Skip to main content
Log in

Fingerprint-based access control using smart cards in IPTV

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In internet protocol television (IPTV) environments, authentication should be implemented to provide the IPTV contents to those legitimate subscribers. After successful authentication, a legitimate subscriber is unconditionally granted access to the contents. However, each content might have its own policy that restricts access according to subscriber’s attribute such as age. Authentication only is not sufficient to realize access control embracing diverse policies depending on contents. In this paper, we propose a novel fingerprint-based scheme that enables fine-grained access control according to the policies of contents providers and subscriber’s attribute. The proposed scheme is robust against man-in-the-middle attacks, replay attacks, and impersonation attacks which are considered as common threats in IPTV environments. The scheme also prevents cloning and McCormac Hack problems, that are critical attacks specific to authentication using smart cards.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Clodfelter R (2010) Biometric technology in retailing: will consumers accept fingerprint authentication? J Retail Consum Serv 17(3):181–188

    Article  Google Scholar 

  2. Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Trans Inf Theory IT-22:644–654

    Article  MathSciNet  Google Scholar 

  3. Dimitriou T (2005) A lightweight RFID protocol to protect against traceability and cloning attacks. In: Proceedings of the IEEE international conference on security and privacy for emerging areas in communication networks, pp 59–66

  4. ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory IT-31:469–472

    Article  MathSciNet  Google Scholar 

  5. Hou TW, Lai JT, Yeh CL (2007) Based on cryptosystem secure communication between set-top box and smart card in DTV broadcasting. In: IEEE intelligent information communication technologies for better human life, pp 82–85

  6. ITU Rec (1992) Conditional-access broadcasting systems. ITU-R, Geneva, Switzerland

  7. Jiang T, Hou Y, Zheng S (2004) Secure communication between set-top box and smart card in DTV broadcasting. IEEE Trans Consum Electron 50(3):882–886

    Article  Google Scholar 

  8. Jiang T, Zheng S, Liu B (2004) Key distribution based on hierarchical access control for conditional access system in DTV broadcast. IEEE Trans Consum Electron 50:225–230

    Article  Google Scholar 

  9. Jung W, Chen S, Liaw H (2008) Robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 55:2551–2556

    Article  Google Scholar 

  10. Kamperman F, Rijnsoever BV (2001) Conditional access system interoperability through software downloading. IEEE Trans Consum Electron 47(1):47–53

    Article  Google Scholar 

  11. Kanjanarin W, Amornraksa T (2001) Scrambling and key distribution scheme for digital television. In: IEEE international conference on networks, pp 140–145

  12. Kiyomoto S, Tanaka T (2008) Anonymous attribute authentication scheme using self-blindable certificates. In: IEEE international conference intelligence and security informatics, pp 215–217

  13. Kogan N, Shavitt Y, Woo A (2003) A practical revocation scheme ofr broadcast encryption using smart cards. In: Proceedings of the IEEE symposium on security and privacy, pp 225–235

  14. Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Comput Appl 33(1):1–5

    Article  Google Scholar 

  15. Piramuthu S (2007) Protocols for RFID tag/reader authentication. Decis Support Syst 43:897–914

    Article  Google Scholar 

  16. Sakakibara H, Seki H, Okada K, Matsushita Y (1994) The ID-based non-interactive group communication key sharing scheme using smart cards. In: Proceedings of the international conference network protocols, pp 91–98

  17. Schnorr CP (1991) Efficient signature generation by smart cards. J Cryptol 4(3):161–174

    MathSciNet  MATH  Google Scholar 

  18. Shim K (2003) Cryptanalysis of mutual authentication and key exchange for low power wireless communication. IEEE Commun Lett 7(5):248–250

    Article  Google Scholar 

  19. Sahai A, Waters B (2005) Fuzzy identity based encryption. In: Proc. of Eurocrypt’05. LNCS, vol 3494, pp 457–473

  20. Wong DS, Chan AH (2001) Mutually authentication and key exchange for low power wireless communications. In: Proceedings of the IEEE military communications, vol 1, pp 39–43

  21. Yoon EJ, Yoo KY (2009) Robust key exchange protocol between set-top box and smart card in DTV broadcasting. Informatica 20(1):139–150

    Google Scholar 

Download references

Acknowledgement

This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MEST) (No. 2010-0029121).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dong Hoon Lee.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jun, EA., Rhee, H.S., Kim, J.G. et al. Fingerprint-based access control using smart cards in IPTV. Multimed Tools Appl 73, 647–661 (2014). https://doi.org/10.1007/s11042-011-0765-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-011-0765-6

Keywords

Navigation