Table of Contents Author Guidelines Submit a Manuscript
Advances in Multimedia
Volume 2015, Article ID 147320, 13 pages
http://dx.doi.org/10.1155/2015/147320
Research Article

IPTV Service Framework Based on Secure Authentication and Lightweight Content Encryption for Screen-Migration in Cloud Computing

Department of Computer Engineering, College of Electronic and Information, Kyung Hee University, Republic of Korea

Received 12 April 2015; Revised 24 September 2015; Accepted 22 October 2015

Academic Editor: Marco Roccetti

Copyright © 2015 Aymen Abdullah Alsaffar et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. Ramirez, IPTV Security: Protecting High Value Digital Content, John Wiley & Sons, London, UK, 2008.
  2. IPTV, http://en.wikipedia.org/wiki/IPTV.
  3. Cryptographic Nonce, https://en.wikipedia.org/wiki/Cryptographic_nonce.
  4. Cryptographic and Data Security, http://www.tcs.hut.fi/Studies/T-79.159/slides/lecture11.pdf.
  5. M. Gouda and M. Haggag, “Enhanced authentication mechanism for next generation networks,” in Proceedings of the 1st International Conference on Computational Intelligence, Communication Systems and Networks (CICSYN '09), pp. 288–295, IEEE, Indore, India, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. Y.-R. Shin, J.-H. Lee, and E.-N. Huh, “Lightweight content encryption technique for mobile IPTV service,” in Proceedings of the 2nd International Conference on Internet (ICONI '10), pp. 831–832, December 2010.
  7. J.-D. Choi, S.-H. Jung, Y.-H. Kim, and M.-S. Yoo, “A fast and efficient handover authentication achieving conditional privacy in V2I networks,” in Smart Spaces and Next Generation Wired/Wireless Networking, vol. 5764 of Lecture Notes in Computer Science, pp. 291–300, Springer, Berlin, Germany, 2009. View at Publisher · View at Google Scholar
  8. Y.-H. Jung and S.-H. Oh, “Design and implementation of efficient DRM system for content streaming based on H.264,” Journal of the Korea institute of Information Security and Cryptology, vol. 19, no. 2, pp. 155–162, 2009. View at Google Scholar
  9. Latency on a Switched Ethernet Network, http://www.ruggedcom.com/pdfs/application_notes/latency_on_a_switched_ethernet_network.pdf.
  10. M.-K. Choi, R. J. Robles, C.-H. Hong, and T.-H. Kim, “Wireless network security: vulnerabilities, threats and countermeasures,” International Journal of Multimedia and Ubiquitous Engineering, vol. 3, no. 3, pp. 77–86, 2008. View at Google Scholar · View at Scopus
  11. M. Waliullah and D. Gan, “Wireless LAN security threats & vulnerabilities,” International Journal of Advanced Computer Science and Applications, vol. 5, no. 1, 2014. View at Publisher · View at Google Scholar
  12. Replay Attack, http://en.wikipedia.org/wiki/Replay_attack.
  13. I. V. Uilecan, C. Zhou, and G. E. Atkin, “Framework for delivering IPTV services over WiMAX wireless networks,” in Proceedings of the IEEE International Conference on Electro/Information Technology (EIT '07), pp. 470–475, IEEE, Chicago, Ill, USA, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. T.-J. Kim, J.-S. Kim, and M.-S. Hahn, “Policy-based service overlay IPTV framework for open strategy,” in Proceedings of the 2nd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC '10), pp. 962–966, Beijing, China, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. X. Yang, “Analyses of a novel IPTV framework for cable TV operators,” in Proceedings of the IEEE Asia-Pacific Services Computing Conference (APSCC '11), pp. 321–326, IEEE, December 2011. View at Publisher · View at Google Scholar · View at Scopus
  16. M.-Y. Sung, “A rich media framework for communication-broadcasting converged IPTV,” IEEE Transactions on Consumer Electronics, vol. 56, no. 2, pp. 463–470, 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. H. Jabbar, T.-Y. Jeong, J. Hwang, and G.-L. Park, “Viewer identification and authentication in IPTV using RFID technique,” IEEE Transactions on Consumer and Electronics, vol. 54, no. 1, pp. 105–109, 2008. View at Publisher · View at Google Scholar
