A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach

As the most prevailing two-factor authentication mechanism, smart card based password authentication has been a subject of intensive research in the past decade and hundreds of this type of schemes have been proposed. However, most of them were found severely flawed, especially prone to the smart card security breach problem, shortly after they were first put forward, no matter the security is ...

متن کامل

SOC Design for IPTV Set Top Box

IPTV is mainly used for Live Streaming, Time Shifting and provide Videos on Demand (VOD). In recent years of development in System on Chip (SOC) design the Ethernet transmission capability is 100Mbps.The data transmitted is in the form of packets through the Ethernet cable. This packet has to be converted into frames and stored in the memory. Generally, processor accesses the memory and stores ...

متن کامل

A Robust and Efficient Timestamp-based Remote User Authentication Scheme with Smart Card Lost Attack Resistance

Password-based authentication scheme with smart card is an important part of security for accessing remote servers. In 2011, Awasthi et al. proposed an improved timestampbased remote user authentication scheme to eliminate the attacks in Shen et al.’s. However, we find that their scheme is vulnerable to the privileged insider, the lost smart card, the password guessing, the replay, the modifica...

متن کامل

Robust Key Exchange Protocol between Set-Top Box and Smart Card in DTV Broadcasting

Secure communication between set-top boxes (STBs) and smart cards is directly related to the benefit of the service providers and the legal rights of users, while key exchange is the essential part of a secure communication. In 2004, Jiang et al. proposed a key exchange protocol for STBs and smart cards based upon Schnorr’s digital signature protocol and a one-way hash function. This paper, how...

متن کامل

A Robust Remote User Authentication Scheme against Smart Card Security Breach

Remote user authentication is important to identify whether communicating parties are genuine and trustworthy using the password and the smart card between a login user and a remote server. Recently, we find that Kim et al.’s password-based authentication scheme [1] assume that the attacker cannot extract the secret information of the smart card. However, in reality, the authors in [2,8] show t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The KIPS Transactions:PartC

سال: 2010

ISSN: 1598-2858

DOI: 10.3745/kipstc.2010.17c.1.037