Efficient and Secure Key Management for Conditional Access Systems

2020 ◽  
Vol 66 (1) ◽  
pp. 1-10 ◽  
Author(s):  
Om Pal ◽  
Bashir Alam
Author(s):  
Gregory L. Harding ◽  
Anne V. D. M. Kayem

Conditional Access (CA) is typically used by pay-television operators to restrict access to content to authorized subscribers. While several commercial CA solutions exist for structured broadcasting, Internet-based television, and video-on-demand services, these solutions are mostly proprietary. Use of proprietary solutions incurs royalty payments and increased cost of components for Set-Top-Box manufacturers. In many developing countries Set-Top-Boxes for the migration to Digital Television will be subsidized by government. An efficient, flexible, and open conditional system that does not incur royalties or require specialised security hardware would be beneficial for these countries. In this chapter, the authors explore conditional access solutions that draw on the area of cryptographic key management and distribution for IPTV environments. They wrap up with propositions on how an open Cryptographic Access Control (CAC) system can be implemented practically by pay-television operators who have to handle a large number of subscriptions.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


Author(s):  
Vairaprakash Gurusamy ◽  
◽  
S. Kannan ◽  
T. Maria Mahajan ◽  
◽  
...  

2013 ◽  
Vol 2 (2) ◽  
pp. 23-31
Author(s):  
Sufyan T. Faraj Al-janabi ◽  
Ali J. Dawood ◽  
Ekram H. Hassan

Sign in / Sign up

Export Citation Format

Share Document