The Simplified and Secure Conditional Access for Interactive TV Service in Converged Network

For interactive TV (ITV) services in converged network, the DVB-based DTV and the IP-based IPTV coexist in a single dual mode set-top box (STB) and the traditional one-way DVB-CA cannot be adapted to the variation. In this paper, a simplified and secure conditional access scheme based on the simplified double layer is proposed to realize authentication and access control between servers and STBs. In this scheme, the advanced encryption standard (AES) and the common scramble algorithm (CSA) are combined to secure the ITV service and its entitled control message. The video fingerprint and legitimate watermark is used for the piracy tracking and the conditional playing. The elliptic curve based authentication algorithm is used for secure authentication. Under the tripartite participation, the service key access protocol is designed to dynamically update the service keys. The algorithm in the front-end, the algorithm in the STB client and the service key access protocol are proposed in detail. Through the test in an actual application environment and the analysis of security, the proposed conditional access system is very secure with high performance for high definition ITV service and large scale customers.

[1]  J. Sesena Commonalities and peculiarities of DVB-S, DVB-C and DVB-SMATV systems (COMM's and PEC's of DVB systems) , 1995 .

[2]  Euihyun Paik,et al.  Achieving Interoperability in Conditional Access Systems through the Dynamic Download and Execution of Cryptographic Software for the IPTV System , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[3]  H. Shirazi,et al.  Mobile Integrated Conditional Access System (MICAS) , 2008, 2008 IEEE International Symposium on Consumer Electronics.

[4]  Ralf-Philipp Weinmann,et al.  Analysis of the DVB Common Scrambling Algorithm , 2004, Communications and Multimedia Security.

[5]  Zhao Li,et al.  Content Protection for IPTV-current state of the art and challenges , 2006, The Proceedings of the Multiconference on "Computational Engineering in Systems Applications".

[6]  Wang Hui,et al.  A Survey of digital TV standards China , 2007, 2007 Second International Conference on Communications and Networking in China.

[7]  D. J. Cutts DVB conditional access , 1996 .

[8]  E. Kelly,et al.  Internet TV: guiding the future of broadcasting? , 1997 .

[9]  Jianhua Zhang,et al.  Cell search algorithms for the 3G long-term evolution , 2007 .

[10]  Hugo Krawczyk,et al.  HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.

[11]  Kang Hui,et al.  Study on Implementation of a Fingerprint Watermark , 2008, 2008 International Conference on Computer Science and Software Engineering.

[12]  Duncan S. Wong,et al.  Mutual authentication and key exchange for low power wireless communications , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[13]  Cheng Yang,et al.  Digital rights management independent of terminals in mobile applications , 2007 .

[14]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[15]  Joonki Paik,et al.  Fingerprint Watermarking for H.264 Streaming Media , 2007, 2007 Frontiers in the Convergence of Bioscience and Information Technologies.

[16]  Tianpu Jiang,et al.  Key distribution based on hierarchical access control for conditional access system in DTV broadcast , 2004, IEEE Transactions on Consumer Electronics.