In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1 bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Yoon-Su JEONG, Yong-Tae KIM, Jae-Min SOHN, Gil-Cheol PARK, Sang-Ho LEE, "A Key Establishment Protocol for RFID User in IPTV Environment" in IEICE TRANSACTIONS on Communications,
vol. E93-B, no. 9, pp. 2407-2415, September 2010, doi: 10.1587/transcom.E93.B.2407.
Abstract: In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1 bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.E93.B.2407/_p
Copy
@ARTICLE{e93-b_9_2407,
author={Yoon-Su JEONG, Yong-Tae KIM, Jae-Min SOHN, Gil-Cheol PARK, Sang-Ho LEE, },
journal={IEICE TRANSACTIONS on Communications},
title={A Key Establishment Protocol for RFID User in IPTV Environment},
year={2010},
volume={E93-B},
number={9},
pages={2407-2415},
abstract={In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1 bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.},
keywords={},
doi={10.1587/transcom.E93.B.2407},
ISSN={1745-1345},
month={September},}
Copy
TY - JOUR
TI - A Key Establishment Protocol for RFID User in IPTV Environment
T2 - IEICE TRANSACTIONS on Communications
SP - 2407
EP - 2415
AU - Yoon-Su JEONG
AU - Yong-Tae KIM
AU - Jae-Min SOHN
AU - Gil-Cheol PARK
AU - Sang-Ho LEE
PY - 2010
DO - 10.1587/transcom.E93.B.2407
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E93-B
IS - 9
JA - IEICE TRANSACTIONS on Communications
Y1 - September 2010
AB - In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1 bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.
ER -