Efficient and Secure Communication between Set-Top Box and Smart Card in IPTV Broadcasting

@article{Lee2008EfficientAS,
  title={Efficient and Secure Communication between Set-Top Box and Smart Card in IPTV Broadcasting},
  author={Ji-Seon Lee and Hyun Sook Rhee and Dong Hoon Lee},
  journal={2008 International Conference on Convergence and Hybrid Information Technology},
  year={2008},
  pages={307-310}
}
  • Ji-Seon LeeH. RheeD. Lee
  • Published 28 August 2008
  • Computer Science
  • 2008 International Conference on Convergence and Hybrid Information Technology
To provide secure delivery of satellite data in IPTV systems, service providers charge subscribing fee by scrambling the program in conditional access system using control words. At the receiver end, smart card is used to decrypt the control words and transfer them back to set-top box to descramble the scrambled program. Therefore, secure communication between set-top box and smart card is closely related with the benefit of service providers and the legal rights of users. In this paper, we… 

Figures from this paper

Secure communication between set-top box and smart card for fair use in DTV broadcasting

A novel scheme for fair use is presented to receive programs for subscribers themselves on any set-top boxes and can prevent McCormac Hack and smart card cloning problems which are serious threats in digital television broadcasting.

A New Key Exchange Protocol with Anonymity between STB and Smart Card in IPTV Broadcasting

This paper will design the internet authentication system which is anonymous and secured, which can apply to solve the smart card duplication and the data resending attack problems, and propose a new efficient and safe Internet Protocol Television.

A Novel Frequency Billing Service in Digital Television System

The proposed protocol is more efficient than other previously proposed protocols by eliminating exponentiation operations which are time-consuming computations and prevents two common serious problems in DTV broadcasting such as smart card cloning and replay attacks.

A practical RFID authentication mechanism for digital television

A novel digital television (DTV) structure that uses RFID for encryption to withstand many attacks that the traditional system is vulnerable to, such as impersonation attack, replay attack and smart card cloning is proposed.

Tutorial on IPTV and its latest developments

This tutorial presents on IPTV technology, which discusses the IPTV architecture, network technologies, implementation of IPTV, different types of STBs that are being used with in New Zealand, the standards, different business models, hardware and software of IP TV.

Towards standardisation of E-zwich implementation: mapping SWOT analysis to management framework models approach

SWOT analysis is performed on the implementation of the E-zwich system, and the findings are mapped to PPT and GTZ management frameworks models to serve as standards to enhance the successful implementation of such systems.

References

SHOWING 1-10 OF 11 REFERENCES

Secure communication between set-top box and smart card in DTV broadcasting

This paper proposes a key exchange protocol for STB and smart card based on Schnorr's digital signature protocol and one-way hash function that is dynamic, secure, mutual authenticated and lower computation.

Based on cryptosystem secure communication between set-top box and smart card in DTV broadcasting

The proposed protocol has following merits: security, dynamic session key, mutual authentication and users could freely chosen password, which could prevent smart card clone and MacCormac Hack problems which are serious problems in DTV broadcasting.

Efficient key distribution schemes for secure media delivery in pay-TV systems

This paper presents three key distribution schemes for channel protection and secure media delivery in pay-TV systems and uses simpler computation functions, including one-way hash function and exclusive-OR operation, for key updates to reduce the computation cost.

Key distribution based on hierarchical access control for conditional access system in DTV broadcast

The proposed key distribution scheme can greatly reduce the encrypting computation and acquire higher efficiency and security, and is more flexible in processing joining and leaving of subscriber, which is very important for service provider to manage the subscriber.

Key distribution based on hierarchical access control for conditional access system in DTV broadcast

The proposed key distribution scheme can greatly reduce the encrypting computation and acquire higher efficiency and security, and is more flexible in processing joining and leaving of subscriber, which is very important for service provider to manage the subscriber.

Scrambling and key distribution scheme for digital television

A new scrambling scheme and key distribution scheme that can prevent two common problems, namely, smart card cloning and McCormac Hack, is proposed and the security of the scheme can be increased.

Conditional Access System Interoperability Through Software Downloading

This paper describes another solution for CA-STB interoperability, based on downloading interoperable software into the STB, that provides full CA- STBs interoperability and can be introduced relatively easily into future STBs and will require only minimal changes in current CA systems.

On key distribution management for conditional access system on pay-TV system

It is shown that the proposed complete scheme is efficient and suitable for a pay-TV system which provides both pay per channel (PPC) and pay per view (PPV) services and is also a flexible one for dynamic management.

Identification cards – Identification cards -Integrated circuit(s) cards with contact – part 3: Electronic signals and transmission protocol

  • Identification cards – Identification cards -Integrated circuit(s) cards with contact – part 3: Electronic signals and transmission protocol
  • 1989

Information Technology – Identification cards -Integrated circuit(s) cards with contact – part 4: Interindustry commands for interchange

  • Information Technology – Identification cards -Integrated circuit(s) cards with contact – part 4: Interindustry commands for interchange
  • 1995