Abstract
Current mobile pay-TV systems have two types of Conditional Access Systems (CAS): group-key-based and public-key systems. The best feature of group-key-based systems is the ability to enjoy the broadcast nature in delivery multimedia contents, while the major advantage of public-key systems is consolidating the security foundation to withstand various attacks, such as collusion attacks. However, the problems of group-key-based systems include collusion attacks, lack of nonrepudiation, and troublesome key distribution. Even worse, the benefit of broadcast efficiency is confined to a group size of no more than 512 subscribers. For public-key systems, the poor delivery scalability is the major shortcoming because the unique private key feature is only suitable for one-to-one delivery. In this article, we introduce a scalable access control scheme to integrate the merits of broadcasting regardless of group size and sound security assurance, including fine-grained access control and collusion attack resistance. For subscriber revocation, a single message is broadcast to the other subscribers to get the updated key, thus significantly boosting subscriber revocation scalability. Due to mobile subscribers' dynamic movements, this article also analyzes the benefit of retransmission cases in our system. Through the performance evaluation and functionality comparison, the proposed scheme should be a decent candidate to enhance the security strength and transmission efficiency in a mobile pay-TV system.
Supplemental Material
Available for Download
Supplemental movie, appendix, image and software files for, A conditional access system with efficient key distribution and revocation for mobile pay-TV systems
- Conditional-Access Broadcasting System. 1992. ITU-R rec. 810, itu recommendation. http://www.itu.int/dms_pubrec/itu-r/rec/bt/R-REC-BT.810-0-199203-W!!PDF-E.pdf.Google Scholar
- Digital Video Broadcasting (Dvb-H). 2004. Transmission system for handheld terminals. ETSI en 302 304, dvb technical specification. http://www.dvb-h.org/technology.htm.Google Scholar
- Digital Video Broadcasting (Dvb-Sh). 2007. System specifications for satellite services to handheld devices below 3 ghz. ETSI ts 102 585, dvb technical specification. http://www.dvb-h.org/technology.htm.Google Scholar
- Digital Video Broadcasting (Dvb-Spp). 2007. Ip datacast over dvb-h: Service purchase and protection. ETSI ts 102 474, dvb technical specification. http://www.dvb-h.org/technology.htm.Google Scholar
- Dvb-H. http://en.wikipedia.org/wiki/DVB-H.Google Scholar
- Fiat, A. and Naor, M. 1994. Broadcast encryption. In Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology. Google Scholar
Digital Library
- Goyal, V., Pandey, O., Sahai, A., and Waters, B. 2006. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06). 89-98. Google Scholar
Digital Library
- Huang, Y.-L., Shish, S., Ho, F.-S., and Wang, J.-C. 2004. Efficient key distribution schemes for secure media delivery in pay-tv systems. IEEE Trans. Multimedia 6, 5, 760--769. Google Scholar
Digital Library
- Daemen, J. and Rijmen, V. 2002. The Design of Rijndael: AES - The Advanced Encryption Standard. Springer. Google Scholar
Digital Library
- Kornfeld, M. and May, G. 2007. Dvb-h and ip datacast--broadcast to handheld devices. IEEE Trans. Broadcast. 53, 1, 161--170.Google Scholar
Cross Ref
- Ns 2, T. N. S. Network Simulator. ACM Trans. Appl. Percept. 2, 3.Google Scholar
- Qi, Q., Cao, Y., Li, T., Zhu, X., and Wang, J. 2010. Soft handover mechanism based on rtp parallel transmission for mobile iptv services. IEEE Trans. Consum. Electron. 56, 4, 2276--2281. Google Scholar
Digital Library
- Roh, H. and Jung, S. 2011. An authentication scheme for consumer electronic devices accessing mobile iptv service from home networks. In Proceedings of the IEEE International Conference on Consumer Electronics (ICCE'11). 717--718.Google Scholar
- Sahai, A. and Waters, B. 2005. Fuzzy identity-based encryption. In Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Lecture Notes in Computer Science, vol. 3494, Springer, 457--473. Google Scholar
Digital Library
- Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., and Dean, D. 2002. Self-healing key distribution with revocation. In Proceeding of the IEEE Symposium on Security and Privacy. Google Scholar
Digital Library
- Sun, H.-M., Chen, C.-M., and Shieh, C.-Z. 2008. Flexible-pay-per-channel: A new model for content access control in pay-tv broadcasting systems. IEEE Trans. Multimedia 10, 6, 1109--1120. Google Scholar
Digital Library
- Sun, H.-M. and Leu, M.-C. 2009. An efficient authentication scheme for access control in mobile pay-tv systems. IEEE Trans. Multimedia 11, 5, 947--959. Google Scholar
Digital Library
- Waldvogel, M., Caronni, G., Sun, D., Weiler, N., and Plattner, B. 1999. The versakey framework: Versatile group key management. IEEE J. Select. Areas Comm. 17, 9, 1614--1631. Google Scholar
Digital Library
- Wang, S. Y. and Laih, C. S. 2008. Efficient key distribution for access control in pay-tv systems. IEEE Trans. Multimedia 10, 3, 480--492. Google Scholar
Digital Library
- Yeung, S. F., Lui, J. C. S., and Yau, D. K. Y. 2005. A multikey secure multimedia proxy using asymmetric reversible parametric sequences: Theory, design, and implementation. IEEE Trans. Multimedia 7, 2, 330--338. Google Scholar
Digital Library
- Yu, S., Ren, K., and Lou, W. 2011. Fdac: Toward fine-grained distributed data access control in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22, 4, 673--686. Google Scholar
Digital Library
- Zhu, H., Lin, X., Shi, M., Ho, P.-H., and Shen, X. 2009. Ppab: A privacy-preserving authentication and billing architecture for metropolitan area sharing networks. IEEE Trans. Vehic. Technol. 58, 5, 2529--2543.Google Scholar
Cross Ref
- Zhu, W. T. 2008. A cost-efficient secure multimedia proxy system. IEEE Trans. Multimedia 10, 6, 1214--1220. Google Scholar
Digital Library
Index Terms
A conditional access system with efficient key distribution and revocation for mobile pay-TV systems
Recommendations
A conditional access system with revocation for mobile pay-TV systems revisited
AbstractIn pay-TV, conditional access systems (CAS) are used by a rights issuer to guarantee that only authorized subscribers gain access to TV channels. A CAS scheme that applies attribute-based access control through attribute-based ...
Highlights- We analyze the conditional access system (CAS) by Yeh and Huang (ACM TOMM, 2013).
An efficient authentication scheme for access control in mobile pay-TV systems
In a mobile pay-TV system, a large number of messages are exchanged for mutual authentication purposes. In traditional authentication schemes, with one-to-one delivery, one authentication message per request is delivered from a head end system to ...
A provably secure and efficient authentication scheme for access control in mobile pay-TV systems
To guarantee the secure access by authorized subscribers in mobile pay-TV systems, user authentication is required. User authentication is a security mechanism used to verify the identity of a legal subscriber. In 2012, Yeh and Tsaur proposed an ...






Comments