A Key Establishment Protocol for RFID User in IPTV Environment

Yoon-Su JEONG  Yong-Tae KIM  Jae-Min SOHN  Gil-Cheol PARK  Sang-Ho LEE  

IEICE TRANSACTIONS on Communications   Vol.E93-B   No.9   pp.2407-2415
Publication Date: 2010/09/01
Online ISSN: 1745-1345
DOI: 10.1587/transcom.E93.B.2407
Print ISSN: 0916-8516
Type of Manuscript: PAPER
Category: Terrestrial Wireless Communication/Broadcasting Technologies
IPTV,  RFID,  authentication protocol,  security,  access control,  

Full Text: PDF(747.1KB)>>
Buy this Article

In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1 bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.