+ All Categories
Home > Technology > NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

Date post: 28-Jan-2018
Category:
Upload: chun-kai-wang
View: 36 times
Download: 0 times
Share this document with a friend
56
基於近場通訊技術且適用於 IPTV 個人化服務之使用者身分鑑別機制 NFC-based User Authentication Mechanisms for Personalized IPTV Services Student : Chun-Kai Wang (王雋凱) Advisor : Dr. Nai-Wei Lo (羅乃維 博士) 2015/06/29
Transcript
Page 1: NFC-based User Authentication Mechanisms for Personalized IPTV Services

基於近場通訊技術且適用於 IPTV

個人化服務之使用者身分鑑別機制

NFC-based User Authentication Mechanisms

for Personalized IPTV Services

Student : Chun-Kai Wang (王雋凱)

Advisor : Dr. Nai-Wei Lo (羅乃維博士) 2015/06/29

Page 2: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

▪ Introduction

▪ Related Work

▪ Proposed Mechanisms

▪ Security and Performance Analysis

▪ Discussion and Comparison

▪ Conclusion

2

Outline

Page 3: NFC-based User Authentication Mechanisms for Personalized IPTV Services

`Introduction

Page 4: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Introduction

▪ IPTV (Internet Protocol Television)

▪ Combined with modern technologies to deliver high-quality

television content and rich services through IP networks

▪ Features of IPTV

▪ Support for interactive TV

▪ Time shifting

▪ Personalization

▪ Low bandwidth requirements

▪ Accessible on multiple devices

4

Background (1/2)

Page 5: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Introduction

▪ STB (Set-top Box)

▪ A device at the customer side

▪ Connects an ordinary TV to the external network

▪ Converts the received signal display on the TV screen

5

Background (2/2)

Page 6: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Introduction

▪ Existing IPTV authentication based on STB-level

▪ STB contains a unique hardware identifier registered by service

provider

▪ STB-level authentication leads to whole family members get the

same access level to IPTV services

▪ Family Services ≠ Personalized Services

▪ IPTV service provider cannot identify who is actually watching a

certain program

▪ Inconsistent with IPTV's main intention to provide personalized

services

6

Motivation

Page 7: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Introduction

▪ To survey studies on identification for TV viewer

▪ To design a user authentication mechanism for

personalized IPTV services

▪ To develop a proof-of-concept implementation

▪ To analyze security and performance of the proposed

mechanism

▪ To evaluate the system by comparing with existing

solutions

7

Objectives

Page 8: NFC-based User Authentication Mechanisms for Personalized IPTV Services

`Related Work

Page 9: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Related Work

▪ Previous works can be classified into five types:

9

Viewer Identification Systems

Type Object of Identification

Password-based [26] ID, Password

Biometrics-based [8] [27] [38] Face-recognition

RFID-based [34] [39] RFID Tag

USIM-based [36] Subscriber Identification Module

Bluetooth-based [10] Bluetooth Device MAC Address

Page 10: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Related Work

▪ Short range and wireless technology based on RFID

▪ NFC devices: NFC Reader, NFC Tag, NFC Phone

▪ NFC operation modes:

10

Near Field Communication (NFC)

Operation Mode Initiator Device Target Device

Reader / Writer NFC Phone NFC Tag

Peer-to-Peer NFC Phone NFC Phone

Card Emulation NFC Reader NFC Phone

Page 11: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Related Work

▪ Conventional card emulation requires Secure Element (SE)

embedded in NFC mobile

▪ HCE allows NFC mobile can emulate a contactless smart card

using only software

11

Host Card Emulation (HCE)

SE-based card emulation HCE-based card emulation

Page 12: NFC-based User Authentication Mechanisms for Personalized IPTV Services

`Proposed Mechanisms

Page 13: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

13

Overview (1/2)

The proposed personalized IPTV service architecture

Proposed Mechanisms

Page 14: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Proposed Mechanisms

▪ The proposed mechanisms have two authentication

schemes:

