Abstract
With the integration of wireless communication and pay-TV, mobile broadcast TV technologies have advanced noticeably in recent years. In 2011, Chen et al. proposed an efficient anonymous authentication protocol for mobile pay-TV and claimed that their protocol is secure and efficient using in mobile pay-TV systems. This paper shows that Chen et al.’s protocol has weaknesses in password guessing attack and impersonation attack with the assumption that attacker could get user’s smart card.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
DVB Documents, DVB Technical Report: DVB-H185r3, 2003
Faria, G., Henriksson, J.A., Stare, E., Talmola, P.: DVB-H: digital broadcast services to handheld device. Proc. IEEE 94(1), 194–209 (2006)
Gallery, E., Tomlinson, A.: Conditional access in mobile systems: securing the application. In: Proceedings of the international conference on distributed frameworks for multimedia applications, pp. 190–197 (2005)
Shirazi, H., Cosmas, J., Cutts, D.: A cooperative cellular and broadcast conditional access system for pay-TV systems. IEEE Trans. Broadcasting. 56(1), 44–57 (2010)
IP Data cast over DVB-H: Service purchase and protection (SPP), DVB standard, 2005
ITU-R, Conditional-access broadcasting system, ITU-R Rec. 810, 1992
Stallings, W.: Cryptography and network security. Prentice-Hall, Englewood Cliffs (2003)
Lee, N., Chang, C., Lin, C., Hwang, T.: Privacy and non-repudiation on pay-TV systems. IEEE Trans. Consum. Electron. 46(1), 20–27 (2000)
Song, R., Korba, L.: Pay-TV system with strong privacy and non-repudiation protection. IEEE Trans. Consum. Electron. 49(2), 408–413 (2003)
Sun, H., Leu, M.: An efficient authentication scheme for access control in mobile pay-TV systems. IEEE Trans. Multimed. 11, 947–959 (2009)
Yang, J., Chang, C.: An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28, 138–143 (2009)
Chen, T., Chen, Y., Shih, W., Wei, H.: An efficient anonymous authentication protocol for mobile pay-TV. J. Netw. Comput. Appl. 34, 1131–1137 (2011)
Acknowledgments
This work was supported by the Kyungil University Research Fund.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media Dortdrecht
About this paper
Cite this paper
Kim, H.S. (2012). Cryptanalysis on An Efficient Anonymous Authentication Protocol for Mobile Pay-TV. In: J. (Jong Hyuk) Park, J., Leung, V., Wang, CL., Shon, T. (eds) Future Information Technology, Application, and Service. Lecture Notes in Electrical Engineering, vol 164. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-4516-2_32
Download citation
DOI: https://doi.org/10.1007/978-94-007-4516-2_32
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-4515-5
Online ISBN: 978-94-007-4516-2
eBook Packages: EngineeringEngineering (R0)