DOI QR코드

DOI QR Code

Personal Authentication Protocol of IPTV Game User using PIN Code

PIN 코드를 이용한 IPTV 게임 사용자의 개별 인증 프로토콜

  • 정윤수 (한남대학교 산업기술연구소) ;
  • 김용태 (한남대학교 멀티미디어학부)
  • Received : 2011.07.06
  • Accepted : 2011.07.19
  • Published : 2011.12.31

Abstract

Because of the development of IPTV, user is provided service of multimedia data regardless the location. But the number of users who try to get service of IPTV game illegally is also increasing. In this paper, user authentication protocol in IPTV housing using PIN code not to access easily for teenagers not to access to prohibited games. The proposed protocol combines authority data in IPTV household and creates a disposable password using PIN code to prevent teenagers from accessing illegally to the prohibited games and saves the data in certification server and set-top box to prevent forced accessing.

IPTV 기술의 발전으로 인하여 사용자는 지리적 위치에 상관없이 멀티미디어 데이터의 서비스를 손쉽게 제공받고 있다. 그러나 가입 가구내 IPTV 게임을 불법적으로 서비스 받으려는 사용자 또한 증가하고 있다. 이 논문에서는 IPTV 서비스를 제공받는 청소년이 청소년이용불가 게임에 쉽게 접근할 수 없도록 PIN코드를 이용한 IPTV 가구내 사용자 개별 인증 프로토콜을 제안한다. 제안 프로토콜은 청소년이 청소년이용불가 게임에 불법적으로 접근하는 것을 예방하기 위해서 PIN 코드를 이용한 일회용 패스워드를 생성하여 IPTV 가구내 주어진 권한 정보를 쌍으로 묶어 인증서버와 셋톱박스에 저장하여 청소년이 강제적으로 게임에 접근하려는 시도를 예방한다.

Keywords

References

  1. Gartner Group, "An Introduction to IPTV (Television via Internet Protocol)," Oct. 2005.
  2. Y. S. Jeong, Y. T. Kim, Y. S. Jung, G. C. Park and S. H. Lee, "A Mutual Authentication Protocol based on Hash Function for Efficient Verification of User Entitlement in IPTV Service", Journal of KIISE : Informatio Networking, Vol. 37, No. 3, pp. 187-197, Jun. 2010.
  3. Y. S. Jeong, Y. S. Jung, Y. T. Kim, G. C. Park and S. H. Lee, "A Security Model Analysis Adopt to Authentication State Information in IPTV Environment", The Journal of Korea Information and Communication Society, Vol. 35, No. 3, pp. 421-430, Mar. 2010.
  4. Y. S. Jeong, Y. T. Kim, G. C. Park and S. H. Lee, "User Authentication Mechanism for using a Secure IPTV Service in Mobile Device", The Journal of Korea Information and Communication Society, Vol. 34, No. 4, pp. 377-386, Apr. 2009.
  5. Y. S. Jeong, Y. T. Kim, G. C. Park and S. H. Lee, "A Low-weight Authentication Protocol using RFID for IPTV User", Journal of The Korea Institute of Information Security and Cryptology, Vol. 19, No. 2, pp. 105-116, Apr. 2009.
  6. F. K. Tu, C. S. Laih, and H. H. Tung, "On Key Distribution Management for Conditional Access System on Pay-TV System," IEEE Trans. On Consumer Electronics, vol. 45, pp. 151-158, February 1999. https://doi.org/10.1109/30.754430
  7. Y. L. Huang, S.P. Shieh, and J.C. Wang, "Practical Key Distribution Scheme for Channel Protection," IEEE Twenty-Fourth Annual International Computer Software&Applications Conference, 2000.
  8. T. Jiang, S. Zheng, and B. Liu, "Key Distribution Based on Hierarchical Access Control for Conditional Access System in DTV Broadcast," IEEE Trans. On Consumer Electronics, Vol.50, No.1, pp.225-230, 2004. https://doi.org/10.1109/TCE.2004.1277866
  9. T. Jiang. Y. Hou, and S. Zheng, "Secure Communicatio between Set-Top Box and Smart Card in DTV Broadcasting", IEEE Transaction on Consumer Electronics, Vol 50(3), pp. 882-886, 2004. https://doi.org/10.1109/TCE.2004.1341695
  10. E. Yoon and K. Yoo, "A New Secure Key Exchange Protocol between STB and Smart card in DTV broadcasting", Proc. of the Intelligence and Security Informations(ISI), Vol. 3917, LNCS, pp. 139-150, 2009.
  11. S. Lee, N. Park,S. Kim, and J. Choi, "Cryptanalysis of secure key exchange protocol between STB and smart card in IPTV broadcasting", Proc. of the Advances in Information Security and Assurance(AISA), Vol 5576, LNCS, pp. 797-803, 2009.
  12. T. Hou, J. Lai and C. Yen, "Based on Cryptosystem Secure Communication between Set-Top Box and Smart Card in DTV Broadcasting", Proc of the TENCON07, pp. 1-5, 2007.
  13. H. Kim, "Secure Communication in Digital TV Broadcasting", International Journal of Computer Science and Network Security(IJCSNS), vol.8(9), pp.1-5, 2008.

Cited by

  1. A Study on Integrated ID Authentication Protocol for Web User vol.13, pp.7, 2015, https://doi.org/10.14400/JDC.2015.13.7.197