Skip to main content
Log in

A security model for IPTV with one-time password and Conditional Access System for smart mobile platform

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

IPTV should use an Internet protocol as well as satisfy the security requirements. However, no IPTV exhibits both of these characteristics in the present era. Usually IPTV uses Conditional Access System (CAS) and Digital Rights Management (DRM) as a means to protect the contents. However, these two approaches use different broadcasting systems and are limited for on-demand purposes. Such approaches illustrate the limited use of IPTV to date. In this paper, a more effective method to improve the security system will be proposed for smart mobile platforms. In this method, both the content server and IPTV use an OPT in order to apply a security code to the contents. In addition, the model performs CAS to manage user rights and keys. Such a method for smart mobile platforms will decrease the load between the server and the client network and secure the transfer of user certification, content security, and stream data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Advanced Television System Committee (ATSC) (2004). Conditional Access System for Terrestrial Broadcast, A/70A, May 2004.

  2. Advanced Television System Committee (ATSC) (2009). Digital Television System, A/53, Aug. 2009.

  3. ATIS (2007). ATIS Releases Default Scrambling Algorithm for IPTV. ATIS-0800006, Mar. 2007.

  4. Bajaj, S. (2010). OCRA: OATH challenge Response Algorithm. IETF Internet Draft Informational, Sep. 2010.

  5. Becker, E., Buhse, W., Günnewig, D., & Rump, N. (2003). Digital Right Management, Technological, Economic, Legal and Political Aspects. Digital Right Management.org, 2003.

  6. Digital Video Broadcasting (DVB) (1997). Support For Use of Scrambling and Conditional Access Within Digital Broadcasting Systems. DVB Document A007, Feb. 1997.

  7. Digital Video Broadcasting (DVB) (2005). Content Protection & Copy Management. DVB Document A094, Nov. 2005.

  8. Digital Video Broadcasting (DVB) (2009). Frame structure channel coding and modulation for a second generation digital terrestrial television broadcasting system (DVB-T2). ETSI EN 302 755, Sep. 2009.

  9. Guo, Y., Lin, C., Yin, H., & Zhao, Z. (2007). Design and analysis of IPTV digital copyright management security protocol. In Proceedings of the international symposium on intelligent signal processing and communication systems 2007 (pp. 554–557), Nov. 2007.

    Google Scholar 

  10. Haller, N. (1994). The s/key one-time password system. In Proceedings of the 1994 symposium on network and distributed systems security (pp. 151–157), Feb. 1994.

    Google Scholar 

  11. Haller, N., Metz, C., Nesser, P., & Straw, M. (1998). A One-Time Password System. RFC 2289, Feb. 1998.

  12. Hwang, S. (2009). Content and service protection for IPTV. IEEE Transactions on Broadcasting, 55(2). doi:10.1109/TBC.2009.2020446.

  13. Kamperman, F., & van Rijnsoever, B. (2001). Conditional access system interoperability through software downloading. IEEE Transactions on Consumer Electronics, 47(1), 47–54.

    Article  Google Scholar 

  14. Kerpez, K., Waring, D., Lapiotis, G., Lyles, B., & Vaidyanathan, R. (2006). IPTV service assurance. IEEE Communications Magazine, 44(9), 166–172.

    Article  Google Scholar 

  15. Kim, D., & Choi, H. (2009). Design on protection and authentication system of IPTV contents using OTP. The Journal of the Korea Contents Association, 9(8), 129–137.

    Article  Google Scholar 

  16. Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.

    Article  Google Scholar 

  17. M’Raihi, D., Machani, S., Pei, M., & Rydell, J. (2010). TOTP: time-based one-time password algorithm. Internet Draft Informational, Sep. 2010.

  18. Pagani, M. (2003). Multimedia and interactive digital TV: managing the opportunities created by digital convergence. Hershey: IRM Press.

    Google Scholar 

  19. Ramirez, D. (2008). IPTV security: protecting high-value digital contents. New York: Wiley.

    Google Scholar 

  20. Telecommunication and technology Association (2010). IPTV Interchangable CAS. 2010.3.26, Doc. No: TTAK.KO-08.0023.

  21. Tsuji, T., & Shimizu, A. (2003). An impersonation attack on one-time password authentication protocol OSPA. IEICE Transactions on Communications, E86-B(7), 2182–2185.

    Google Scholar 

  22. Zhu, M., Zhang, M., Chen, X., Zhang, D., & Huang, Z. (2007). A hierarchical key distribution scheme for conditional access system in DTV broadcasting. In Lecture notes in computer science (Vol. 4456, pp. 839–846). Berlin: Springer.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manhyun Chung.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chung, M., Lee, Y., Shon, T. et al. A security model for IPTV with one-time password and Conditional Access System for smart mobile platform. Telecommun Syst 52, 1399–1407 (2013). https://doi.org/10.1007/s11235-011-9652-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-011-9652-8

Keywords

Navigation