Nothing Special   »   [go: up one dir, main page]

skip to main content
article

A practical RFID authentication mechanism for digital television

Published: 01 November 2014 Publication History

Abstract

As information technology continuously progresses, more applied technologies are developed, such as radio frequency identification (RFID). In this paper, we propose a novel digital television (DTV) structure that uses RFID for encryption. RFID is widely used for various applications because of its advantages such as an extended lifetime and security, and it is less affected by environmental constraints. The proposed protocol uses RFID for encryption to withstand many attacks that the traditional system is vulnerable to, such as impersonation attack, replay attack and smart card cloning. Compared with other protocols, the proposed protocol is more secure and efficient. Thus, our proposed protocol makes the DTV framework more complete and secure.

References

[1]
Chen, Y. Y., Tsai, M. L., & Jan, J. K. (2011). The design of RFID access control protocol using the strategy of indefinite-index and challenge-response. Computer Communications, 34(3), 250---256.
[2]
Chien, H. Y. (2006). Secure access control schemes for RFID systems with anonymity. In Proceedings of the 7th international conference on mobile data management.
[3]
Chien, H. Y. (2007). SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity. IEEE Transactions on Dependable and Secure Computing, 4(3), 337---340.
[4]
Chien, H. Y., & Chen, C. H. (2007). Mutual-authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards & Interfaces, 29(2), 254---259.
[5]
Chung, M. G., & Kim, Y. (2008). An integrated scheme for authentication and access control in a digital TV environment. In Proceedings of IEEE international conference on consumer electronics (pp. 1---2).
[6]
Cruselles, E., Melus, J. L., & Soriano, M. (1993). An overview of security in eurocrypt conditional access system. In Proceedings of IEEE global telecommunications conference (pp. 188---193).
[7]
Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644---654.
[8]
Dimitriou, T. (2005). A lightweight RFID protocol to protect against traceability and cloning attacks. In Proceedings of the first international conference on security and privacy for emerging areas in communications networks (pp. 59---66).
[9]
Garcia, M., Canovas, A., Edo, M., & Lloret, J. (2009). A QoE management system for ubiquitous IPTV devices. In Proceedings of IEEE international conference on mobile ubiquitous computing (pp. 147---152).
[10]
Hou, T. W., Lai, J. T., & Yeh, C. L. (2007). Based on cryptosystem secure communication between set-top box and smart card in DTV broadcasting. In Proceedings of IEEE intelligent information communication technologies for better human life (pp. 82---85).
[11]
Hwang, M. S., Lee, C. C., Lee, J. Z., & Yang, C. C. (2005). A secure protocol for bluetooth piconets using elliptic curve cryptography. Telecommunication Systems, 29(3), 165---180.
[12]
IEEE Standards. (2004). IEEE 802.11i-2004: Amendment 6: medium access control (MAC) security enhancements. 2004-07-23, Retrieved 2007-12-21.
[13]
Jiang, T., Zheng, S., & Liu, B. (2004). Key distribution based on hierarchical access control for conditional access system in DTV broadcast. IEEE Transactions on Consumer Electronics, 50(1), 225---230.
[14]
Jiang, T., Hou, Y., & Zheng, S. (2004). Secure communication between set-top box and smart card in DTV broadcasting. IEEE Transactions on Consumer Electronics, 50(3), 882---886.
[15]
Jun, E., Rhee, H. S., Jung, S. W., & Lee, D. H. (2010). A fingerprint-based user authentication scheme using smart cards in IPTV environments. In Proceedings of IEEE international conference on information science (pp. 1---8).
[16]
Kanjanarin, W., & Amornraksa, T. (2001). Scrambling and key distribution scheme for digital television. In Proceedings of IEEE international conference on networks (pp. 140---145).
[17]
Kim, T., & Bahn, H. (2008). Implementation of the storage manager for an IPTV set-top box. IEEE Transactions on Consumer Electronics, 54(4), 1770---1775.
[18]
Lee, S. M., Hwang, Y. J., Lee, D. H., & Lim, J. I. (2005). Efficient authentication for low-cost RFID systems. In Proceedings of international conference on computational science and its applications (pp. 619---627).
[19]
Lee, J. S., Rhee, H. S., & Lee, D. H. (2008). Efficient and secure communication between set-top box and smart card in IPTV broadcasting. In Proceedings of IEEE international conference on convergence and hybrid information technology (pp. 307---310).
[20]
Lee, C. C., Li, C. T., Chen, T. Y., Wu, P. H., & Chen, C. T. (2011). A new key exchange protocol with anonymity between STB and smart card in IPTV broadcasting. In Proceedings of IEEE international conference on wireless communications, networking and mobile computing (pp. 23---25).
[21]
Lee, C. C., Liao, I. E., & Hwang, M. S. (2011). An efficient authentication protocol for mobile communications. Telecommunication Systems, 46(1), 31---41.
