A New Key Exchange Protocol with Anonymity between STB and Smart Card in IPTV Broadcasting

IPTV (Internet Protocol Television) is a very important field in the network development. Comparing to the traditional television, the IPTV combines the digital contents like media. The communication and the advertisement with the interaction serve into the emerging business model to provide the users to watch television service. Because the IPTV contains many merits; therefore, the world holds the high interest to develop of the IPTV. IPTV application scope is quite big, not only include wired and wireless, but also unify the telecommunication entrepreneur to provide the handset service, mobile device service and so on. It will be possible to affect the traditional television in the future, and even to displace it. If the user can use the IPTV effectively, it could be an enormous market. Generally, because the users' identities are easily exposed when Internet Protocol Television authenticate them, the best way to secure information security is to hide the identities of users. This paper will design the internet authentication system which is anonymous and secured. It can apply to solve the smart card duplication and the data resending attack problems. Session key and time-stamp of cryptography are used in the technique to achieve security and anonymous of the authentication process. Simultaneously, how to authenticate more efficiently by encryption in smart card authentication process is also our research objective. Further, this paper will contribute to how to build a security mechanism to prevent from the attacks. Based on those researches, this project plans to propose a new efficient and safe Internet Protocol Television. This new mechanism improves the security, efficiency and usability in the authentication process. More complete studies on Internet Protocol Television will be needed.

[1]  Kyung-Ah Shim Cryptanalysis of mutual authentication and key exchange for low power wireless communications , 2003, IEEE Communications Letters.

[2]  J.L. Melus,et al.  An overview of security in Eurocrypt conditional access system , 1993, Proceedings of GLOBECOM '93. IEEE Global Telecommunications Conference.

[3]  Jean-Jacques Quisquater,et al.  Cryptology for digital TV broadcasting , 1995, Proc. IEEE.

[4]  Dong Hoon Lee,et al.  Efficient and Secure Communication between Set-Top Box and Smart Card in IPTV Broadcasting , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.

[5]  Euihyun Paik,et al.  A Dynamic Conditional Access System for IPTV Multimedia Systems , 2009, 2009 Fourth International Conference on Systems and Networks Communications.

[6]  Wei Liu,et al.  High Performance Adaptive Video Services Based on Bitstream Switching for IPTV Systems , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[7]  Shibao Zheng,et al.  Secure communication between set-top box and smart card in DTV broadcasting , 2004, IEEE Transactions on Consumer Electronics.

[8]  Yong Kim,et al.  An Integrated Scheme for Authentication And Access Control in a Digital TV Environment , 2008, 2008 Digest of Technical Papers - International Conference on Consumer Electronics.

[9]  Euihyun Paik,et al.  Achieving Interoperability in Conditional Access Systems through the Dynamic Download and Execution of Cryptographic Software for the IPTV System , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[10]  Chi-Sung Laih,et al.  On key distribution management for conditional access system on pay-TV system , 1999, IEEE Trans. Consumer Electron..

[11]  Joohan Lee,et al.  Pay-as-you-use on-demand cloud service: An IPTV case , 2010, 2010 International Conference on Electronics and Information Engineering.

[12]  Tianpu Jiang,et al.  Key distribution based on hierarchical access control for conditional access system in DTV broadcast , 2004, IEEE Transactions on Consumer Electronics.

[13]  Shiuh-Pyng Shieh,et al.  Efficient key distribution schemes for secure media delivery in pay-TV systems , 2004, IEEE Transactions on Multimedia.

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[15]  T. Aaron Gulliver,et al.  Performance Analysis of IPTV Traffic in Home Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[16]  John Cosmas,et al.  A Cooperative Cellular and Broadcast Conditional Access System for Pay-TV Systems , 2010, IEEE Transactions on Broadcasting.

[17]  Wei-Bin Lee,et al.  Secure communication between set-top box and smart card for fair use in DTV broadcasting , 2010, 2010 IEEE International Conference on Intelligence and Security Informatics.

[18]  Hyokyung Bahn,et al.  Implementation of the storage manager for an IPTV set-top box , 2008, IEEE Transactions on Consumer Electronics.

[19]  Thumrongrat Amornraksa,et al.  Scrambling and key distribution scheme for digital television , 2001, Proceedings. Ninth IEEE International Conference on Networks, ICON 2001..

[20]  Duncan S. Wong,et al.  Mutual authentication and key exchange for low power wireless communications , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[21]  Jun Shan Wey,et al.  Standardization Activities for IPTV Set-Top Box Remote Management , 2009, IEEE Internet Computing.

[22]  Eun-Jun Yoon,et al.  A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting , 2006, WISI.

[23]  N. Prasertsatid,et al.  Implementation conditional access system for pay TV based on Java card , 2004, 2004 IEEE Region 10 Conference TENCON 2004..

[24]  Jaime Lloret,et al.  A QoE Management System for Ubiquitous IPTV Devices , 2009, 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.

[25]  Ting-Wei Hou,et al.  Based on cryptosystem secure communication between set-top box and smart card in DTV broadcasting , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.

[26]  F. Kamperman,et al.  Conditional Access System Interoperability Through Software Downloading , 1998, International 1998 Conference on Consumer Electronics.

[27]  Dong Hoon Lee,et al.  A Fingerprint-Based User Authentication Scheme Using Smart Cards in IPTV Environments , 2010, 2010 International Conference on Information Science and Applications.