Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Secure communication in IPTV broadcasting

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Song-Hee-
dc.contributor.authorPark, Nam-Sup-
dc.contributor.authorChoi, Jin-Young-
dc.date.accessioned2021-09-06T14:50:09Z-
dc.date.available2021-09-06T14:50:09Z-
dc.date.created2021-06-15-
dc.date.issued2012-10-
dc.identifier.issn0920-8542-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/107278-
dc.description.abstractIn internet protocol television (IPTV) broadcasting, service providers charge subscribing fee by scrambling the program with conditional access system (CAS) using control words (CWs). A smart card is used to decrypt the CWs and transfer them back to set-top box (STB) to descramble the scrambled program. Secure communication between STB and the smart card is closely related with the benefit of service providers and the legal rights of users. In addition, secure key exchange with mutual authentication in the communication between STB and the smart card is an essential part of secure communication that will significantly improve the security of the system. To provide secure communication with mutual authentication in IPTV broadcasting, there are several schemes. The schemes proposed a secure and efficient method for the communication between STB and the smart card. Unfortunately, the schemes still have some security flaws. In this paper, we review that the previous schemes are vulnerable to several attacks. Further, we recommend some modifications to the schemes to correct these security flaws and present a formal analysis about our improved protocol using a logic based formal method.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.subjectCONDITIONAL ACCESS SYSTEM-
dc.subjectKEY EXCHANGE PROTOCOL-
dc.subjectSMART CARD-
dc.subjectSTB-
dc.titleSecure communication in IPTV broadcasting-
dc.typeArticle-
dc.contributor.affiliatedAuthorChoi, Jin-Young-
dc.identifier.doi10.1007/s11227-011-0582-8-
dc.identifier.scopusid2-s2.0-84865619640-
dc.identifier.wosid000308110300004-
dc.identifier.bibliographicCitationJOURNAL OF SUPERCOMPUTING, v.62, no.1, pp.42 - 52-
dc.relation.isPartOfJOURNAL OF SUPERCOMPUTING-
dc.citation.titleJOURNAL OF SUPERCOMPUTING-
dc.citation.volume62-
dc.citation.number1-
dc.citation.startPage42-
dc.citation.endPage52-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordPlusCONDITIONAL ACCESS SYSTEM-
dc.subject.keywordPlusKEY EXCHANGE PROTOCOL-
dc.subject.keywordPlusSMART CARD-
dc.subject.keywordPlusSTB-
dc.subject.keywordAuthorSecure communication-
dc.subject.keywordAuthorIPTV-
dc.subject.keywordAuthorFormal analysis-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher CHOI, Jin Young photo

CHOI, Jin Young
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE