Skip to main content

An Efficient Migration Framework for Mobile IPTV

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6423))

Abstract

In this paper we present an efficient migration framework for mobile IPTV services. We present a secure migration for their devices when user migrates to receive MIPTV services for the first time, indoor and outdoor migration. In addition we use Conditional Access System (CAS) and Digital Right Management (DRM) to protect MIPTV service and digital content.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IPTV, http://en.wikipedia.org/wiki/Mobile_IPTV

  2. Mobile IPTV Gets Real, http://www.dailyiptv.com/news/mobile-iptv-reality-030107/

  3. Conditional Access System, http://en.wikipedia.org/wiki/Conditional_access_system

  4. Park, J.H.: Subscriber Authentication Technology of AAA Mechanism for Mobile IPTV Service Offer., Spring Science and Business Media, LLC (2009)

    Google Scholar 

  5. Kerberos (Protocol), http://en.wikipedia.org/wiki/Kerberos_protocol

  6. Denial-of-Service Attack, http://en.wikipedia.org/wiki/Denial-of-service_attack

  7. Man-in-the Middle Attack, http://en.wikipedia.org/wiki/Man_in_the_middle_attack

  8. Pries, R., Yu, W., Fu, X., Zhao, W.: A New Replay Attack against Anonymous Communication Networks

    Google Scholar 

  9. Cryptographic Nonce, http://en.wikipedia.org/wiki/Cryptographic_nonce

  10. Cryptographic and Data Security, www.tcs.hut.fi/Studies/T-79.4501/2007AUT/lectures/lecture11.ppt

  11. Gouda Dr., M., Haggag, M.: Enhanced Authentication Mechanism for Next Generation Networks. In: First International Conference on Computational Intelligence, Communication Systems and Networks, IEEE Computer Society, Los Alamitos (2009)

    Google Scholar 

  12. Choi, J., Jung, S., Kim, Y., Yoo, M.: A fast and Efficient Handover Authentication Achieving Conditional Privacy in V2I Networks

    Google Scholar 

  13. Alsaffar, A., Shin, Y., Nguyen, T., Huh, E.: Secure Migration of IPTV Services from a STB to Mobile Devices for Pay per View Video. In: 6th International Conference on Digital Content, Multimedia Technology and its Applications, IEEE Computer Society, Seoul (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Alsaffar, A.A., Nguyen, TD., Islam, M.M., Shin, YR., Huh, EN. (2010). An Efficient Migration Framework for Mobile IPTV. In: Pan, JS., Chen, SM., Nguyen, N.T. (eds) Computational Collective Intelligence. Technologies and Applications. ICCCI 2010. Lecture Notes in Computer Science(), vol 6423. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16696-9_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16696-9_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16695-2

  • Online ISBN: 978-3-642-16696-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics