91
Views
3
CrossRef citations to date
0
Altmetric
Articles

Authentication and Key Management Based on Kerberos for M2M Mobile Open IPTV Security

, , &

References

  • Cedervall, M., Horn, U., Hu, Y., Lvars, I. M., & Nasstrom, T. (2007). Open IPTV forum: Toward an open IPTV standard. Ericsson Review, (3)
  • Chen, C. L., Yang, T. T., Leu, F. Y., & Huang, Y. L. (2014). Designing a healthcare authorization model based on cloud authentication. Journal of Intelligent Automation & Soft Computing, 20(3)
  • Dabrowski, M., Gromada, J., Moustafa, H., & Forestier, J. (2013). A context-aware architecture for IPTV services personalization. Journal of Internet Services and Information Security, 3(1/2)
  • Diaz-Sanchez, D., Marín, A., Almenarez, F., & Cortes, A. (2009). Sharing conditional access modules through the home network for pay TV access. IEEE Transactions on Consumer Electronics, 55(1), 88–96. 10.1109/TCE.2009.4814419.
  • Diaz-Sanchez, D., Sanvido, F., Proserpio, D., & Marín, A. (2010). DLNA, DVB-CA and DVB-CPCM integration for commercial content management. IEEE Transactions on Consumer Electronics, 56(1), 79–87. 10.1109/TCE.2010.5439129.
  • Doh, I., Lim, J., & Chae, K. (2013a). Key management approach for secure mobile open IPTV service. ComSIS.
  • Doh, I., Lim, J., Chae, K., & Chung, M. (2013b). An improved security approach based on Kerberos for M2M open IPTV system. Proceedings of NeoFusion.
  • Hartung, F., Kesici, S., & Catrein, D. (2011). DRM protected dynamic adaptive HTTP streaming. 2nd Annual ACM Conference on Multimedia Systems (pp. 23–25)
  • Hwang, S. O. (2009). Content and service protection for IPTV. IEEE Trans. Broadcasting, 55(2)
  • ITU-T Q.22/SG13, Y. MobileP2P.
  • Jung, J., Doh, I., & Chae, K. (2011). User authentication and key distribution on open IPTV system. Journal of Information Processing Systems (JIPS), 18, 227–236.
  • Kang, Y. (2011). IPTV CAS using efficient group key management scheme. IEEE International Conference on Consumer Electronics (ICCE).
  • Kim, SK, Yeo, S., & Kim, S. (2013). A hybrid user authentication protocol for mobile IPTV service. Multimedia Tools and Applications, 65(2), 283–296. 10.1007/s11042-011-0810-5.
  • Moon, J., Park, J., & Paik, E. (2007). JavaCard-based two-level user key management for IP conditional access systems. IEEE International Conference on Network (ICON).
  • Neuman, B. C., & Ts'o, T. (2004). Kerberos: An authentication service for computer networks. IEEE Comm. Magn., 32(9)
  • Proserpio, D., Diaz-Sanchez, D., Almenárez, F., Marín, A., & Sanchez guerrero, R. S. (2011). Achieving IPTV service portability through delegation. IEEE Transactions on Consumer Electronics, 57(2), 492–498. 10.1109/TCE.2011.5955184.
  • Seo, K., Kim, T., Kim, J., Lim, J., & Moon, J. (2010). A novel method for effective protection of IPTV contents with one-time password and conditional access system. Journal of Korea Institute of Information Security & Cryptology, 20(4)
  • Stalling, W.  Cryptography and Network Security, 4/e, Prentice Hall.
  • Tu, F. K., Laih, C. S., & Tung, H. H. (1999). On key distribution management for conditional access system on pay-TV system. IEEE Transactions on Consumer Electronics, 45(1), 151–158. 10.1109/30.754430.
  • Xu, F., & Liu, X. (2013). Authentication scheme for cluster-structured Ad Hoc network. Journal of Intelligent Automation & Soft Computing, 19(2)
  • Yang, D., & Yang, B. (2011). A novel multi-factor authenticated key exchange scheme with privacy preserving. Journal of Internet Services and Information Security, 1(2/3)

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.