▪ HMAC-based Authentication Scheme

▪ Digital Signature-based Authentication Scheme

▪ Both schemes comprise three phases:

▪ Registration Phase

▪ To register a user becoming an IPTV service subscriber

▪ Authentication Phase

▪ To authenticate a IPTV service subscriber

▪ Key Update Phase

▪ To update the secret key of an IPTV service subscriber

14

Overview (2/2)

Page 15: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Proposed Mechanisms

Notation Description

The IPTV services provider

The user , who is an IPTV subscriber

The personal computer of the user

The NFC-enabled mobile phone owned by the user

The set-top box , which equipped with NFC reader

The Application Server of

The HCE-enabled mobile app, which is developed by

The email address of the user

The password chosen by the user

The personal information of the user

The cell phone number of the user

The unique identifier of entity

The secret key, only known to entity and

The public key of entity

15

Notations (1/2)

Page 16: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Proposed Mechanisms

Notation Description

The security (private) key of entity

The X.509 certificate of entity

A random number is generated by entity

The n th nonce value is generated by entity

The n th timestamp is generated by entity

The maximum allowed time interval for transmission delay

Check the message is valid

The message is encrypted by the public key of entity

The message is decrypted by the secret (private) key of entity

The message is signed by the secret (private) key of entity

The message is verified by the public key of entity

A keyed-hash message authentication code of message using security key

Entity send the message to entity

A concatenation operator

16

Notations (2/2)

Page 17: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

Registration Phase

17

HMAC-based Auth. Scheme Digital-signature-based Auth. Scheme

Proposed Mechanisms

Page 18: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

Authentication Phase

18

HMAC-based Auth. Scheme Digital-signature-based Auth. Scheme

Proposed Mechanisms

Page 19: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

19

Proposed Mechanisms

pp.21 pp.32

HMAC-based Auth. Scheme Digital-signature-based Auth. Scheme

Page 20: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

Key Update Phase

20

HMAC-based Auth. Scheme Digital-signature-based Auth. Scheme

Proposed Mechanisms

Page 21: NFC-based User Authentication Mechanisms for Personalized IPTV Services

`Security and Performance

Analysis

Page 22: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

22

Trust Boundary

Trust boundary and the communication channels

Page 23: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

▪ The data received during the registration phase are all correct.

▪ The trusted NFC phone is equipped with secure storage

▪ The NFC channel is insecure

▪ The STB and NFC reader in an open environment, any IPTV

subscriber can use his/her NFC phone to get authenticated

▪ The Internet channel protected by SSL/TLS

▪ The trusted Application Server connects to the database is secure

23

Assumptions

Page 24: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

▪ Providing Mutual Authentication

▪ Impersonation Attack resistance

▪ Server Spoofing Attack resistance

▪ Replay Attack resistance

▪ Man-in-the-Middle Attack resistance

24

Security Analysis

Page 25: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

▪ HMAC-based Authentication Scheme

▪ 𝐴𝑆𝑆𝑃 gets authenticated by 𝑈𝑖 if it can correctly compute HMAC

value by using secret key 𝐾𝑖,𝑆𝑃

▪ 𝑈𝑖 gets authenticated by 𝐴𝑆𝑆𝑃 if it can correctly compute HMAC

value by using secret key 𝐾𝑖,𝑆𝑃

▪ Digital Signature-based Authentication Scheme

▪ 𝐴𝑆𝑆𝑃 gets authenticated by 𝑈𝑖 if it can correctly verify the

signature by using public key 𝑃𝐾𝑆𝑃

▪ 𝑈𝑖 gets authenticated by 𝐴𝑆𝑆𝑃 if it can correctly verify the

signature by using public key 𝑃𝐾𝑖

▪ Impersonation & Server Spoofing Attack Resistance

25

Mutual Authentication

Page 26: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

▪ Fresh nonce-embedded message

▪ The nonce is a random value that used only once

and not repeated

▪ 𝐴𝑆𝑆𝑃 can detect the message is a replay attack

because the scheme uses nonce, if a nonce is found

inconsistencies, 𝐴𝑆𝑆𝑃 will reject the request

26

Replay Attack

Page 27: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

▪ STB-to-AS connection is based on SSL/TLS

▪ MITM attack is practically infeasible on NFC channel

27

Man-in-the-Middle Attack

Page 28: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

▪ The prototype system consist of three components:

