Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme 


Vol. 16,  No. 1, pp. 21-26, Feb.  2009
10.3745/KIPSTC.2009.16.1.21


PDF
  Abstract

Presently, the demand for IPTV, to satisfy a variety of goals, is exploding. IPTV is coming into the spotlight as a killer application in upcoming IP convergence networks such as triple play which is the delivery of voice, internet, and video service to a subscriber. IPTV utilizes CAS, which controls the subscriber access to content for a profit. Although the current CAS scheme provides access control via subscriber authentication, there is no authentication scheme for the content transmitted from service providers. Thus, there is a vulnerability of security, through which an adversary can forge content between the service provider and subscribers and distribute malicious content to subscribers. In this paper, based on a hash tree scheme, we proposed efficient and strong source authentication protocols which remove the vulnerability of the current IPTV system. We also evaluate our protocol from a view of IPTV requirements.

  Statistics


  Cite this article

[IEEE Style]

K. E. Shin and H. K. Choi, "Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme," The KIPS Transactions:PartC, vol. 16, no. 1, pp. 21-26, 2009. DOI: 10.3745/KIPSTC.2009.16.1.21.

[ACM Style]

Ki Eun Shin and Hyoung Kee Choi. 2009. Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme. The KIPS Transactions:PartC, 16, 1, (2009), 21-26. DOI: 10.3745/KIPSTC.2009.16.1.21.