skip to main content
research-article

A conditional access system with efficient key distribution and revocation for mobile pay-TV systems

Published:03 July 2013Publication History
Skip Abstract Section

Abstract

Current mobile pay-TV systems have two types of Conditional Access Systems (CAS): group-key-based and public-key systems. The best feature of group-key-based systems is the ability to enjoy the broadcast nature in delivery multimedia contents, while the major advantage of public-key systems is consolidating the security foundation to withstand various attacks, such as collusion attacks. However, the problems of group-key-based systems include collusion attacks, lack of nonrepudiation, and troublesome key distribution. Even worse, the benefit of broadcast efficiency is confined to a group size of no more than 512 subscribers. For public-key systems, the poor delivery scalability is the major shortcoming because the unique private key feature is only suitable for one-to-one delivery. In this article, we introduce a scalable access control scheme to integrate the merits of broadcasting regardless of group size and sound security assurance, including fine-grained access control and collusion attack resistance. For subscriber revocation, a single message is broadcast to the other subscribers to get the updated key, thus significantly boosting subscriber revocation scalability. Due to mobile subscribers' dynamic movements, this article also analyzes the benefit of retransmission cases in our system. Through the performance evaluation and functionality comparison, the proposed scheme should be a decent candidate to enhance the security strength and transmission efficiency in a mobile pay-TV system.

Skip Supplemental Material Section

Supplemental Material

References

  1. Conditional-Access Broadcasting System. 1992. ITU-R rec. 810, itu recommendation. http://www.itu.int/dms_pubrec/itu-r/rec/bt/R-REC-BT.810-0-199203-W!!PDF-E.pdf.Google ScholarGoogle Scholar
  2. Digital Video Broadcasting (Dvb-H). 2004. Transmission system for handheld terminals. ETSI en 302 304, dvb technical specification. http://www.dvb-h.org/technology.htm.Google ScholarGoogle Scholar
  3. Digital Video Broadcasting (Dvb-Sh). 2007. System specifications for satellite services to handheld devices below 3 ghz. ETSI ts 102 585, dvb technical specification. http://www.dvb-h.org/technology.htm.Google ScholarGoogle Scholar
  4. Digital Video Broadcasting (Dvb-Spp). 2007. Ip datacast over dvb-h: Service purchase and protection. ETSI ts 102 474, dvb technical specification. http://www.dvb-h.org/technology.htm.Google ScholarGoogle Scholar
  5. Dvb-H. http://en.wikipedia.org/wiki/DVB-H.Google ScholarGoogle Scholar
  6. Fiat, A. and Naor, M. 1994. Broadcast encryption. In Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Goyal, V., Pandey, O., Sahai, A., and Waters, B. 2006. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06). 89-98. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Huang, Y.-L., Shish, S., Ho, F.-S., and Wang, J.-C. 2004. Efficient key distribution schemes for secure media delivery in pay-tv systems. IEEE Trans. Multimedia 6, 5, 760--769. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Daemen, J. and Rijmen, V. 2002. The Design of Rijndael: AES - The Advanced Encryption Standard. Springer. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kornfeld, M. and May, G. 2007. Dvb-h and ip datacast--broadcast to handheld devices. IEEE Trans. Broadcast. 53, 1, 161--170.Google ScholarGoogle ScholarCross RefCross Ref
  11. Ns 2, T. N. S. Network Simulator. ACM Trans. Appl. Percept. 2, 3.Google ScholarGoogle Scholar
  12. Qi, Q., Cao, Y., Li, T., Zhu, X., and Wang, J. 2010. Soft handover mechanism based on rtp parallel transmission for mobile iptv services. IEEE Trans. Consum. Electron. 56, 4, 2276--2281. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Roh, H. and Jung, S. 2011. An authentication scheme for consumer electronic devices accessing mobile iptv service from home networks. In Proceedings of the IEEE International Conference on Consumer Electronics (ICCE'11). 717--718.Google ScholarGoogle Scholar
  14. Sahai, A. and Waters, B. 2005. Fuzzy identity-based encryption. In Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Lecture Notes in Computer Science, vol. 3494, Springer, 457--473. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Staddon, J., Miner, S., Franklin, M., Balfanz, D., Malkin, M., and Dean, D. 2002. Self-healing key distribution with revocation. In Proceeding of the IEEE Symposium on Security and Privacy. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Sun, H.-M., Chen, C.-M., and Shieh, C.-Z. 2008. Flexible-pay-per-channel: A new model for content access control in pay-tv broadcasting systems. IEEE Trans. Multimedia 10, 6, 1109--1120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Sun, H.-M. and Leu, M.-C. 2009. An efficient authentication scheme for access control in mobile pay-tv systems. IEEE Trans. Multimedia 11, 5, 947--959. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Waldvogel, M., Caronni, G., Sun, D., Weiler, N., and Plattner, B. 1999. The versakey framework: Versatile group key management. IEEE J. Select. Areas Comm. 17, 9, 1614--1631. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Wang, S. Y. and Laih, C. S. 2008. Efficient key distribution for access control in pay-tv systems. IEEE Trans. Multimedia 10, 3, 480--492. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Yeung, S. F., Lui, J. C. S., and Yau, D. K. Y. 2005. A multikey secure multimedia proxy using asymmetric reversible parametric sequences: Theory, design, and implementation. IEEE Trans. Multimedia 7, 2, 330--338. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Yu, S., Ren, K., and Lou, W. 2011. Fdac: Toward fine-grained distributed data access control in wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 22, 4, 673--686. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Zhu, H., Lin, X., Shi, M., Ho, P.-H., and Shen, X. 2009. Ppab: A privacy-preserving authentication and billing architecture for metropolitan area sharing networks. IEEE Trans. Vehic. Technol. 58, 5, 2529--2543.Google ScholarGoogle ScholarCross RefCross Ref
  23. Zhu, W. T. 2008. A cost-efficient secure multimedia proxy system. IEEE Trans. Multimedia 10, 6, 1214--1220. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A conditional access system with efficient key distribution and revocation for mobile pay-TV systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!