▪ Application Server (AS)

▪ provides a platform let user register service and apply for key update

▪ Set-top Box (STB)

▪ connected with an NFC reader via USB interface

▪ has an NFC application that can communicate with the HCE-enabled

app installed on the NFC Phone

▪ transfers authenticated messages to the AS for performing

authentication

▪ NFC-enabled Mobile Phone (NFC Phone)

▪ installed an HCE-enabled app that can react to APDU commands

from the NFC reader.

28

Prototype Implementation

Page 29: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

▪ Application Server Specifications

29

Experimental Platform (1/3)

Application Server

CPU Intel Core i3-3120M

Memory 4GB DDR3 SO-DIMM

Operating

SystemGNU/Linux Ubuntu 14.04.2 LTS

Port TCP/IP

Page 30: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

▪ Set-top Box Specifications

▪ ACR122U USB NFC Reader

30

Experimental Platform (2/3)

Raspberry Pi Model B+

CPU700 MHz Low Power ARM1176JZFS

Applications Processor

GPU Dual Core VideoCore IV

Memory 512MB SDRAM

Operating

SystemEmbedded Linux (Raspbian)

Interface Ethernet, USB, HDMI

Page 31: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

▪ NFC-enabled Mobile Phone Specifications

▪ Android OS version 4.4 or above supports HCE

31

Experimental Platform (3/3)

Samsung Galaxy Note II

CPU 1.6 GHz Quad-Core Cortex-A9

Memory 2GB RAM

Operating

SystemAndroid 4.4.2 (KitKat)

ConnectivityHSPA+, LTE, NFC, Wi-Fi, DLNA, Wi-Fi Direct,

Bluetooth 4.0

Page 32: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

32

Prototype System (1/3)

Page 33: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

33

Prototype System (2/3)

Page 34: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

34

Prototype System (3/3)

NFC Reader

Set-top Box

NFC Phone

TV Screen

Page 35: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

35

Demo

Page 36: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

▪ HMAC-based Authentication Scheme

36

Performance Test (1/4)

HMAC-based

Authentication Scheme

Key Size

(bits)

Authentication Session Time (ms)

MIN MAX AVG STDEV

HMAC-MD5

Implementation

80 1088 1243 1151.68 37.72

112 1079 1245 1154.31 42.69

128 1099 1277 1157.93 45.16

192 1081 1258 1144.78 35.77

256 1085 1247 1154.76 40.80

HMAC-SHA1

Implementation

80 1115 1280 1169.02 41.95

112 1093 1270 1156.12 39.10

128 1110 1276 1165.03 41.14

192 1105 1279 1161.14 43.03

256 1107 1275 1176.99 44.29

Page 37: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

HMAC-based

Authentication Scheme

Key Size

(bits)

Authentication Session Time (ms)

MIN MAX AVG STDEV

HMAC-SHA256

Implementation

80 1120 1295 1181.13 34.80

112 1124 1312 1185.57 42.26

128 1138 1323 1206.81 51.74

192 1119 1330 1192.44 46.86

256 1136 1337 1217.65 62.38

HMAC-SHA384

Implementation

80 1173 1365 1247.53 52.04

112 1174 1367 1228.90 49.82

128 1161 1371 1244.92 54.27

192 1171 1360 1229.44 46.65

256 1178 1358 1241.01 51.64

HMAC-SHA512

Implementation

80 1198 1368 1270.54 43.88

112 1201 1382 1274.98 43.24

128 1221 1384 1280.84 43.30

192 1202 1366 1275.36 41.07

256 1219 1386 1279.97 45.44

37

Performance Test (2/4)

Page 38: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

▪ Digital Signature-based Authentication Scheme

38

Performance Test (3/4)

