A hybrid user authentication protocol for mobile IPTV service

被引:6
|
作者
Kim, Soo-Cheol [1 ]
Yeo, Sang-Soo [2 ]
Kim, Sung Kwon [1 ]
机构
[1] Chung Ang Univ, Div Comp Sci & Engn, Seoul 156756, South Korea
[2] Mokwon Univ, Div Comp Engn, Taejon, South Korea
基金
新加坡国家研究基金会;
关键词
IPTV; RFID; !text type='Java']Java[!/text] Card; USIM; User authentication; SET-TOP BOX; SMART CARD;
D O I
10.1007/s11042-011-0810-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IPTV, a technological convergence that combines communication and broadcasting technologies, delivers customized, interactive TV content and other multimedia information over wired and wireless connections. Providing secure access to IPTV services calls for authentication, without proper and secure authentication mechanisms, an individual impersonating a subscriber could steal a service. This paper proposes a new authentication protocol to authenticate IPTV users. The authors based the proposed protocol, a hybrid authentication protocol providing lightweight, personalized user authentication, on RFID (radio-frequency identification) and USIM (Universal Subscriber Identity Module) technologies. In the proposed protocol, USIM performs highly personalized authentication, and the authenticated subscriber's RFID tags can have a temporary authority to execute authentication. These RFID tags become Agent Tags authorized to authenticate subscribers. Agent Tags identify and authenticate themselves to RFID readers in the set-top box, thus, simplifying the authentication process.
引用
收藏
页码:283 / 296
页数:14
相关论文
共 50 条
  • [41] An Efficient Fingerprint-Based Remote User Authentication Protocol Using Mobile Devices
    Madhusudhan, R.
    Mittal, R. C.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SOFT COMPUTING FOR PROBLEM SOLVING (SOCPROS 2011), VOL 2, 2012, 131 : 569 - 578
  • [42] Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment
    Manojkumar Vivekanandan
    Sastry V. N.
    Srinivasulu Reddy U.
    [J]. Peer-to-Peer Networking and Applications, 2021, 14 : 1572 - 1595
  • [43] An efficient user authentication and key exchange protocol for mobile client-server environment
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    [J]. COMPUTER NETWORKS, 2010, 54 (09) : 1520 - 1530
  • [44] An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 319 - 325
  • [45] A User Anonymous Mutual Authentication Protocol
    Kumari, Saru
    Li, Xiong
    Wu, Fan
    Das, Ashok Kumar
    Odelu, Vanga
    Khan, Muhammad Khurram
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (09): : 4508 - 4528
  • [46] An Improved User Authentication Protocol for IoT
    Cui, Jianming
    Zhang, Zuowen
    Li, Hengzhong
    Sui, Rongquan
    [J]. 2018 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC 2018), 2018, : 59 - 62
  • [47] A strong user authentication protocol for GSM
    Aydemir, Ö
    Selçuk, AA
    [J]. Fourteenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Proceedings, 2005, : 150 - 153
  • [48] Graphical User Authentication Algorithm for Mobile Banking User
    Ugochukwu, Ejike Ekeke Kingsley
    Jusoh, Yusmadi Yah
    Yasin, Sharifah Md
    Abdullah, Azizol
    Abdullah, Salfarina
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (07) : 5182 - 5186
  • [49] PrivBioMTAuth: Privacy Preserving Biometrics-Based and User Centric Protocol for User Authentication From Mobile Phones
    Gunasinghe, Hasini
    Bertino, Elisa
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (04) : 1042 - 1057
  • [50] Active User Authentication for Mobile Devices
    Sui, Yan
    Zou, Xukai
    Li, Feng
    Du, Eliza Y.
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 540 - 548