OMA DRM-Based Key Management Protocol for IPTV

2015 ◽  
Vol 733 ◽  
pp. 815-820 ◽  
Author(s):  
Hao Li ◽  
Cheng Yang ◽  
Jia Yin Tian

Nowadays, with the development of hardware platform, digital content can be presented in more varieties of forms. The authorized users not only watch the authorized TV programs, but also are willing to do it via mobile phones and I-pad. Although the contemporary OMA DRM system provides an approach named domains to adapt multi-screens and services about the authorization of offline digital content, standard PKI procedures used to authenticate the DRM Agent, with the calculation and power consumption relatively larger, are not beneficial for the mobile terminal. Meanwhile, as the public key distribution is complex and the authorization is difficult, it is also not helpful for applied environment of multi-screens. Based on the authentication of hardware devices, the uniqueness of hardware ID also cannot meet the actual demand of multi-screen user. In this paper, we will propose a new protocol of key distribution based on OMA DRM. The protocol meets the requirements of low power consumption and multiple-screen, while providing the feasible security.

Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5838
Author(s):  
Shimaa A. Abdel Hakeem ◽  
Sherine M. Abd El-Kader ◽  
HyungWon Kim

Recently, many Low Power Wide Area Network (LPWAN) protocols have been proposed for securing resource-constrained Internet of Things (IoT) devices with negligible power consumption. The Long Range Wide Area Network (LoRaWAN) is a low power communication protocol that supports message authentication, integrity, and encryption using two-session preshared secret keys. However, although the LoRaWAN supports some security functions, it suffers from session key generation and key update problems. This motivates us to introduce a new key management protocol that resolves the LoRaWAN problems and supports key updates. The proposed protocol is based on hash chain generation using a one-way hash function. Network entities share a common hash chain of n key elements to allow using a unique signing key per message. We also propose a salt hashing algorithm that encrypts the original keys into a different form to avoid the physical attacks at the end device side. We analyzed the proposed key generation performance in terms of the computation time, the required storage, and the communication overhead. We implemented and tested the proposed key generation protocol using the NS-3 network simulator. The proposed lightweight key generation protocol significantly enhances the security of the original LoRaWAN at a negligible overhead. The proposed protocol reduces the power consumption and transmission time by two times compared with some previous protocols. In addition, the proposed key generation protocol can resist attacks, such as key compromising attacks and replay attacks, and it supports the Perfect Forward Secrecy, which was not supported by LoRaWAN.


2016 ◽  
Vol 16 (19) ◽  
pp. 7217-7226 ◽  
Author(s):  
Harith Fakhrey ◽  
Rajesh Tiwari ◽  
Martin Johnston ◽  
Yasir Ahmed Al-Mathehaji

Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 3930 ◽  
Author(s):  
Haowen Tan ◽  
Ilyong Chung

The wireless body area network (WBAN) is considered as one of the emerging wireless techniques in the healthcare system. Typical WBAN sensors, especially implantable sensors, have limited power capability, which restricts their wide applications in the medical environment. In addition, it is necessary for the healthcare center (HC) to broadcast significant notifications to different patient groups. Considering the above issues, in this paper, the novel practical WBAN system model with group message broadcasting is built. Subsequently, a secure and efficient group key management protocol with cooperative sensor association is proposed. In the proposed protocol, the Chinese remainder theorem (CRT) is employed for group key management between HC and the personal controller (PC), which also supports batch key updating. The proposed sensor association scheme is motivated by coded cooperative data exchange (CCDE). The formal security proofs are presented, indicating that the proposed protocol can achieve the desired security properties. Moreover, performance analysis demonstrates that the proposed protocol is efficient compared with state-of-the-art group key management protocols.


Sign in / Sign up

Export Citation Format

Share Document