Skip to main content
Log in

Secure communication in IPTV broadcasting

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

In internet protocol television (IPTV) broadcasting, service providers charge subscribing fee by scrambling the program with conditional access system (CAS) using control words (CWs). A smart card is used to decrypt the CWs and transfer them back to set-top box (STB) to descramble the scrambled program. Secure communication between STB and the smart card is closely related with the benefit of service providers and the legal rights of users. In addition, secure key exchange with mutual authentication in the communication between STB and the smart card is an essential part of secure communication that will significantly improve the security of the system. To provide secure communication with mutual authentication in IPTV broadcasting, there are several schemes. The schemes proposed a secure and efficient method for the communication between STB and the smart card. Unfortunately, the schemes still have some security flaws. In this paper, we review that the previous schemes are vulnerable to several attacks. Further, we recommend some modifications to the schemes to correct these security flaws and present a formal analysis about our improved protocol using a logic based formal method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Jiang T, Hou Y, Zheng S (2004) Secure communication between set-top box and smart card in DTV broadcasting. IEEE Trans Consum Electron 50:882–886

    Article  Google Scholar 

  2. Jiang T, Hou Y, Zheng S (2004) Key distribution based on hierarchical access control for conditional access system in DTV broadcast. IEEE Trans Consum Electron 50:225–230

    Article  Google Scholar 

  3. Hou TW, Lai JT, Yeh CL (2007) Based on cryptosystem secure communication between set-top box and smart card in DTV broadcasting. In: TENCON 2007, IEEE Region 10 conference, pp 1–5

    Google Scholar 

  4. Tu R (1999) On key distribution management for conditional access system on Pay-TV system. IEEE Trans Consum Electron 45:151–158

    Article  Google Scholar 

  5. Huang YL, Shieh S, Ho FS, Wang JC (2004) Efficient key distribution schemes for secure media delivery in Pay-TV systems IEEE Trans Mutimed 6(5):760–769

    Article  Google Scholar 

  6. Kanjanarin W, Amornraksa T (2001) Scrambling and key distribution scheme for digital television. In: IEEE international conference on networks, pp 140–145

    Google Scholar 

  7. Yoon EJ, Yoo KY (2006) A new secure key exchange protocol between STB and smart card in DTV broadcasting. In: WISI 2006. LNCS, vol. 3971, pp 165–166

    Google Scholar 

  8. Kim H (2008) Secure communication in digital TV broadcasting. Int J Comput Sci Netw Secur 8(9)

  9. Lee SH, S Park N, K Kim S, Y Choi J (2009) Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting. In: ISA 2009. LNCS, vol. 5576, pp 797–803

    Google Scholar 

  10. Kamperman F, Rijnsoever BV (2001) Conditional access system interoperability through software downloading. IEEE Trans Consum Electron 47(1):47–53

    Article  Google Scholar 

  11. Gong L, Needham R, Yahalom R (1990) Reasoning about belief in cryptographic protocols. In: Proc IEEE symposium on research in security and provacy, pp 234–248

    Google Scholar 

  12. Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst, 18–36

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jin-Young Choi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lee, SH., Park, NS. & Choi, JY. Secure communication in IPTV broadcasting. J Supercomput 62, 42–52 (2012). https://doi.org/10.1007/s11227-011-0582-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-011-0582-8

Keywords

Navigation