透過您的圖書館登入
IP:3.138.175.180
  • 學位論文

A Research on Access Protection for Mobile Pay-TV Systems

行動付費電視系統之存取安全之研究

指導教授 : 孫宏民

摘要


由於近年數位廣播與無線通訊之整合匯流發展,行動付費電視服務越來越被重視。然而,行動付費電視卻很容易受蓄意攻擊而不安全。若要提供一個安全的行動付費電視服務,存取安全(Access Protection)機制扮演極為重要角色。因此,確保被授權使用者之存取安全是非常重要的工作。在具備完善存取安全管理的行動付費電視系統中,有授權的使用者才能存取 (Access) 及解密其內容。隨著異質網路整合,若要在公用網路中提供安全的視訊服務,視訊加密 (Video Encryption)是非常重要一環。因此,若要提供一個完善的存取安全機制, 存取控制 (Access Control) 及視訊加密是非常重要之議題。然而,由於行動付費電視的廣播頻寬是非常珍貴資源及行動裝置之資源是低階有限的,兼具廣播效益及低計算成本的存取安全是非常重要的。 在此論文中,我們主要探討行動付費電視之存取安全;尤其是探討其存取控制之身份認證 (Authentication) 方法,及選擇式視訊加密 (Selective Video Encryption) 方法。 在存取控制方面,我們提出一個非常有效率的行動付費電視之身份認證方法。基本上,行動付費電視中為了提供交互身份認證,大量的認證訊息會在此系統中流通。因此,一個既安全又有效率的存取控制之身份認證機制是不可或缺的。傳統身份認證是一對一 (One-to-One) 的方法。此一對一方法的作法是一個存取需求 (Access Request) 需一個廣播認證訊息,使得造成大量訊息在廣播網路上傳送而沒有效率且成本高。由於行動付費電視屬無線廣播,它在遞換 (Hand-off) 時容易受攻擊而不安全。若要提供安全的行動付費電視服務,遞換認證 (Hand-off Authentication)也是非常重要議題。傳統方法沒有提供遞換認證功能,也因此它在遞換時造成不安全。此論文中提出一個創新的行動付費電視之身份認證方法。此創新方法是一對多 (One-to-Many) 的方法。此創新之一對多方法的主要作法是應用橢圓曲線密碼學來達成多個存取需求僅需一個廣播認證訊息之功能。此方法在廣播效益及低成本效益上比傳統方法更優異許多。此外,我們的方法提供遞換認證機制,使得我們的方法在遞換時可以確保服務之存取安全且避免遭受攻擊。因此,我們的方法對於存取控制可以更安全。另外,我們的方法應用身分式方法 (Identity-based Scheme) 來提供匿名認證以確保隱私。我們的方法也就具備身分式方法的優點。由於我們的方法具有上述諸多優點,我們的方法非常適合行動付費電視系統。 為了提供一個完善的存取安全,視訊加密是另一個重要的議題。正如我們所知悉,視訊服務主要藉由公用網路來作通訊與資訊交換。然而,公用網路容易受蓄意攻擊者之攻擊而不安全,於是視訊加密成為非常重要議題。傳統視訊加密方法的缺點或是沒有效益或不夠安全。此論文提出一個以內文金鑰控制 (Context-Key Control) 之選擇式及時視訊加密方法。此內文金鑰控制之加密方法主要以修改 ElGamal 加密法而得。藉由內文金鑰控制,我們的方法達成低指數 (Low Exponent) 運算且更安全。我們將此新加密方法應用到視訊餘弦係數 (DCT Coefficients) 作選擇式加密。經由我們的效能與安全分析得知,我們的方法既安全又有效益,非常適合應用於視訊安全。

並列摘要


In recent years, with the digital convergence of broadcast and wireless communication, mobile pay-TV services are getting more and more attention. However, a mobile pay-TV system is very vulnerable to malicious attacks. To provide a secure mobile pay-TV service, a secure access protection for pay-TV systems plays an important role. Therefore, to guarantee a secure access of services by authorized users, the access protection is required. In a mobile pay-TV system, under a proper access protection, only the authorized users can access and decrypt their authorized contents. With the gradual integration of heterogeneous networks, to provide secure video services in a public network, video encryption is required. To provide such an access protection, access control and video encryption are important issues. However, since the bandwidth of a broadcast channel and the resources in a mobile set are limited, both a better broadcast efficiency and low computation cost of an access protection are required. In this dissertation, an access protection for mobile pay-TV systems is explored; in that an efficient authentication for access control and an efficient selective video encryption scheme are addressed and discussed. In the access control, we propose an efficient authentication schemes for mobile pay-TV systems. In a mobile pay-TV system, a large number of messages are exchanged for mutual authentication. An efficient and secure authentication mechanism for access control is required. In traditional authentication schemes, with one-to-one delivery, one authentication message per request is delivered from a head end system to subscribers. This results in the delivery of a large quantity of messages and therefore is inefficient and costly. Due to its wireless nature, mobile pay-TV is vulnerable to attacks during hand-off. To provide a secure mobile pay-TV service, a hand-off authentication also becomes an important issue. Traditional schemes do not support hand-off authentication and therefore are insecure during hand-off. In this dissertation, we propose an innovative authentication scheme employing Elliptic Curve Cryptography, in which, by providing one-to-many facility, only one authentication message for multiple requests is broadcasted from the head end system to subscribers. This new scheme achieves better broadcast efficiency and performance on communication costs than traditional schemes. Additionally, our scheme provides a hand-off authentication mechanism to protect the access of services while preventing attacks during hand-off; therefore, the scheme is more secure to support access control. Moreover, the scheme adopts an identity-based scheme to provide anonymous authentication for protecting privacy; hence the scheme inherits advantages of the identity-based scheme. With these advantages of our scheme, it is well suitable for mobile pay-TV system. To provide a better access protection, video encryption is also an important issue. In order to provide video services, service providers and users usually interact through public communication channels. However, these public communication channels are vulnerable to attacks, and as a result, video encryption becomes an important issue. Traditional video encryptions are either inefficient or insecure. This dissertation proposes a real-time selective video encryption using context-key control. The new context-key control encryption in this scheme is modified from ElGamal encryption. Using context-key control, our scheme can perform a low exponent operation and secure encryption. We apply our encryption scheme to perform selective encryption on video DCT coefficients. In our performance and security analysis, our scheme is secure and efficient, and can be well applied to the video encryption.

參考文獻


[10]EBU technical review, A functional model of a conditional access system[EB/OL]. http:/ /www.ebu.ch/trev-266-ca.pdf, 1995.
[1]F. Allamandri, S. Campion, A. Centonza, A. Chernilov and et. al., “Service Platform for Converged Interactive Broadband Broadcast and Cellular Wireless,” IEEE Transactions on Broadcasting, Vol. 53, Issue 1, Part 2, PP. 200 - 211, Mar. 2007.
[2]K.C. Almeroth and M.H Ammar, “An alternative paradigm for scalable on-demand applications: evaluating and deploying the Interactive Multimedia Jukebox,” IEEE Transactions on Knowledge and Data Engineering, Vol. 11, Issue 4, PP. 658 – 672, July-Aug. 1999.
[3]D. Boneh and M. Franklin, “Identity-based Encryption from the Weil Pairing,” Advances in Cryptology-CRYPTO, PP. 213-239, 2001.
[4]W. J Caelli, E. P Dawson and S. A Rea, “PKI, Elliptic Curve Cryptography, and Digital Signatures,” Computers & Security, Vol. 18, No. 1, PP. 47-66, 1999.

延伸閱讀