Digital Signature-based

Authentication Scheme

Key Size

(bits)

Authentication Session Time (ms)

MIN MAX AVG STDEV

DSA-SHA1

Implementation

1024 1372 1509 1443.27 33.50

2048 1478 1632 1561.54 36.47

3072 1954 2120 2038.29 39.28

DSA-SHA256

Implementation

1024 1379 1505 1448.07 29.69

2048 1503 1636 1568.67 33.44

3072 2008 2130 2073.13 29.55

DSA-SHA384

Implementation

1024 1386 1517 1453.33 33.58

2048 1507 1639 1569.62 35.70

3072 2020 2189 2103.23 44.20

DSA-SHA512

Implementation

1024 1389 1530 1453.39 36.39

2048 1524 1641 1576.72 32.52

3072 2032 2178 2107.98 38.38

Page 39: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

Digital Signature-based

Authentication Scheme

Key Size

(bits)

Authentication Session Time (ms)

MIN MAX AVG STDEV

ECDSA-SHA1

Implementation

160 1228 1371 1289.26 36.21

224 1268 1393 1335.25 26.39

256 1369 1469 1414.48 23.63

ECDSA-SHA256

Implementation

160 1227 1383 1281.03 37.30

224 1278 1387 1331.28 27.57

256 1358 1472 1410.27 22.98

ECDSA-SHA384

Implementation

160 1228 1368 1281.39 37.30

224 1279 1391 1331.86 23.19

256 1366 1463 1405.64 19.31

ECDSA-SHA512

Implementation

160 1229 1395 1285.96 32.29

224 1268 1364 1318.91 19.79

256 1374 1470 1411.78 21.05

39

Performance Test (4/4)

Page 40: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

40

Performance Comparison

Performance comparison of the algorithms used in the proposed schemes

Page 41: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis

▪ HMAC-based authentication scheme is better than Digital

Signature-based authentication scheme in terms of processing

speed

▪ Selected algorithm is the main factor that effects performance of

the HMAC-based authentication scheme

▪ The key size is the main factor that effects performance of the

Digital Signature-based authentication scheme

▪ Digital Signature-based scheme may be better choice at the

security strength in better than HMAC-based scheme. While the

session time of both scheme is equivalent.

41

Performance Analysis

Page 42: NFC-based User Authentication Mechanisms for Personalized IPTV Services

`Discussion and

Comparison

Page 43: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

▪ NFC for User-friendly Operation

▪ Users do not need background knowledge about the technology

▪ Use simply by touching two NFC devices together

▪ Non-password Authentication

▪ Not require to remember password

▪ Resist password guessing attacks

43

Usability

Discussion and Comparison

Page 44: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

▪ NFC-enabled STB has been developed

▪ More easily integrate the proposed mechanisms

▪ HCE support could reach 85% of smartphones

▪ New released smartphones are all NFC-ready

▪ Not a barrier for near future

44

Deployability

Discussion and Comparison

Smartphone shipments per OS platform Q2 2014

Page 45: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

▪ Mobile IPTV Services

▪ Live Stream TV

▪ Customers can enjoy Live TV broadcasting anywhere just with

a smartphone or tablet if they have an Internet connection

▪ Personalized EPG (Electronic Program Guide)

▪ A program guide offers a user friendly environment

▪ STB Remote Control

▪ Easy to control the STB directly from smartphone same as

using the classic RC

45

Service Scalability (1/2)

Discussion and Comparison

Page 46: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

▪ Agent Tags

▪ Can have a temporary authority that authorized by an

authenticated user, to execute authentication

▪ Typical reader/writer mode of NFC operations

46

Service Scalability (1/2)

Tag IDRemaining

Count

Remaining

Time

Accepted

Channel

Accepted

Device

00000001 10 - CH-10 TV

00000002 - 24 Hour - Tablet

00000003 30 7 Day - -

00000004 - - CH-2 PC

00000005 5 30 Min CH-5 -

Discussion and Comparison

Page 47: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

▪ HMAC-based vs. Digital Signature-based

47

Comparison of Two Proposed Schemes

HMAC-based

Authentication Scheme

Digital Signature

Authentication Scheme

Cryptosystem Symmetric Cryptosystem Asymmetric Cryptosystem

Integrity Yes Yes

AuthenticationYes

(not for third-party)

