Abstract
As a component of mobile communication, the pay-TV system has attracted a lot of attention. By using mobile devices, users interact with the head end system in service providers to acquire TV services. With the growth of mobile users, how to protect the privacy of users while improving efficiency of the network has become an issue worthy of attention. Anonymous authentication schemes for mobile pay-TV systems came into being. In this paper, we analyze the shortcomings of the existing authentication protocol and then propose an improved one, which is secure against stored set attack and user traceability attack. The proposed scheme is proved to be secure. Moreover, our new scheme performs better in efficiency and storage, compared with several other schemes.
Highlights
With the rapid development of wireless communication technology, pay-TV systems have attracted a lot of attention as a component of mobile communication
There is still room for improvement in storage (ii) We propose a new efficient anonymous authentication scheme based on Far and Alagheband’s protocol (iii) The proposed anonymous authentication scheme in the paper performs better in computing efficiency and storage, which is more suitable for resourceconstrained devices in edge computing environment
The security of pay-TV systems is facing the challenge of explosive growth of users and service content
Summary
With the rapid development of wireless communication technology, pay-TV systems have attracted a lot of attention as a component of mobile communication. The pay-TV systems can meet the personalized needs of users. These changes have prompted the emergence of many communication systems for mobile TV services [2, 3]. The pay-TV system generally uses a conditional access system (CAS) to handle interactions between end users and service providers. Encryption and authentication play significant roles in CAS for mobile pay-TV systems. Data generated by the terminal TV devices usually involves personal privacy information Uploading these data to the cloud data center consumes a lot of bandwidth resources and increases the risk of user privacy leakage [6, 7].
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.