[22]
Lehtonen, M., Ostojic, D., Ilic, A., & Michahelles, F. (2009). Securing RFID systems by detecting tag cloning. In Proceedings of the 7th international conference on pervasive computing (pp. 291---308).
[23]
Macq, B., & Quisquater, J. (1995). Cryptology for digital TV broadcasting. Proceedings of the IEEE, 83(6), 944---957.
[24]
Moon, J., Kim, J., Park, J., & Paik, E. (2008). Achieving interoperability in conditional access systems through the dynamic download and execution of cryptographic software for the IPTV system. In Proceedings of IEEE international conference on convergence and hybrid information technology (pp. 380---385).
[25]
Moon, J., Kim, J., Park, J., Paik, E., & Park, K. (2009). A dynamic conditional access system for IPTV multimedia systems. In Proceedings of IEEE international conference on systems and networks communications (pp. 224---229).
[26]
Prasertsatid, N. (2004). Implementation conditional access system for pay-TV based on Java card. In Proceedings of IEEE conference on computational electromagnetic and its application.
[27]
Rieback, M. R., Crispo, B., & Tanenbaum, A. S. (2006). The evolution of RFID security. In Proceedings of IEEE pervasive computing (pp. 62---69).
[28]
Roberts, C. M. (2006). Radio frequency identification (RFID). Computers & Security, 25(1), 18---26.
[29]
Rotter, P. (2008). A framework for assessing RFID system security and privacy risks. IEEE Pervasive Computing, 7(2), 70---77.
[30]
Shihab, E., Wan, F., Cai, L., Gulliver, A., & Tin, N. (2007). Performance analysis of IPTV traffic in home networks. In Proceedings of IEEE global telecommunications conference (pp. 5341---5345).
[31]
Shim, K. (2003). Cryptanalysis of mutual authentication and key exchange for low power wireless communication. IEEE Communications Letters, 7(5), 248---250.
[32]
Shirazi, H., Cosmas, J., & Cutts, D. (2010). A cooperative cellular and broadcast conditional access system for Pay-TV systems. IEEE Transactions on Broadcasting, 56(1), 44---57.
[33]
Smart Card Alliance (2012). RFID tags and contactless smart card technology: comparing and contrasting applications and capabilities. Available in http://www.hidglobal.com/documents/tagsVsSmartcards_wp_en.pdf.
[34]
Wey, J. S., Luken, J., & Heiles, J. (2009). Standardization activities for IPTV set-top box remote management. IEEE Internet Computing, 13(3), 32---39.
[35]
Wong, D. S., & Chan, A. H. (2001). Mutually authentication and key exchange for low power wireless communications. In Proceedings of IEEE military communications conference (pp. 39---43).
[36]
Xenakis, C., & Ntantogian, C. (2007). Security architectures for B3G mobile networks. Telecommunication Systems, 35(3), 123---139.
[37]
Yan, X., & Liu, X. (2011). Evaluating the energy consumption of the RFID tag collision resolution protocols. Telecommunication Systems.
[38]
Yoon, E. J., & Yoo, K. Y. (2006). A new secure key exchange protocol between STB and smart card in DTV broadcasting. In Proceedings of WISI (pp. 165---166).
[39]
Yoon, E. J., & Yoo, K. Y. (2009). Robust key exchange protocol between set-top box and smart card in DTV broadcasting. Informatica, 20(1), 39---150.
[40]
Yoon, E. J., & Yoo, K. Y. (2011). ECC-based key exchange protocol for IPTV service. In Proceedings of IEEE international conference on information science (pp. 547---552).
[41]
Yu, F., & Krishnamurthy, V. (2005). Efficient radio resource management in integrated WLAN/CDMA mobile networks. Telecommunication Systems, 30(1), 177---192.
[42]
Zhang, D., Zhou, J., Guo, M., & Cao, J. (2011). TASA: tag-free activity sensing using RFID tag arrays. IEEE Transactions on Parallel and Distributed Systems, 22, 558---570.

Cited By

View all
  • (2016)Cryptanalysis of Dimitriou's Key Evolving RFID SystemsProceedings of the Fifth International Conference on Network, Communication and Computing10.1145/3033288.3033292(229-233)Online publication date: 17-Dec-2016
  • (2015)A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information SystemJournal of Medical Systems10.1007/s10916-015-0260-039:8(1-8)Online publication date: 1-Aug-2015

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Telecommunications Systems
Telecommunications Systems  Volume 57, Issue 3
November 2014
67 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 November 2014

Author Tags

  1. Digital television (DTV)
  2. Impersonation attack
  3. Radio frequency identification (RFID)
  4. Replay attack
  5. Security
  6. Smart card cloning

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Cryptanalysis of Dimitriou's Key Evolving RFID SystemsProceedings of the Fifth International Conference on Network, Communication and Computing10.1145/3033288.3033292(229-233)Online publication date: 17-Dec-2016
  • (2015)A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information SystemJournal of Medical Systems10.1007/s10916-015-0260-039:8(1-8)Online publication date: 1-Aug-2015

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media