ACM Transactions on Computer Systems (TOCS)
Scrambling and Key Distribution Scheme for Digital Television
ICON '01 Proceedings of the 9th IEEE International Conference on Networks
Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
A new secure key exchange protocol between STB and smart card in DTV broadcasting
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Efficient key distribution schemes for secure media delivery in pay-TV systems
IEEE Transactions on Multimedia
On key distribution management for conditional access system on pay-TV system
IEEE Transactions on Consumer Electronics
Conditional access system interoperability through software downloading
IEEE Transactions on Consumer Electronics
Key distribution based on hierarchical access control for conditional access system in DTV broadcast
IEEE Transactions on Consumer Electronics
Secure communication between set-top box and smart card in DTV broadcasting
IEEE Transactions on Consumer Electronics
Hi-index | 0.00 |
In internet protocol television (IPTV) broadcasting, service providers charge subscribing fee by scrambling the program with conditional access system (CAS) using control words (CWs). A smart card is used to decrypt the CWs and transfer them back to set-top box (STB) to descramble the scrambled program. Secure communication between STB and the smart card is closely related with the benefit of service providers and the legal rights of users. In addition, secure key exchange with mutual authentication in the communication between STB and the smart card is an essential part of secure communication that will significantly improve the security of the system. To provide secure communication with mutual authentication in IPTV broadcasting, there are several schemes. The schemes proposed a secure and efficient method for the communication between STB and the smart card. Unfortunately, the schemes still have some security flaws. In this paper, we review that the previous schemes are vulnerable to several attacks. Further, we recommend some modifications to the schemes to correct these security flaws and present a formal analysis about our improved protocol using a logic based formal method.