DOI QR코드

DOI QR Code

An Efficient and Secure Group Key Distribution Protocol for IP-based Pay-TV Systems

IP기반의 Pay-TV 시스템을 위한 안전하고 효율적인 그룹 키 분배 프로토콜

  • 김정윤 (성균관대학교 휴대폰학과) ;
  • 최형기 (성균관대학교 정보통신공학부)
  • Published : 2009.04.30

Abstract

Recently,IP-based broadcasting systems,such as Mobile-TV and IP-TV, have been widely deployed. These systems require a security system to allow only authorized subscribers access to broadcasting services. We analyzed the Conditional Access System, which is a security system used in the IP-based Pay-TV systems. A weakness of the system is that it does not scale well when the system experiences frequent membership changes. In this paper, we propose a group key distribution protocol which overcomes the scalability problem by reducing communication and computation overheads without loss of security strength. Our experimental results show that computation delay of the proposed protocol is smaller than one of the Conditional Access System. This is attributed to the fact that the proposed protocol replaces expensive encryption and decryption with relatively inexpensive arithmetic operations. In addition, the proposed protocol can help to set up a secure channel between a server and a client with the minimum additional overhead.

최근 몇 년간, IP-TV 등 IP 기반의 방송 서비스들이 급속도로 보급되고 있다. 이러한 IP기반의 Pay-TV 서비스들은 미디어 컨텐츠를 보호하기 위한 보안 시스템을 필요로 한다. 본 논문은 IP기반의 Pay-TV 보안 시스템인 Conditional Access System을 분석하고, 현재의 Conditional Access System이 비효율적인 방식으로 그룹 키를 분배한다는 사실을 제시한다. 본 논문은 Conditional Access System의 성능을 향상시키기 위해서, 안전하고 효율적인 그룹 키 분배 프로토콜을 제안한다. 본 논문에서 제안하는 프로토콜은 간단한 사칙연산 만으로 그룹 키의 분배가 가능하다. 성능 분석 결과는 본 논문에서 제안하는 프로토콜이 Conditional Access System보다 효율적이라는 것을 보여준다. 뿐만아니라, 본 논문에서 제안하는 프로토콜에서는 그룹 키를 분배하는 과정에서 서버와 단말 둘만이 공유하게 되는 비밀 값을 쉽게 획득할 수 있다. 이 비밀 값은 서버와 단말이 공유하고 있는 마스터 키를 대체할 수 있으며, 이는 마스터 키의 반복된 사용에 의해 발생되는 공격들로부터 시스템을 안전하게 보호한다.