Yes

(support for third-party)

Key Size

(with equivalent security level)Shorter Longer

Computation Cost Lower Higher

Storage Cost Lower Higher

Additional Infrastructure NoneCertificate Authority

(optional)

Discussion and Comparison

Page 48: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

48

Certificate Authority

Page 49: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

Password-based Biometrics-based RFID-based

Identification unit A user A user A user

Authentication factor What you know What you are What you have

Object of identification Username, Password Face-recognition RFID tag

Authentication certifier STB STBSTB, IPTV

Authentication Server

Additional H/W device None Video cameraRFID reader in STB

and RFID tag

49

Comparison with Existing Solutions

USIM-based Bluetooth-based Proposed System

Identification unit A user A user A user

Authentication factorWhat you have,

What you know

What you have,

What you know

What you have,

What you know

Object of identificationSubscriber

identification module

Bluetooth device MAC

addressHMAC/Signature

Authentication certifier

3G network,

IPTV Service

Provider

Bluetooth STBSTB, IPTV Application

Server

Additional H/W device 3G mobile equipment

Bluetooth module in

STB and Bluetooth

phone

NFC reader in STB

and NFC phone

Discussion and Comparison

Page 50: NFC-based User Authentication Mechanisms for Personalized IPTV Services

`Conclusion

Page 51: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

▪ NFC-based user authentication mechanisms using HCE

and two authentication schemes are proposed

▪ HMAC-based authentication scheme has lightweight

operations and higher performance

▪ Digital Signature-based authentication scheme is

suitable to design open IPTV services

▪ The proposed mechanisms are suitable for personalized

IPTV services and can be easily deployed onto current

IPTV systems

51

Conclusion

Conclusion

Page 52: NFC-based User Authentication Mechanisms for Personalized IPTV Services

`Thank You

Page 53: NFC-based User Authentication Mechanisms for Personalized IPTV Services

`Q & A

Page 54: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

1. S. C. Kim, S. S. Yeo, and S. K. Kim, “A Hybrid User Authentication Protocol for Mobile IPTV Service,” Multimedia tools and

applications, vol. 65, no. 2, pp. 283–296, May 2011.

2. R. Want, “An introduction to RFID technology,” IEEE Pervasive Computing, vol. 5, no. 1, pp. 25–33, Jan. 2006.

3. J. H. Cho, J. Kim, J. W. Kim, K. Lee, K. D. Aim, and S. Kim, “An NFC Transceiver with RF-powered RFID Transponder Mode,”

in Solid-State Circuits Conference, 2007. ASSCC ’07. IEEE Asian, 2007, pp. 172–175.

4. C. Bisdikian, “An Overview of the Bluetooth Wireless Technology,” IEEE Communications Magazine, vol. 39, no. 12, pp. 86–94,

Dec. 2001.

5. R. Bambini, P. Cremonesi, and R. Turrin, “A Recommender System for an IPTV Service Provider: a Real Large-Scale Production

Environment,” in Recommender Systems Handbook, F. Ricci, L. Rokach, B. Shapira, and P. B. Kantor, Eds. Springer US, 2011,

pp. 299–331.

6. V. Coskun, B. Ozdenizci, and K. Ok, “A Survey on Near Field Communication (NFC) Technology,” Wireless Pers Commun, vol.

71, no. 3, pp. 2259–2294, Dec. 2012.

7. H. Lee, W. C. Hong, C. H. Kao, and C. M. Cheng, “A User-Friendly Authentication Solution Using NFC Card Emulation on

Android,” in 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA), 2014, pp. 271–

278.

8. H. L. Wang, J. G. Wang, and W. Y. Yau, “Automated Age Regression for Personalized IPTV Services,” in 2010 IEEE

International Conference on Multimedia and Expo (ICME), 2010, pp. 1333–1336.

