2017
DOI: 10.1002/dac.3305
|View full text |Cite
|
Sign up to set email alerts
|

Design and FPGA implementation of an efficient security mechanism for mobile pay‐TV systems

Abstract: A mobile pay-TV service is one of the ongoing services of multimedia systems.Designing an efficient mechanism for authentication and key distribution is an important security requirement in mobile pay-TV systems. Until now, many security protocols have been proposed for mobile pay-TV systems. However, the existing protocols for mobile pay-TV systems are vulnerable to various security attacks.Recently, Wang and Qin proposed an authentication scheme for mobile pay-TV systems using bilinear pairing on elliptic cu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 48 publications
(66 reference statements)
0
9
0
Order By: Relevance
“…Based on Wang and Qin's scheme [34], Arshad et al designed an encryption-based authentication scheme for mobile pay-TV. This scheme did not use bilinear pairings and was easily implemented on FPGA boards [36].…”
Section: Related Workmentioning
confidence: 99%
“…Based on Wang and Qin's scheme [34], Arshad et al designed an encryption-based authentication scheme for mobile pay-TV. This scheme did not use bilinear pairings and was easily implemented on FPGA boards [36].…”
Section: Related Workmentioning
confidence: 99%
“…Some of them only use of hash function and suitable for light device. According to [39], we assume the execution time of the hash function is 0.13µs and the execution time of pairing function is 17500.354µs. It is clearly that the pairing-based schemes are much heavier and slower than the schemes use only hash function (for example, the execution time of our improved scheme in issue phase is 1.3µs and the execution time of issue phase in Wu et al [28] is about 2777.357µs).…”
Section: • Performance Costmentioning
confidence: 99%
“…e three-party or two-party authentication protocols proposed in other research areas can provide a reference for designing authentication protocols suitable for SIN but cannot be directly applied. For example, in mobile pay-TV systems, [11] proposes a time slot-based key distribution mechanism that divides 24 hours by 45 minutes and arranges them in a binary tree. Service providers can provide up to 16 communication keys for a single user.…”
Section: Introductionmentioning
confidence: 99%