Abstract
IPTV should use an Internet protocol as well as satisfy the security requirements. However, no IPTV exhibits both of these characteristics in the present era. Usually IPTV uses Conditional Access System (CAS) and Digital Rights Management (DRM) as a means to protect the contents. However, these two approaches use different broadcasting systems and are limited for on-demand purposes. Such approaches illustrate the limited use of IPTV to date. In this paper, a more effective method to improve the security system will be proposed for smart mobile platforms. In this method, both the content server and IPTV use an OPT in order to apply a security code to the contents. In addition, the model performs CAS to manage user rights and keys. Such a method for smart mobile platforms will decrease the load between the server and the client network and secure the transfer of user certification, content security, and stream data.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Advanced Television System Committee (ATSC) (2004). Conditional Access System for Terrestrial Broadcast, A/70A, May 2004.
Advanced Television System Committee (ATSC) (2009). Digital Television System, A/53, Aug. 2009.
ATIS (2007). ATIS Releases Default Scrambling Algorithm for IPTV. ATIS-0800006, Mar. 2007.
Bajaj, S. (2010). OCRA: OATH challenge Response Algorithm. IETF Internet Draft Informational, Sep. 2010.
Becker, E., Buhse, W., Günnewig, D., & Rump, N. (2003). Digital Right Management, Technological, Economic, Legal and Political Aspects. Digital Right Management.org, 2003.
Digital Video Broadcasting (DVB) (1997). Support For Use of Scrambling and Conditional Access Within Digital Broadcasting Systems. DVB Document A007, Feb. 1997.
Digital Video Broadcasting (DVB) (2005). Content Protection & Copy Management. DVB Document A094, Nov. 2005.
Digital Video Broadcasting (DVB) (2009). Frame structure channel coding and modulation for a second generation digital terrestrial television broadcasting system (DVB-T2). ETSI EN 302 755, Sep. 2009.
Guo, Y., Lin, C., Yin, H., & Zhao, Z. (2007). Design and analysis of IPTV digital copyright management security protocol. In Proceedings of the international symposium on intelligent signal processing and communication systems 2007 (pp. 554–557), Nov. 2007.
Haller, N. (1994). The s/key one-time password system. In Proceedings of the 1994 symposium on network and distributed systems security (pp. 151–157), Feb. 1994.
Haller, N., Metz, C., Nesser, P., & Straw, M. (1998). A One-Time Password System. RFC 2289, Feb. 1998.
Hwang, S. (2009). Content and service protection for IPTV. IEEE Transactions on Broadcasting, 55(2). doi:10.1109/TBC.2009.2020446.
Kamperman, F., & van Rijnsoever, B. (2001). Conditional access system interoperability through software downloading. IEEE Transactions on Consumer Electronics, 47(1), 47–54.
Kerpez, K., Waring, D., Lapiotis, G., Lyles, B., & Vaidyanathan, R. (2006). IPTV service assurance. IEEE Communications Magazine, 44(9), 166–172.
Kim, D., & Choi, H. (2009). Design on protection and authentication system of IPTV contents using OTP. The Journal of the Korea Contents Association, 9(8), 129–137.
Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24(11), 770–772.
M’Raihi, D., Machani, S., Pei, M., & Rydell, J. (2010). TOTP: time-based one-time password algorithm. Internet Draft Informational, Sep. 2010.
Pagani, M. (2003). Multimedia and interactive digital TV: managing the opportunities created by digital convergence. Hershey: IRM Press.
Ramirez, D. (2008). IPTV security: protecting high-value digital contents. New York: Wiley.
Telecommunication and technology Association (2010). IPTV Interchangable CAS. 2010.3.26, Doc. No: TTAK.KO-08.0023.
Tsuji, T., & Shimizu, A. (2003). An impersonation attack on one-time password authentication protocol OSPA. IEICE Transactions on Communications, E86-B(7), 2182–2185.
Zhu, M., Zhang, M., Chen, X., Zhang, D., & Huang, Z. (2007). A hierarchical key distribution scheme for conditional access system in DTV broadcasting. In Lecture notes in computer science (Vol. 4456, pp. 839–846). Berlin: Springer.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chung, M., Lee, Y., Shon, T. et al. A security model for IPTV with one-time password and Conditional Access System for smart mobile platform. Telecommun Syst 52, 1399–1407 (2013). https://doi.org/10.1007/s11235-011-9652-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-011-9652-8