Share This Article:

On the Security of Anonymous Authentication Protocol for Mobile Pay-TV

Abstract Full-Text HTML Download Download as PDF (Size:203KB) PP. 225-233
DOI: 10.4236/jis.2013.44025    3,790 Downloads   6,589 Views   Citations
Author(s)    Leave a comment

ABSTRACT

One of the promising multimedia services is the mobile pay-TV service. Due to its wireless nature, mobile pay-TV is vulnerable to attacks especially during hand-off. In 2011, an efficient anonymous authentication protocol for mobile pay-TV is proposed. The authors claim that their scheme provides an anonymous authentication to users by preventing intruders from obtaining usersIDs during the mutual authentication between mobile subscribers and head end systems. However, after analysis, it was found that the scheme does not provide anonymous authentication and users can be easily tracked while using their anonymous identity. The scheme is also subject to denial of service attack. In this paper the deficiencies of the original scheme are demonstrated, and then a proposed improved scheme that eliminates these deficiencies is presented.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

W. Khedr, "On the Security of Anonymous Authentication Protocol for Mobile Pay-TV," Journal of Information Security, Vol. 4 No. 4, 2013, pp. 225-233. doi: 10.4236/jis.2013.44025.

References

[1] H. S. L. Pequeno, G. A. M. Gomes, R. M. C. Andrade, J. N. de Souza and M. F. de Castro, “FrameIDTV: A Framework for Developing Interactive Applications on Digital Television Environments,” Journal of Network and Computer Applications, Vol. 33, No. 4, 2010, pp. 503-511.
[2] H.-M. Sun and M.-C. Leu, “An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems,” IEEE Transactions on Multimedia, Vol. 11, No. 5, 2009, pp. 947-959. http://dx.doi.org/10. 1109/TMM. 2009.2021790
[3] X. Li, J. Niu, M. Khurram Khan and J. Liao, “An Enhanced Smart Card Based Remote User Password Authentication Scheme,” Journal of Network and Computer Applications, Vol. 36, No. 5, 2013, pp. 1365-1371.
[4] X. Li, Y. Xiong, J. Ma and W. Wang, “An Efficient and Security Dynamic Identity Based Authentication Protocol for Multi-Server Architecture Using Smart Cards,” Journal of Network and Computer Applications, Vol. 35, No. 2, 2012, pp. 763-769.
[5] Z. Tan, “A Lightweight Conditional Privacy-Preserving Authentication and Access Control Scheme for Pervasive Computing Environments,” Journal of Network and Computer Applications, Vol. 35, No. 6, 2012, pp. 1839-1846.
[6] N.-Y. Lee, C.-C. Chang, C.-L. Lin and T. Hwang, “Privacy and Non-Repudiation on Pay-TV Systems,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, 2000, pp. 20-27. http://dx.doi.org/ 10.1109/30. 826376
[7] R. Song and L. Korba, “Pay-TV System with Strong Privacy and Non-Repudiation Protection,” IEEE Transactions on Consumer Electronics, Vol. 49, No. 2, 2003, pp. 408-413. http://dx.doi.org/10.1109/ TCE.2003.1209533
[8] S. F. Yeung, J. C. Lui and D. K. Yau, “A Multikey Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design and Implementation,” IEEE Transactions on Multimedia, Vol. 7, No. 2, 2005, pp. 330-338. http://dx.doi.org/10.1109/TMM.2005.843361
[9] H. Roh and S. Jung, “An Authentication Scheme for Consumer Electronic Devices Accessing Mobile IPTV Service From Home Networks,” 2011 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, 9-12 January 2011, pp. 717-718.
[10] Y.-L. Huang, S. Shieh, F.-S. Ho and J.-C. Wang, “Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems,” IEEE Transactions on Multimedia, Vol. 6, No. 5, 2004, pp. 760-769. http://dx.doi.org/10.1109/TMM.2004.834861
[11] H.-M. Sun, C.-M. Chen and C.-Z. Shieh, “Flexible-Payper-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems,” IEEE Transactions on Multimedia, Vol. 10, No. 5, 2008, pp. 1109-1120. http://dx.doi.org/10.1109/TMM.2008.2001381
[12] R. Di Pietro and R. Molva, “An Optimal Probabilistic Solution for Information Confinement, Privacy, and Security in RFID Systems,” Journal of Network and Computer Applications, Vol. 34, No. 3, 2011, pp. 853-863.
[13] W. I. Khedr, “SRFID: A Hash-Based Security Scheme for Low Cost RFID Systems,” Egyptian Informatics Journal, Vol. 14, No. 1, 2013, pp. 89-98.
[14] T.-H. Chen, Y.-C. Chen, W.-K. Shih and H.-W. Wei, “An Efficient Anonymous Authentication Protocol for Mobile Pay-TV,” Journal of Network and Computer Applications, Vol. 34, No. 4, 2011, pp. 1131-1137.
[15] J.-H. Yang and C.-C. Chang, “An ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem,” Computers & Security, Vol. 28, No. 3-4, 2009, pp. 138-143. http://dx.doi.org/10.1016/j.cose.2008.11.008
[16] WMF-T33-107-R020v02, “Architecture, detailed Protocols and Procedures,” 2012.
[17] OpenSSL, “OpenSSL 1.0.1e,” 2013.

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.