By Topic

A New Key Exchange Protocol with Anonymity between STB and Smart Card in IPTV Broadcasting

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

5 Author(s)
Cheng-Chi Lee ; Dept. of Libr. & Inf. Sci., Fu Jen Catholic Univ., Taipei, Taiwan ; Chun-Ta Li ; Te-Yu Chen ; Ping-Hsien Wu
more authors

IPTV (Internet Protocol Television) is a very important field in the network development. Comparing to the traditional television, the IPTV combines the digital contents like media. The communication and the advertisement with the interaction serve into the emerging business model to provide the users to watch television service. Because the IPTV contains many merits; therefore, the world holds the high interest to develop of the IPTV. IPTV application scope is quite big, not only include wired and wireless, but also unify the telecommunication entrepreneur to provide the handset service, mobile device service and so on. It will be possible to affect the traditional television in the future, and even to displace it. If the user can use the IPTV effectively, it could be an enormous market. Generally, because the users' identities are easily exposed when Internet Protocol Television authenticate them, the best way to secure information security is to hide the identities of users. This paper will design the internet authentication system which is anonymous and secured. It can apply to solve the smart card duplication and the data resending attack problems. Session key and time-stamp of cryptography are used in the technique to achieve security and anonymous of the authentication process. Simultaneously, how to authenticate more efficiently by encryption in smart card authentication process is also our research objective. Further, this paper will contribute to how to build a security mechanism to prevent from the attacks. Based on those researches, this project plans to propose a new efficient and safe Internet Protocol Television. This new mechanism improves the security, efficiency and usability in the authentication process. More complete studies on Internet Protocol Television will be needed.

Published in:

Wireless Communications, Networking and Mobile Computing (WiCOM), 2011 7th International Conference on

Date of Conference:

23-25 Sept. 2011