IPTV 시스템의 특성을 고려한 새로운 그룹 키 갱신 방법을 제안한다. 제안 방법은 현재 IPTV 채널 상에서 전송되는 프로그램의 가치를 고려해서 그룹 키 갱신 주기를 조절하는 방법이다. 이를 통해서 서버의 부하를 줄일 수 있을 뿐만 아니라 프로그램의 가치에 따라서 차등적인 보안 수준을 제공할 수 있다.

ECC-based IPTV Service Key Establishment Protocol With User Attribute (사용자 속성을 이용한 ECC 기반의 IPTV 서비스 키 설립 프로토콜)

  • Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.105-111
    • /
    • 2012
  • Internet Protocol Television (IPTV) through broadband cable network is a subscriber-based system which consists of software and set-top box. However, a weakness for the current IPTV system is the lack of security between users and CAS. This paper proposes a user authentication protocol at STB, which limits the service by the user-valued attribute to prevent illegal IPTV users. User attribute values change the order with bit form according to the certain rule, and apply to one-way hash function and Diffie-Hellman's elliptic curve key-exchange algorithm. The proposed protocol is able to improve on user authentication and computation. Also, each user generates an authentication message by smart card and receives various services based on the user-valued attribute.

A Study on Verification of Security Threat and Method of Response for Multimedia Broadcasting and Communication Convergence Services (멀티미디어 방송통신 융합서비스에 대한 보안위협 검증 및 대응방안 연구)

  • Jung, Chan-Suk;Shin, Yong-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.6
    • /
    • pp.3032-3042
    • /
    • 2013
  • Multimedia Broadcast communication convergence services are broadcast communication convergence services new form that combines a platform technology for driving the application services of various media-related Internet and TV devices. It is possible to mounted the embedded OS of TV existing technology and to support a variety of smart application services to a TV technology evolved form equipped with various platforms on the OS. The services that are fused in this way, multi-media broadcasting communication convergence new services Open IPTV, Smart TV, mobile IPTV, and N-screen, are services actively focusing on three companies domestic services. However, in order to use the software to connect to the Internet for the provision of services, is inherent software vulnerabilities or the Internet. These vulnerabilities can lead to serious security incidents. Therefore, in this paper, or be able to derive the potential security threats that occur in multimedia broadcasting service environment based on security threats and vulnerabilities of existing threats lead to such security incidents in fact, the security it was carried out through a mock hacking validation for threats. It was also suggested necessary technical security measures that can be protect against security threats revealed by using the verification result through the penetration testing. Has been presented countermeasures in fusion communication service environment of multimedia broadcasting by using these results.

A Comparative Study on broadcasting video quality using PSNR in IPTV Network Adopted Transition Mechanism (트랜지션 메카니즘이 적용된 IPTV Network에서 PSNR을 이용한 방송화질 측정 연구)

  • Kim, Kwang-Hyun;Park, Seung-Seob
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.156-166
    • /
    • 2010
  • Development of IP network technology creates new service which applying to fusion technologies such as IPTV, VoIP, and so on. Especially, Next generation IP is called IPv6 which will solve the lack of IP. IPv6 is very important on IPTV which needs best quality of service about security, QoS, and bandwidth. In this paper, we constructed experimental network, measured PSNR which computes the peak signal-to-reconstructed video measurement in experimental network environment, analyzed PSNR value. And as a result of measurement, we, Propose optimum network environment for IPTV service provider and transition mechanism designer.

The Standardization Issue for ITU-T FG IPTV Security Aspects (ITU-T FG IPTV Security Aspects 표준화 기술 동향)

  • Park, J.Y.;Moon, J.Y.;Kim, J.T.;Paik, E.H.
    • Electronics and Telecommunications Trends
    • /
    • v.22 no.5
    • /
    • pp.130-143
    • /
    • 2007
  • IPTV 서비스는 IP 환경에서 다양한 콘텐트를 전송하는 기술로 기존의 방송 시스템과 통신 시스템의 장점을 그대로 수용하는 기술이다. 이에 ITU-T SG13에서는 FG IPTV를 통해 요구사항 및 구조 중심의 표준화를 진행하고 있다. ITU-T FG IPTV는 6개의 WG로 구성되어 진행중에 있으며, WG3는 security aspects의 주제를 가지고 보안 기술에 대한 표준화를 진행하고 있다. 본 문서는 2007년 5월과 7월의 4차, 5차 표준화 회의를 중심으로 WG3의 표준화 동향 및 기술적 분석을 정리한다.

Measuring Quality of Experience of Internet Protocol Television (IPTV 체감 품질의 측정)

  • Byun, Dae-Ho;Jeon, Hong-Dae
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.3
    • /
    • pp.63-83
    • /
    • 2010
  • IPTV(Internet Protocol Television) is an innovation technology to lead the new media age. Internet protocol television (IPTV) is a next generation television converged with the Internet which are delivered portal services such as information search, games, movies, home shopping and banking. Generally, service quality affects to adopt or use these technologies. Quality of experience (QoE) is more issue to be considered than service quality because of the technological restriction and limitation that IPTV is accessed by the Internet. The QoE is defined as the cognitive and experienced quality measured with users through an experiment and is conceptually related to service quality. The objective of this paper is to suggest a methodology to measure the QoE of IPTV using a user testing. We find significant factors affecting QoE of IPTV through an exploratory study and measure QoE scores. We found the nine factors of graphics, picture, accuracy, access method, quality of contents, usability, security, and performance important for QoE. The QoE scores of picture, graphics, and quality of contents gained over the average score, but the overall score for IPTV service providers was not high and the QoE needs to be improved.

Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme (해쉬 트리 기반의 효율적인 IPTV 소스 인증 프로토콜)

  • Shin, Ki-Eun;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.21-26
    • /
    • 2009
  • Presently, the demand for IPTV, to satisfy a variety of goals, is exploding. IPTV is coming into the spotlight as a killer application in upcoming IP convergence networks such as triple play which is the delivery of voice, internet, and video service to a subscriber. IPTV utilizes CAS, which controls the subscriber access to content for a profit. Although the current CAS scheme provides access control via subscriber authentication, there is no authentication scheme for the content transmitted from service providers. Thus, there is a vulnerability of security, through which an adversary can forge content between the service provider and subscribers and distribute malicious content to subscribers. In this paper, based on a hash tree scheme, we proposed efficient and strong source authentication protocols which remove the vulnerability of the current IPTV system. We also evaluate our protocol from a view of IPTV requirements.