2012 15th International Conference on Network-Based Information Systems 2012
DOI: 10.1109/nbis.2012.81
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Security Approach Based on Kerberos for M2M Open IPTV System

Abstract: Open IPTV has attracted considerable attention and is expected to bring great changes in the IPTV service area. However, because of its openness and IP network characteristics, security is one of the major issues hindering its commercialization. For IPTV, several security mechanisms for user authentication and content protection have been applied to make the service reliable. These traditional security mechanisms cannot be adopted in the IPTV area, because in the many-to-many environment the security and hence… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…In its performance and security, it limits users' requirements for breaking into the network of IPTV. Doh, I. et al [9] proposed using Kerberos, which is a protocol that verifies accuracy between a client and server via an entrusted third party with access to the open network environment. The third party provides the secret key to all clients and verifies its authenticity.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In its performance and security, it limits users' requirements for breaking into the network of IPTV. Doh, I. et al [9] proposed using Kerberos, which is a protocol that verifies accuracy between a client and server via an entrusted third party with access to the open network environment. The third party provides the secret key to all clients and verifies its authenticity.…”
Section: Related Workmentioning
confidence: 99%
“…The copyright protection system [7] prevents the broadcasting of content due to piracy as well as unauthorized data transfers with a one-time password to log into the system [8]. Even the use of Kerberos [9], a protocol used to verify accuracy between a client and server, is not enough for prevention and verification because the current patterns of attack and terrorism on the internet have different severity levels. Some attacks may steal information, but do not affect the overall system.…”
Section: Introductionmentioning
confidence: 99%
“…We proposed a user authentication and key establishment mechanism in our previous work (Doh et al, 2013b). In this subsection, the proposed security mechanisms based on Kerberos are briefly reviewed.…”
Section: Security For Local Open Iptv Servicementioning
confidence: 99%
“…Our proposal combines an authentication mechanism operating in a distributed environment, Kerberos, and modified CAS for IPTV. In our previous work (Doh, Lim, Chae, & Chung, 2013b); we proposed a user authentication mechanism and key distribution system for basic open IPTV services. It involves communication for static IPTV devices in a single domain.…”
Section: Introductionmentioning
confidence: 99%
“…Their scheme aims to provide contents to subscribers according to subscriber attribute. In [19] the authors proposed secure authentication approach based on Kerberos for M2M Open IPTV system where they introduce key distribution based Kerberos. The authors claim that their proposal provides an efficient authentication process and secure content transfer among users as well as decreasing authentication time.…”
Section: Related Workmentioning
confidence: 99%