Abstract
In internet protocol television (IPTV) broadcasting, service providers charge subscribing fee by scrambling the program with conditional access system (CAS) using control words (CWs). A smart card is used to decrypt the CWs and transfer them back to set-top box (STB) to descramble the scrambled program. Secure communication between STB and the smart card is closely related with the benefit of service providers and the legal rights of users. In addition, secure key exchange with mutual authentication in the communication between STB and the smart card is an essential part of secure communication that will significantly improve the security of the system. To provide secure communication with mutual authentication in IPTV broadcasting, there are several schemes. The schemes proposed a secure and efficient method for the communication between STB and the smart card. Unfortunately, the schemes still have some security flaws. In this paper, we review that the previous schemes are vulnerable to several attacks. Further, we recommend some modifications to the schemes to correct these security flaws and present a formal analysis about our improved protocol using a logic based formal method.
Similar content being viewed by others
References
Jiang T, Hou Y, Zheng S (2004) Secure communication between set-top box and smart card in DTV broadcasting. IEEE Trans Consum Electron 50:882–886
Jiang T, Hou Y, Zheng S (2004) Key distribution based on hierarchical access control for conditional access system in DTV broadcast. IEEE Trans Consum Electron 50:225–230
Hou TW, Lai JT, Yeh CL (2007) Based on cryptosystem secure communication between set-top box and smart card in DTV broadcasting. In: TENCON 2007, IEEE Region 10 conference, pp 1–5
Tu R (1999) On key distribution management for conditional access system on Pay-TV system. IEEE Trans Consum Electron 45:151–158
Huang YL, Shieh S, Ho FS, Wang JC (2004) Efficient key distribution schemes for secure media delivery in Pay-TV systems IEEE Trans Mutimed 6(5):760–769
Kanjanarin W, Amornraksa T (2001) Scrambling and key distribution scheme for digital television. In: IEEE international conference on networks, pp 140–145
Yoon EJ, Yoo KY (2006) A new secure key exchange protocol between STB and smart card in DTV broadcasting. In: WISI 2006. LNCS, vol. 3971, pp 165–166
Kim H (2008) Secure communication in digital TV broadcasting. Int J Comput Sci Netw Secur 8(9)
Lee SH, S Park N, K Kim S, Y Choi J (2009) Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting. In: ISA 2009. LNCS, vol. 5576, pp 797–803
Kamperman F, Rijnsoever BV (2001) Conditional access system interoperability through software downloading. IEEE Trans Consum Electron 47(1):47–53
Gong L, Needham R, Yahalom R (1990) Reasoning about belief in cryptographic protocols. In: Proc IEEE symposium on research in security and provacy, pp 234–248
Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst, 18–36
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, SH., Park, NS. & Choi, JY. Secure communication in IPTV broadcasting. J Supercomput 62, 42–52 (2012). https://doi.org/10.1007/s11227-011-0582-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-011-0582-8