Efficient and secure conditional access system for pay-TV systems
- 13 Downloads
Abstract
In Digital TV service, subscribers get the access of channels of their interest. In Conditional Access Systems (CAS), multimedia content is delivered securely using the Control Word (CW). To frequent update of the CW, a large number of messages are exchanged in the conventional key distribution systems. In this paper, a centralized key distribution scheme based on dynamicity of the groups and with freedom of channel package composition is proposed. Scheme has also efficient mechanism of load balancing at Group Controller (GC) side. To speed up the search of the channel package in the existing database, Optimal Binary Search Tree (OBST) data structure and Finite State Machine (FSM) are used. Scheme also provides the efficient leaving and joining mechanism for single user as well as batch users.
Keywords
Key distribution Key management Conditional access system Digital TV broadcasting Pay-TV systemNotes
References
- 1.Conditional Access Broadcasting Systems, ITU-R Rec. 810, 1992. https://www.itu.int/dms_pubrec/itu-r/rec/bt/R-REC-BT.810-0-199203-W!!PDF-E.pdf. Accessed 18 November 2018
- 2.Cremers C, Horvat M (2015) Improving the ISO/IEC 11770 standard for key management techniques. Int J Inf SecurGoogle Scholar
- 3.Huang YL, Shieh S, Ho FS, Wang JC (2004) Efficient key distribution schemes for secure media delivery in pay-TV systems. IEEE Trans Multimed 6(5):760–769. https://doi.org/10.1109/TMM.2004.834861 CrossRefGoogle Scholar
- 4.Jiang T, Zheng S, Liu B (2004) Key distribution based on hierarchical access control for conditional access system in DTV broadcast. IEEE Trans Consum Electron 50(1). https://doi.org/10.1109/TCE.2004.1277866
- 5.Kim JY, Choi HK (2010) Improvements on Sun et al.’s conditional access system in pay-TV broadcasting systems. IEEE Trans Multimed 12(4). https://doi.org/10.1109/TMM.2010.2046362
- 6.Lee JW (1996) Key Distribution and Management for conditional access system on DBS. International Conference on Cryptology and Information Security pp. 82–86Google Scholar
- 7.Liu B, Zhang W, Jiang T (2004) A scalable key distribution scheme for conditional access system in digital pay-TV system. IEEE Trans Consum Electron 50(1):632–637. https://doi.org/10.1109/TCE.2004.1309442 CrossRefGoogle Scholar
- 8.Macq BM, Quisquater JJ (1995) Cryptology for digital TV broadcasting. Proc IEEE 83:944–957CrossRefGoogle Scholar
- 9.Mapoka TT, Shepherd SJ, Abd-Alhameed RA (2014) A new multicast service key management scheme for secure wireless Mobile multicast. IEEE Trans Mob Comput 14(8):1545–1559. https://doi.org/10.1109/TMC.2014.2362760 CrossRefGoogle Scholar
- 10.Naranjo JAM, Antequera N, Casado LG, Lopez-Ramos JA (2012) A suite of algorithms for key distribution and authentication in centralized secure multicast environments. J Comput Appl Math 236(12):3042–3051. https://doi.org/10.1016/j.cam.2011.02.015 MathSciNetCrossRefzbMATHGoogle Scholar
- 11.Peinado A, Ortiz A (2011) Cryptanalysis of multicast protocols with key refreshment based on the extended Euclidean algorithm. Proc CISIS 2011 Lect Notes Comput Sci 6694:177–182Google Scholar
- 12.Sun CY, Chang CC (2016) Cryptanalysis of a secure and efficient authentication scheme for access control in Mobile pay-TV systems. Int J Netw Sec 18(3):594–596Google Scholar
- 13.Sun HM, Chen CM, Shieh CZ (2008) Flexible-pay-Per-Channel: a new model for content access control in pay-TV broadcasting systems. IEEE Trans Multimed 10(6). https://doi.org/10.1109/TMM.2008.2001381
- 14.Trappe W, Washington LC (2013) Introduction to cryptography with coding theory, 2nd edn. Pearson Education, India, pp 66–70zbMATHGoogle Scholar
- 15.Trappe W, Song J, Poovendran R, Liu KJR (2003) Key management and distribution for secure multimedia multicast. IEEE Trans Multimed 5(4):544–557. https://doi.org/10.1109/TMM.2003.813279 CrossRefGoogle Scholar
- 16.Tu FK, Laih CS, Tough SH On Key Distribution management for conditional access system on Pay-TV System. In: 1998 I.E. Int. Symp Consumer Electronics(ISCE's98), vol. 45. Taipei, Taiwan, R.O.C., pp 151-159Google Scholar
- 17.Varalakshmi R, RhymendUthariaraj V (2013) Huffman based conditional access system for key distribution in digital TV multicast. Multimed Tools Appl 74(9):2899–2912. https://doi.org/10.1007/s11042-013-1753-9 CrossRefGoogle Scholar
- 18.Vijayakumar P, Bose S, Kannan A (2014) Chinese remainder theorem based centralized group key management for secure multicast communication. IET Inf Secur 8(3):179–187. https://doi.org/10.1049/iet-ifs.2012.0352 CrossRefGoogle Scholar
- 19.VijayKumar P, Bose S, Kannan A (2012) Centralized key distribution protocol using the greatest common divisor method. Comput Math Appl 65(9):1360–1368. https://doi.org/10.1016/j.camwa.2012.01.038 MathSciNetCrossRefzbMATHGoogle Scholar
- 20.Wang SJ, Tsai YR, Shen CC, Chen PY (2010) Hierarchical key derivation scheme for group-oriented communication systems. Int J Inf Technol Commun Converg 1(1):66–76. https://doi.org/10.1504/IJITCC.2010.035227 CrossRefGoogle Scholar
- 21.Yeh LY, Huang JL (2013) A conditional access system with efficient key distribution and revocation for Mobile pay-TV systems. ACM Trans Multimed Comput Commun Appl 9(3). https://doi.org/10.1145/2487268.2487271