9. I. Krevatin, “Biometric Recognition in Telecom Environment,” in 2010 14th International Conference on Intelligence in Next

Generation Networks (ICIN), 2010, pp. 1–6.

10. A. G. Foina, J. Ramirez-Fernandez, and R. M. Badia, “Cell BE and Bluetooth applied to Digital TV,” in 2010 IEEE Network

Operations and Management Symposium (NOMS), 2010, pp. 825–828.

11. R. Jana, Y. F. Chen, D. C. Gibbon, Y. Huang, S. Jora, J. Murray, and B. Wei, “Clicker - An IPTV Remote Control in Your Cell

Phone,” in 2007 IEEE International Conference on Multimedia and Expo, 2007, pp. 1055–1058.

12. P. Urien, “Cloud of Secure Elements: An Infrastructure for the Trust of Mobile NFC Services,” in 2014 IEEE 10th International

Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2014, pp. 213–218.

54

References

Page 55: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

13. K. H. Lin, D. H. Shiue, Y. S. Chiu, W. H. Tsai, F. J. Jang, and J. S. Chen, “Design and Implementation of Face Recognition-aided IPTV

Adaptive Group Recommendation System Based on NLMS Algorithm,” in 2012 International Symposium on Communications and

Information Technologies (ISCIT), 2012, pp. 626–631.

14. J. Lyu, S. Pyo, J. Lim, M. Kim, S. Lim, and S. Kim, “Design of Open APIs for Personalized IPTV Service,” in The 9th International

Conference on Advanced Communication Technology, 2007, vol. 1, pp. 305–310.

15. M. Alattar and M. Achemlal, “Host-Based Card Emulation: Development, Security, and Ecosystem Impact Analysis,” in 2014 IEEE Intl

Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE

11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 2014, pp. 506–509.

16. K. Chang, J. Hightower, and B. Kveton, “Inferring Identity Using Accelerometers in Television Remote Controls,” in Pervasive Computing,

2009, pp. 151–167.

17. S. Zeadally, H. Moustafa, and F. Siddiqui, “Internet Protocol Television (IPTV): Architecture, Trends, and Challenges,” IEEE Systems

Journal, vol. 5, no. 4, pp. 518–527, Dec. 2011.

18. Z. Liu, B. Wei, and H. Yu, “IPTV, Towards Seamless Infotainment,” in 6th IEEE Consumer Communications and Networking Conference,

2009. CCNC 2009, 2009, pp. 1–5.

19. M. Bellare, R. Canetti, and H. Krawczyk, “Keying Hash Functions for Message Authentication,” in Advances in Cryptology —

CRYPTO ’96, 1996, pp. 1–15.

20. S. Park and S.-H. Jeong, “Mobile IPTV: Approaches, Challenges, Standards, and QoS Support,” IEEE Internet Computing, vol. 13, no. 3,

pp. 23–31, May 2009.

21. R. Want, “Near Field Communication,” IEEE Pervasive Computing, vol. 10, no. 3, pp. 4–7, Jul. 2011.

22. N. Saparkhojayev, A. Dauitbayeva, A. Nurtayev, and G. Baimenshina, “NFC-enabled Access Control and Management System,” in 2014

International Conference on Web and Open Access to Learning (ICWOAL), 2014, pp. 1–4.

23. A. Andersen, R. Karlsen, and A. Munch-Ellingsen, “NFC Provided User Friendliness for Technologically Advanced Services,” in Human

Interface and the Management of Information. Information and Interaction for Health, Safety, Mobility and Complex Environments, 2013,

pp. 337–346.

24. S. Shirali-Shahreza, H. Sameti, and M. Shirali-Shahreza, “Parental Control Based on Speaker Class Verification,” IEEE Transactions on

Consumer Electronics, vol. 54, no. 3, pp. 1244–1251, Aug. 2008.

25. R. Morris and K. Thompson, “Password Security: A Case History,” Commun. ACM, vol. 22, no. 11, pp. 594–597, Nov. 1979.

