In internet protocol television (IPTV) broadcasting, service providers charge subscribing fee by scrambling the program with conditional access system (CAS) using control words (CWs). A smart card is used to decrypt the CWs and transfer them back to set-top box (STB) to descramble the scrambled program. Secure communication between STB and the smart card is closely related with the benefit of service providers and the legal rights of users. In addition, secure key exchange with mutual authentication in the communication between STB and the smart card is an essential part of secure communication that will significantly improve the security of the system. To provide secure communication with mutual authentication in IPTV broadcasting, there are several schemes. The schemes proposed a secure and efficient method for the communication between STB and the smart card. Unfortunately, the schemes still have some security flaws. In this paper, we review that the previous schemes are vulnerable to several attacks. Further, we recommend some modifications to the schemes to correct these security flaws and present a formal analysis about our improved protocol using a logic based formal method.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Jiang T, Hou Y, Zheng S (2004) Secure communication between set-top box and smart card in DTV broadcasting. IEEE Trans Consum Electron 50:882–886
Jiang T, Hou Y, Zheng S (2004) Key distribution based on hierarchical access control for conditional access system in DTV broadcast. IEEE Trans Consum Electron 50:225–230
Hou TW, Lai JT, Yeh CL (2007) Based on cryptosystem secure communication between set-top box and smart card in DTV broadcasting. In: TENCON 2007, IEEE Region 10 conference, pp 1–5
Tu R (1999) On key distribution management for conditional access system on Pay-TV system. IEEE Trans Consum Electron 45:151–158
Huang YL, Shieh S, Ho FS, Wang JC (2004) Efficient key distribution schemes for secure media delivery in Pay-TV systems IEEE Trans Mutimed 6(5):760–769
Kanjanarin W, Amornraksa T (2001) Scrambling and key distribution scheme for digital television. In: IEEE international conference on networks, pp 140–145
Yoon EJ, Yoo KY (2006) A new secure key exchange protocol between STB and smart card in DTV broadcasting. In: WISI 2006. LNCS, vol. 3971, pp 165–166
Kim H (2008) Secure communication in digital TV broadcasting. Int J Comput Sci Netw Secur 8(9)
Lee SH, S Park N, K Kim S, Y Choi J (2009) Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting. In: ISA 2009. LNCS, vol. 5576, pp 797–803
Kamperman F, Rijnsoever BV (2001) Conditional access system interoperability through software downloading. IEEE Trans Consum Electron 47(1):47–53
Gong L, Needham R, Yahalom R (1990) Reasoning about belief in cryptographic protocols. In: Proc IEEE symposium on research in security and provacy, pp 234–248
Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst, 18–36
About this article
Cite this article
Lee, S., Park, N. & Choi, J. Secure communication in IPTV broadcasting. J Supercomput 62, 42–52 (2012). https://doi.org/10.1007/s11227-011-0582-8
- Secure communication
- Formal analysis