Overview of IEEE 802.16 Security
IEEE Security and Privacy
Security issues in privacy and key management protocols of IEEE 802.16
Proceedings of the 44th annual Southeast regional conference
User Authentication Mechanism Using Java Card for Personalized IPTV Services
ICHIT '08 Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology
Efficient key distribution schemes for secure media delivery in pay-TV systems
IEEE Transactions on Multimedia
On key distribution management for conditional access system on pay-TV system
IEEE Transactions on Consumer Electronics
Conditional access system interoperability through software downloading
IEEE Transactions on Consumer Electronics
Key distribution based on hierarchical access control for conditional access system in DTV broadcast
IEEE Transactions on Consumer Electronics
Secure communication between set-top box and smart card in DTV broadcasting
IEEE Transactions on Consumer Electronics
Viewer Identification and Authentication in IPTV using RFID Technique
IEEE Transactions on Consumer Electronics
Real-time multimedia computing
Multimedia Tools and Applications
Hi-index | 0.00 |
IPTV, a technological convergence that combines communication and broadcasting technologies, delivers customized, interactive TV content and other multimedia information over wired and wireless connections. Providing secure access to IPTV services calls for authentication, without proper and secure authentication mechanisms, an individual impersonating a subscriber could steal a service. This paper proposes a new authentication protocol to authenticate IPTV users. The authors based the proposed protocol, a hybrid authentication protocol providing lightweight, personalized user authentication, on RFID (radio-frequency identification) and USIM (Universal Subscriber Identity Module) technologies. In the proposed protocol, USIM performs highly personalized authentication, and the authenticated subscriber's RFID tags can have a temporary authority to execute authentication. These RFID tags become Agent Tags authorized to authenticate subscribers. Agent Tags identify and authenticate themselves to RFID readers in the set-top box, thus, simplifying the authentication process.