55

References

Page 56: NFC-based User Authentication Mechanisms for Personalized IPTV Services

NFC-based User Authentication Mechanisms for Personalized IPTV Services

26. J. H. Choi, J. Jeok, S. Y. Lim, H. C. Kim, H. K. Lee, and J. W. Hong, “Personalized Data Broadcasting Service based on TV-Anytime

metadata,” in IEEE International Symposium on Consumer Electronics, 2007. ISCE 2007, 2007, pp. 1–6.

27. M. C. Hwang, L. T. Ha, N. H. Kim, C. S. Park, and S. J. Ko, “Person Identification System for Future Digital TV with Intelligence,” IEEE

Transactions on Consumer Electronics, vol. 53, no. 1, pp. 218–226, Feb. 2007.

28. M. Reveilhac and M. Pasquet, “Promising Secure Element Alternatives for NFC Technology,” in First International Workshop on Near

Field Communication, 2009. NFC ’09, 2009, pp. 75–80.

29. T. Jiang, Y. Hou, and S. Zheng, “Secure Communication between Set-top Box and Smart Card in DTV Broadcasting,” IEEE Transactions

on Consumer Electronics, vol. 50, no. 3, pp. 882–886, Aug. 2004.

30. S. K. Panigrahy, S. K. Jena, and A. K. Turuk, “Security in Bluetooth, RFID and Wireless Sensor Networks,” in Proceedings of the 2011

International Conference on Communication, Computing & Security, pp. 628–633.

31. E. Haselsteiner and K. Breitfuß, “Security in Near Field Communication (NFC),” in Workshop on RFID security, 2006, pp. 12–14.

32. S. H. Lee, M. K. Sohn, D. J. Kim, B. Kim, and H. Kim, “Smart TV Interaction System Using Face and Hand Gesture Recognition,” in 2013

IEEE International Conference on Consumer Electronics (ICCE), 2013, pp. 173–174.

33. B. Veselinovska, M. Gusev, and T. Janevski, “State of the Art in IPTV,” in 2014 37th International Convention on Information and

Communication Technology, Electronics and Microelectronics (MIPRO), 2014, pp. 479–484.

34. R. van Brandenburg, H. van den Berg, M. O. van Deventer, and I. M. Schenk, “Towards Multi-user Personalized TV Services,

Introducing Combined RFID Digest Authentication,” Graduate Thesis TNO+ University Twente, vol. 10, 2009.

35. A. Munch-Ellingsen, R. Karlsen, A. Andersen, and S. Akselsen, “Two-factor Authentication for Android Host Card Emulated Contactless

Cards,” in 2015 First Conference on Mobile and Secure Services (MOBISECSERV), 2015, pp. 1–6.

36. Y.-K. Park, S.-H. Lim, O. Yi, S. Lee, and S.H. Kim, “User Authentication Mechanism Using Java Card for Personalized IPTV Services,”

in International Conference on Convergence and Hybrid Information Technology, 2008. ICHIT ’08, 2008, pp. 618–626.

37. T. Silva, J. F. de Abreu, O. Pacheco, and P. Almeida, “User Identification: A Key Factor for Elderly Viewers to Benefit from Interactive

Television Services,” in ENTERprise Information Systems, M. M. Cruz-Cunha, J. Varajão, P. Powell, and R. Martinho, Eds. Springer

Berlin Heidelberg, 2011, pp. 40–48.

38. T. Mlakar, J. Zaletelj, and J. F. Tasic, “Viewer Authentication for Personalized iTV Services,” in Eighth International Workshop on Image

Analysis for Multimedia Interactive Services, 2007. WIAMIS ’07, 2007, pp. 63–63.

39. H. Jabbar, T. Jeong, J. Hwang, and G. Park, “Viewer Identification and Authentication in IPTV using RFID Technique,” IEEE

Transactions on Consumer Electronics, vol. 54, no. 1, pp. 105–109, Feb. 2008.

56

References


Recommended