  18. E.-A. Jun, J. G. Kim, S. W. Jung, and D. H. Lee, “Extended fingerprint-based user authentication scheme using smart cards in education IPTV,” in Proceedings of the International Conference on Information Science and Applications (ICISA '11), pp. 1–7, Jeju Island, Republic of Korea, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  19. I. Doh, K.-J. Chae, J.-Y. Lim, and M. Y. Chung, “An improved security approach based on kerberos for M2M open IPTV system,” in Proceedings of the 15th International Conference on Network-Based Information Systems (NBIS '12), pp. 754–759, IEEE, Melbourne, Australia, September 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. H. J. Yoo, “Secure mutual authentication for IPTV broadcasting,” in Proceedings of the International Conference on ICT Convergence (ICTC '12), pp. 96–99, IEEE, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. C. Ntantogian, I. Stavrakakis, and C. Xenakis, “Reducing the user authentication cost in next generation networks,” in Proceedings of the 5th Annual Conference on Wireless on Demand Network Systems and Services, pp. 65–72, Garmisch-Partenkirchen, Germany, January 2008.
  22. 60 Million IPTV subscription in the EU by 2020, 2011, http://www.broadbandtvnews.com/2011/09/29/60-million-iptv-subscriptions-in-the-eu-by-2020/.
  23. S. Zeadally, H. Moustafa, and F. Siddiqui, “Internet protocol television (IPTV): architecture, trends, and challenges,” IEEE Systems Journal, vol. 5, no. 4, pp. 518–527, 2011. View at Publisher · View at Google Scholar · View at Scopus
  24. ITU-Focus Group, http://www.itu.int/pub/T-PROC-IPTVFG-2008/en.
  25. S. H. Park, S.-H. Jeong, and C. J. Hwang, “Mobile IPTV expanding the value of IPTV,” in Proceedings of the 7th International Conference on Networking (ICN '08), pp. 296–301, IEEE, Cancun, Mexico, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  26. M. Mushtaq and T. Ahmed, “P2P-based mobile IPTV: challenges and opportunities,” in Proceedings of the 6th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA '08), pp. 975–980, IEEE, Doha, Qatar, April 2008. View at Publisher · View at Google Scholar · View at Scopus
  27. T. Guo, C. H. Foh, J. Cai, D. Niyato, and E. W. M. Wong, “Performance evaluation of IPTV over wireless home networks,” IEEE Transactions on Multimedia, vol. 13, no. 5, pp. 1116–1126, 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. X. Wang, B. Wang, and J. Huang, “Cloud computing and its key techniques,” in Proceedings of the IEEE International Conference on Computer Science and Automation Engineering (CSAE '11), vol. 2, pp. 404–410, IEEE, Shanghai, China, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  29. Internet Streaming Media Alliance, ISMA Encryption and Authentication Specification Ver. 1.1.2005, 2005, https://en.wikipedia.org/wiki/ISMACryp.
  30. C.-H. Lee and H.-C. Chiu, “Telco IPTV growth strategy in Taiwan,” in Proceedings of the 13th International Conference on Advanced Communication Technology, pp. 1469–1474, Gangwon-Do, Republic of Korea, February 2011.
  31. L.-H. Zhang, X.-W. Kong, and C. Yang, “Digital rights management independent of terminals in mobile applications,” The Journal of China Universities of Posts and Telecommunications, vol. 14, no. 1, pp. 32–38, 2007. View at Publisher · View at Google Scholar · View at Scopus
  32. J. H. Park, “Subscriber authentication technology of AAA mechanism for mobile IPTV service offer,” Telecommunication Systems, vol. 45, no. 1, pp. 37–45, 2010. View at Publisher · View at Google Scholar · View at Scopus
  33. Y. Jeong, S. Kim, H. Kim, H.-S. Koo, and E. Kwon, “A novel protocol for downloadable CAS,” IEEE Transactions on Consumer Electronics, vol. 54, no. 3, pp. 1236–1243, 2008. View at Publisher · View at Google Scholar · View at Scopus
  34. Kerberos (Protocol), October 2012, https://en.wikipedia.org/wiki/Kerberos_(protocol).
  35. Extensible Authentication Protocol, http://en.wikipedia.org/wiki/Extensible_Authentication_Protocol.
  36. Denial of Service Attack, https://en.wikipedia.org/wiki/Denial-of-service_attack.
  37. Man in the Middle Attack, http://en.wikipedia.org/wiki/Man_in_the_middle_attack.
  38. A. Diab and A. Mitschele-Thiel, “Minimizing Mobile IP Handoff Latency,” http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.103.1273&rep=rep1&type=pdf.
  39. A. Abdullah Alsaffar, T.-D. Nguyen, M. M. Islam, Y.-R. Shin, and E.-N. Huh, “An efficient migration framework for mobile IPTV,” in Computational Collective Intelligence. Technologies and Applications: Second International Conference, ICCCI 2010, Kaohsiung, Taiwan, November 10-12, 2010. Proceedings, Part III, vol. 6423 of Lecture Notes in Computer Science, pp. 292–301, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar