OMA DRM-Based Key Management Protocol for IPTV

Article Preview

Abstract:

Nowadays, with the development of hardware platform, digital content can be presented in more varieties of forms. The authorized users not only watch the authorized TV programs, but also are willing to do it via mobile phones and I-pad. Although the contemporary OMA DRM system provides an approach named domains to adapt multi-screens and services about the authorization of offline digital content, standard PKI procedures used to authenticate the DRM Agent, with the calculation and power consumption relatively larger, are not beneficial for the mobile terminal. Meanwhile, as the public key distribution is complex and the authorization is difficult, it is also not helpful for applied environment of multi-screens. Based on the authentication of hardware devices, the uniqueness of hardware ID also cannot meet the actual demand of multi-screen user. In this paper, we will propose a new protocol of key distribution based on OMA DRM. The protocol meets the requirements of low power consumption and multiple-screen, while providing the feasible security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

815-820

Citation:

Online since:

February 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] OMA DRM Approved Version 2. 0. 1, July (2008).

Google Scholar

[2] Zonghua Liu, Guangqing Liu, Byungwook Lee, An Efficient Key Distribution Method Applying to OMA DRM 2. 0 with Device Identifier, Ninth ACIS International Conference on Software Engineer-ing, Artificial Intelligence, Networking, and Parallel/Distributed Computing(2008).

DOI: 10.1109/snpd.2008.76

Google Scholar

[3] Chi-Chun Lo, Chun-Chieh Huang, Meng-Ju Lee, A Channel-Based Key Management Protocol for IPTV Service, The 8th Annual IEEE Consumer Communications and Networking Conference (2011).

DOI: 10.1109/ccnc.2011.5766575

Google Scholar

[4] Martin Petraschek, Thomas Hoeher, Oliver Jung, Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP, Journal of Universal Computer Science (2008).

DOI: 10.1109/wd.2008.4812920

Google Scholar

[5] Richard Spillman, classical and contemporary cryptology, America (2005).

Google Scholar

[6] Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer and Xiaoming Fu, Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security, 9th IEEE Global Internet Symposium 2006(2006).

DOI: 10.1109/infocom.2006.52

Google Scholar

[7] Simson L. Garfinkel, Email-Based Identification and Authentication: An Alternative to PKI? THE IEEE COMPUTER SOCIETY (2003).

Google Scholar

[8] Riccardo Pecori, Luca Veltri, a Key Agreement Protocol for P2P VoIP Applications, Software, Telecommunications & Computer Networks, 2009. SoftCOM 2009. 17th International Conference (2009).

Google Scholar

[9] Jianhong Zhang, Hua Chen, Qin Geng, An efficient Certificate-Based Signature Scheme without Pairings, Computer Science and Engineering (2009).

DOI: 10.1109/wcse.2009.763

Google Scholar

[10] Ronald Petrlic, Christoph Sorge, Privacy-Preserving Digital Rights Management based on Attribute-based Encryption, New Technologies, Mobility and Security (2014).

DOI: 10.1109/ntms.2014.6814044

Google Scholar

[11] Liang Wang, Chen Wang, A DRM System for Mobile Digital Journals Based on OMA DRM Model, International Conference on Electronic & Mechanical Engineering and Information Technology(2011).

DOI: 10.1109/emeit.2011.6023573

Google Scholar