Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system

Internet of Things (IoT) is increasingly used through smart devices with internet-based networks. Communication and data sharing between these devices have also grown in several ways. It is presenting a new dimension to the whole digital right management (DRM) industry. The main focus of IoT based DRM technology is to facilitate the authorised user for using multimedia content through smart devices. However, threats of information breach between communication channels also rapidly increasing, which is making content distribution a challenging task. Moreover, the computation and communication efficiency along with user privacy also requires an ideal DRM system. To address concerns of security, efficiency and privacy over internet-based networks, we design a content key distribution framework for DRM systems. The security proof of the proposed framework is given in the random oracle model along with informal security analysis. Moreover, the security analysis performed using widely adopted simulation tool, namely, “Automated Validation of Internet Security Protocol and Application (AVISPA)”. The study of performance is conducted, which indicates that it fulfils the requirements of computation and computation efficiency.

[1]  Andrew S. Tanenbaum,et al.  A DRM security architecture for home networks , 2004, DRM '04.

[2]  Maurizio Tomasella,et al.  Vision and Challenges for Realising the Internet of Things , 2010 .

[3]  B. B. Gupta,et al.  Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags , 2017, The Journal of Supercomputing.

[4]  Mauro Conti,et al.  Provably Secure Authenticated Key Agreement Scheme for Smart Grid , 2018, IEEE Transactions on Smart Grid.

[5]  Yu-Yi Chen,et al.  A Fair-Use DRM System Based on Web Service , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[6]  Chin-Ling Chen,et al.  A secure and traceable E-DRM system based on mobile device , 2008, Expert Syst. Appl..

[7]  Vanga Odelu,et al.  An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card , 2015, J. Inf. Secur. Appl..

[8]  Sebastian Mödersheim,et al.  The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.

[9]  Mihir Bellare,et al.  Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.

[10]  Cheng-Chi Lee,et al.  A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System , 2015, Journal of Medical Systems.

[11]  Chin-Chen Chang,et al.  An efficient and reliable E-DRM scheme for mobile environments , 2010, Expert Syst. Appl..

[12]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[13]  Wei-Bin Lee,et al.  A Portable DRM Scheme Using Smart Cards , 2007, J. Organ. Comput. Electron. Commer..

[14]  Lei Yang,et al.  A DRM Authentication Scheme Based on Smart-Card , 2009, 2009 International Conference on Computational Intelligence and Security.

[15]  Cheng-Chi Lee,et al.  A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System , 2018, Inf. Technol. Control..

[16]  Chin-Chen Chang,et al.  A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment , 2013, Secur. Commun. Networks.

[17]  In Lee,et al.  The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .

[18]  Artemis Moroni,et al.  Vision and Challenges for Realising the Internet of Things , 2010 .

[19]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[20]  Willem Jonker,et al.  Privacy in an identity-based DRM system , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[21]  Sourav Mukhopadhyay,et al.  An anonymous and secure biometric-based enterprise digital rights management system for mobile environment , 2015, Secur. Commun. Networks.

[22]  Wei-Bin Lee,et al.  A novel DRM scheme for accommodating expectations of personal use , 2018, Multimedia Tools and Applications.

[23]  Qingqi Pei,et al.  A Novel Digital Content Protection System Based on Iris Biometric , 2007, Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007).

[24]  Guangyi Xiao,et al.  User Interoperability With Heterogeneous IoT Devices Through Transformation , 2014, IEEE Transactions on Industrial Informatics.

[25]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[26]  Hyoungshick Kim Scalable DRM System for Media Portability , 2007, ASIAN.

[27]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[28]  Chunxiao Wang,et al.  Full secure identity-based encryption scheme over lattices for wireless sensor networks in the standard model , 2018, Int. J. High Perform. Comput. Netw..

[29]  B. B. Gupta,et al.  A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices , 2017, Int. J. Adv. Intell. Paradigms.

[30]  Dongwoo Kang,et al.  An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System , 2017, PloS one.

[31]  N. Asokan,et al.  Defining authorization domains using virtual devices , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[32]  Cheng-Chi Lee,et al.  An improved E-DRM scheme for mobile environments , 2018, J. Inf. Secur. Appl..