Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Secure communication in IPTV broadcasting


In internet protocol television (IPTV) broadcasting, service providers charge subscribing fee by scrambling the program with conditional access system (CAS) using control words (CWs). A smart card is used to decrypt the CWs and transfer them back to set-top box (STB) to descramble the scrambled program. Secure communication between STB and the smart card is closely related with the benefit of service providers and the legal rights of users. In addition, secure key exchange with mutual authentication in the communication between STB and the smart card is an essential part of secure communication that will significantly improve the security of the system. To provide secure communication with mutual authentication in IPTV broadcasting, there are several schemes. The schemes proposed a secure and efficient method for the communication between STB and the smart card. Unfortunately, the schemes still have some security flaws. In this paper, we review that the previous schemes are vulnerable to several attacks. Further, we recommend some modifications to the schemes to correct these security flaws and present a formal analysis about our improved protocol using a logic based formal method.

This is a preview of subscription content, log in to check access.


  1. 1.

    Jiang T, Hou Y, Zheng S (2004) Secure communication between set-top box and smart card in DTV broadcasting. IEEE Trans Consum Electron 50:882–886

  2. 2.

    Jiang T, Hou Y, Zheng S (2004) Key distribution based on hierarchical access control for conditional access system in DTV broadcast. IEEE Trans Consum Electron 50:225–230

  3. 3.

    Hou TW, Lai JT, Yeh CL (2007) Based on cryptosystem secure communication between set-top box and smart card in DTV broadcasting. In: TENCON 2007, IEEE Region 10 conference, pp 1–5

  4. 4.

    Tu R (1999) On key distribution management for conditional access system on Pay-TV system. IEEE Trans Consum Electron 45:151–158

  5. 5.

    Huang YL, Shieh S, Ho FS, Wang JC (2004) Efficient key distribution schemes for secure media delivery in Pay-TV systems IEEE Trans Mutimed 6(5):760–769

  6. 6.

    Kanjanarin W, Amornraksa T (2001) Scrambling and key distribution scheme for digital television. In: IEEE international conference on networks, pp 140–145

  7. 7.

    Yoon EJ, Yoo KY (2006) A new secure key exchange protocol between STB and smart card in DTV broadcasting. In: WISI 2006. LNCS, vol. 3971, pp 165–166

  8. 8.

    Kim H (2008) Secure communication in digital TV broadcasting. Int J Comput Sci Netw Secur 8(9)

  9. 9.

    Lee SH, S Park N, K Kim S, Y Choi J (2009) Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting. In: ISA 2009. LNCS, vol. 5576, pp 797–803

  10. 10.

    Kamperman F, Rijnsoever BV (2001) Conditional access system interoperability through software downloading. IEEE Trans Consum Electron 47(1):47–53

  11. 11.

    Gong L, Needham R, Yahalom R (1990) Reasoning about belief in cryptographic protocols. In: Proc IEEE symposium on research in security and provacy, pp 234–248

  12. 12.

    Burrows M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst, 18–36

Download references

Author information

Correspondence to Jin-Young Choi.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Lee, S., Park, N. & Choi, J. Secure communication in IPTV broadcasting. J Supercomput 62, 42–52 (2012).

Download citation


  • Secure communication
  • IPTV
  • Formal analysis