Keywords

References

  1. H. M. Sun, C. M. Chen, and C. Z. Shieh, 'Flexible-Pay-Per-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems,' IEEE Transactions on Multimedia, Vol.10, No.6, pp.1109-1120, Oct., 2008 https://doi.org/10.1109/TMM.2008.2001381
  2. T. Yoshimura, 'Conditional Access System for Digital Broadcasting in Japan,' Proceedings of the IEEE, Vol.94, No.1, pp.318-322, Jan., 2006 https://doi.org/10.1109/JPROC.2005.859708
  3. Y. Huang, S. Shieh, F. Ho, and J. Wang, 'Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems,' IEEE Transactions on Multimedia, Vol.6, No.5, pp.760-769, Oct., 2004 https://doi.org/10.1109/TMM.2004.834861
  4. B. Liu, W. Zhang, and T. Jiang, 'A Scalable Key Distribution Scheme for Conditional Access System in Digital Pay-TV System,' IEEE Transactions on Consumer Electronics, Vol.50, No.2, pp.632-637, May, 2004 https://doi.org/10.1109/TCE.2004.1309442
  5. T. Jiang, S. Zheng, and B. Liu, 'Key Distribution Based on Hierarchical Access Control for Conditional Access System in DTV Broadcast,' IEEE Transactions on Consumer Electronics, Vol.50, No.1, pp.225-230, Feb., 2004 https://doi.org/10.1109/TCE.2004.1277866
  6. A. T. Sherman and D. A. McGrew, 'Key Establishment in Large Dynamic Groups Using One-Way Function Trees,' IEEE Transactions on Software Engineering, Vol.29, No.5, pp.444-458, May, 2003 https://doi.org/10.1109/TSE.2003.1199073
  7. B. E. Jung, 'An Efficient Group Key Agreement Protocol,' IEEE Communications Letters, Vol.10, No.2, pp.106-107, Feb., 2006 https://doi.org/10.1109/LCOMM.2006.02021.
  8. S. M. Lee and D. H. Lee, 'Analysis of an Efficient Group Key Agreement Protocol,' IEEE Communications Letters, Vol.10, No.8, pp.638-639, Aug., 2006 https://doi.org/10.1109/LCOMM.2006.1665136
  9. L. R. Dondeti, S. Mukherjee, and A. Samal, 'Scalable Secure One-to-many Group Communication using Dual Encryption,' Computer Communications, Vol.23, No.17, pp.1681-1701, Nov., 2000 https://doi.org/10.1016/S0140-3664(00)00255-3
  10. A. Perrig, D. Song, and D. Tygar, 'ELK, a new protocol for efficient large-group key distribution,' Proc. IEEE Symp. on Security and Privacy, California, USA, pp.247-262, May, 2001
  11. A. Ganesh, A. M. Kermarrec, and L. Massoulie, 'Peer-to-Peer Membership Management for Gossipbased Protocols,' IEEE Transactions on Computer, Vol.52, pp.139-149, Feb., 2003 https://doi.org/10.1109/TC.2003.1176982
  12. Y. Xiao, X. Du, J. Zhang, F. Hu, and S. Guizani, 'Internet Protocol Television (IPTV): The Killer Application for the Next-Generation Internet,' IEEE Communications Magazine, Vol.45, No.11, pp.126-134, Nov., 2007 https://doi.org/10.1109/MCOM.2007.4378332
  13. C. Luo, J. Sun, and H. Xiong, 'Monitoring and Troubleshooting in Operational IP-TV System,' IEEE Transactions on Broadcasting, Vol.53, No.3, pp.711-718, Sep., 2007 https://doi.org/10.1109/TBC.2007.896976
  14. J. She, F. Hou, P. H. Ho, and L. L. Xie, 'IPTV over WiMAX: Key Success Factors, Challenges, and Solutions,' IEEE Communications Magazine, Vol.45, No.8, pp.87-93, Aug., 2007 https://doi.org/10.1109/MCOM.2007.4290319
  15. A. Ganjam and H. Zhang, 'Internet Multicast Video Delivery,' Proceedings of the IEEE, Vol.93, No.1, pp.159-170, Jan., 2005 https://doi.org/10.1109/JPROC.2004.839602
  16. Y. L. Sun and K. J. R. Liu, 'Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes,' IEEE Transactions on Information Forensics and Security, Vol.2, No.2, pp.213-226, Jun., 2007 https://doi.org/10.1109/TIFS.2007.897274
  17. Y. Li and J. Z. Wang, 'Cost analysis and optimization for IP multicast group management,' Computer Communications, Vol.30, No.8, pp.1721-1730, Jun., 2007 https://doi.org/10.1016/j.comcom.2007.02.002
  18. R. Gau, 'Performance Analysis of Multicast Key Backbone for Secure Group Communications,' IEEE Communications Letters, Vol.10, No.7, pp.555-557, Jul., 2006 https://doi.org/10.1109/LCOM.2006.224418
  19. Z. Zhang and Y. Yang, 'Performance Analysis of k-Fold Multicast Networks,' IEEE Transactions on Communications, Vol.53, No.2, pp.308-314, Feb., 2005 https://doi.org/10.1109/TCOMM.2004.841983
  20. Y. Sun, W. Trappe, and K. J. R. Liu, 'A Scalable Multicast Key Management Scheme for Heterogeneous Wireless Networks,' IEEE/ACM Transactions on Networking, Vol.12, No.4, pp.653-666, Aug., 2004 https://doi.org/10.1109/TNET.2004.833129
  21. S. Alouf, E. Altman, C. Barakat, and P. Nain, 'Optimal Estimation of Multicast Membership,' IEEE Transactions on Signal Processing, Vol.51, No.8, pp.2165-2176, Aug., 2003 https://doi.org/10.1109/TSP.2003.814461
  22. K. P. Wu, S. J. Ruan, F. Lai, and C. K. Tseng, 'On Key Distribution in Secure Multicasting,' Proc. 25th Annual IEEE Conf. on Local Computer Networks, Florida, USA, pp.208-212, Nov., 2000
  23. RSA Laboratories, available at http://www.rsa.com/rsalabs/node.asp?id=2964