Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme


The KIPS Transactions:PartC, Vol. 16, No. 1, pp. 21-26, Feb. 2009
10.3745/KIPSTC.2009.16.1.21,   PDF Download:

Abstract

Presently, the demand for IPTV, to satisfy a variety of goals, is exploding. IPTV is coming into the spotlight as a killer application in upcoming IP convergence networks such as triple play which is the delivery of voice, internet, and video service to a subscriber. IPTV utilizes CAS, which controls the subscriber access to content for a profit. Although the current CAS scheme provides access control via subscriber authentication, there is no authentication scheme for the content transmitted from service providers. Thus, there is a vulnerability of security, through which an adversary can forge content between the service provider and subscribers and distribute malicious content to subscribers. In this paper, based on a hash tree scheme, we proposed efficient and strong source authentication protocols which remove the vulnerability of the current IPTV system. We also evaluate our protocol from a view of IPTV requirements.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
K. E. Shin and H. K. Choi, "Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme," The KIPS Transactions:PartC, vol. 16, no. 1, pp. 21-26, 2009. DOI: 10.3745/KIPSTC.2009.16.1.21.

[ACM Style]
Ki Eun Shin and Hyoung Kee Choi. 2009. Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme. The KIPS Transactions:PartC, 16, 1, (2009), 21-26. DOI: 10.3745/KIPSTC.2009.16.1.21.