2011
DOI: 10.3745/kipstc.2011.18c.4.227
|View full text |Cite
|
Sign up to set email alerts
|

User Authentication and Key Distribution on Open IPTV System

Abstract: IPTV uses open platform so not only service providers but also general users can provide contents to other users. Open IPTV system has many content providers, so existing security solution of IPTV cannot be adopted. In this paper, we suggest user authentication and key distribution mechanism on Open IPTV. Our proposed mechanism is based on Kerberos, so it can support distribution environment such asOpen IPTV. We demonstrate that proposed mechanism can guarantee secure transmission of contents and reduce the de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Based on the Kerberos system, our fundamental mechanism comprises three phases. As in our previous work [4], user A requests authentication by sending a request command and the information of the content to the AS. The processes of authentication and ID verification are based on the user information in the AS, and the access to the TS is allowed after the user has been identified.…”
Section: B Modified Casmentioning
confidence: 99%
“…Based on the Kerberos system, our fundamental mechanism comprises three phases. As in our previous work [4], user A requests authentication by sending a request command and the information of the content to the AS. The processes of authentication and ID verification are based on the user information in the AS, and the access to the TS is allowed after the user has been identified.…”
Section: B Modified Casmentioning
confidence: 99%
“…In other previous works (Jung, Doh, & Chae, 2011), user A requests authentication by sending a request command and the information of the content to the AS. The processes of authentication and ID verification are based on the user information in the AS, and access to the TS is allowed after the user has been identified.…”
Section: Authentication and Key Management Based On Kerberos For M2m mentioning
confidence: 99%