SlideShare a Scribd company logo
1 of 56
基於近場通訊技術且適用於 IPTV
個人化服務之使用者身分鑑別機制
NFC-based User Authentication Mechanisms
for Personalized IPTV Services
Student : Chun-Kai Wang (王雋凱)
Advisor : Dr. Nai-Wei Lo (羅乃維 博士) 2015/06/29
NFC-based User Authentication Mechanisms for Personalized IPTV Services
▪ Introduction
▪ Related Work
▪ Proposed Mechanisms
▪ Security and Performance Analysis
▪ Discussion and Comparison
▪ Conclusion
2
Outline
`
Introduction
NFC-based User Authentication Mechanisms for Personalized IPTV Services Introduction
▪ IPTV (Internet Protocol Television)
▪ Combined with modern technologies to deliver high-quality
television content and rich services through IP networks
▪ Features of IPTV
▪ Support for interactive TV
▪ Time shifting
▪ Personalization
▪ Low bandwidth requirements
▪ Accessible on multiple devices
4
Background (1/2)
NFC-based User Authentication Mechanisms for Personalized IPTV Services Introduction
▪ STB (Set-top Box)
▪ A device at the customer side
▪ Connects an ordinary TV to the external network
▪ Converts the received signal display on the TV screen
5
Background (2/2)
NFC-based User Authentication Mechanisms for Personalized IPTV Services Introduction
▪ Existing IPTV authentication based on STB-level
▪ STB contains a unique hardware identifier registered by service
provider
▪ STB-level authentication leads to whole family members get the
same access level to IPTV services
▪ Family Services ≠ Personalized Services
▪ IPTV service provider cannot identify who is actually watching a
certain program
▪ Inconsistent with IPTV's main intention to provide personalized
services
6
Motivation
NFC-based User Authentication Mechanisms for Personalized IPTV Services Introduction
▪ To survey studies on identification for TV viewer
▪ To design a user authentication mechanism for
personalized IPTV services
▪ To develop a proof-of-concept implementation
▪ To analyze security and performance of the proposed
mechanism
▪ To evaluate the system by comparing with existing
solutions
7
Objectives
`
Related Work
NFC-based User Authentication Mechanisms for Personalized IPTV Services Related Work
▪ Previous works can be classified into five types:
9
Viewer Identification Systems
Type Object of Identification
Password-based [26] ID, Password
Biometrics-based [8] [27] [38] Face-recognition
RFID-based [34] [39] RFID Tag
USIM-based [36] Subscriber Identification Module
Bluetooth-based [10] Bluetooth Device MAC Address
NFC-based User Authentication Mechanisms for Personalized IPTV Services Related Work
▪ Short range and wireless technology based on RFID
▪ NFC devices: NFC Reader, NFC Tag, NFC Phone
▪ NFC operation modes:
10
Near Field Communication (NFC)
Operation Mode Initiator Device Target Device
Reader / Writer NFC Phone NFC Tag
Peer-to-Peer NFC Phone NFC Phone
Card Emulation NFC Reader NFC Phone
NFC-based User Authentication Mechanisms for Personalized IPTV Services Related Work
▪ Conventional card emulation requires Secure Element (SE)
embedded in NFC mobile
▪ HCE allows NFC mobile can emulate a contactless smart card
using only software
11
Host Card Emulation (HCE)
SE-based card emulation HCE-based card emulation
`
Proposed Mechanisms
NFC-based User Authentication Mechanisms for Personalized IPTV Services
13
Overview (1/2)
The proposed personalized IPTV service architecture
Proposed Mechanisms
NFC-based User Authentication Mechanisms for Personalized IPTV Services Proposed Mechanisms
▪ The proposed mechanisms have two authentication
schemes:
▪ HMAC-based Authentication Scheme
▪ Digital Signature-based Authentication Scheme
▪ Both schemes comprise three phases:
▪ Registration Phase
▪ To register a user becoming an IPTV service subscriber
▪ Authentication Phase
▪ To authenticate a IPTV service subscriber
▪ Key Update Phase
▪ To update the secret key of an IPTV service subscriber
14
Overview (2/2)
NFC-based User Authentication Mechanisms for Personalized IPTV Services Proposed Mechanisms
Notation Description
The IPTV services provider
The user , who is an IPTV subscriber
The personal computer of the user
The NFC-enabled mobile phone owned by the user
The set-top box , which equipped with NFC reader
The Application Server of
The HCE-enabled mobile app, which is developed by
The email address of the user
The password chosen by the user
The personal information of the user
The cell phone number of the user
The unique identifier of entity
The secret key, only known to entity and
The public key of entity
15
Notations (1/2)
NFC-based User Authentication Mechanisms for Personalized IPTV Services Proposed Mechanisms
Notation Description
The security (private) key of entity
The X.509 certificate of entity
A random number is generated by entity
The n th nonce value is generated by entity
The n th timestamp is generated by entity
The maximum allowed time interval for transmission delay
Check the message is valid
The message is encrypted by the public key of entity
The message is decrypted by the secret (private) key of entity
The message is signed by the secret (private) key of entity
The message is verified by the public key of entity
A keyed-hash message authentication code of message using security key
Entity send the message to entity
A concatenation operator
16
Notations (2/2)
NFC-based User Authentication Mechanisms for Personalized IPTV Services
Registration Phase
17
HMAC-based Auth. Scheme Digital-signature-based Auth. Scheme
Proposed Mechanisms
NFC-based User Authentication Mechanisms for Personalized IPTV Services
Authentication Phase
18
HMAC-based Auth. Scheme Digital-signature-based Auth. Scheme
Proposed Mechanisms
NFC-based User Authentication Mechanisms for Personalized IPTV Services
19
Proposed Mechanisms
pp.21 pp.32
HMAC-based Auth. Scheme Digital-signature-based Auth. Scheme
NFC-based User Authentication Mechanisms for Personalized IPTV Services
Key Update Phase
20
HMAC-based Auth. Scheme Digital-signature-based Auth. Scheme
Proposed Mechanisms
`
Security and Performance
Analysis
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
22
Trust Boundary
Trust boundary and the communication channels
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
▪ The data received during the registration phase are all correct.
▪ The trusted NFC phone is equipped with secure storage
▪ The NFC channel is insecure
▪ The STB and NFC reader in an open environment, any IPTV
subscriber can use his/her NFC phone to get authenticated
▪ The Internet channel protected by SSL/TLS
▪ The trusted Application Server connects to the database is secure
23
Assumptions
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
▪ Providing Mutual Authentication
▪ Impersonation Attack resistance
▪ Server Spoofing Attack resistance
▪ Replay Attack resistance
▪ Man-in-the-Middle Attack resistance
24
Security Analysis
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
▪ HMAC-based Authentication Scheme
▪ 𝐴𝑆𝑆𝑃 gets authenticated by 𝑈𝑖 if it can correctly compute HMAC
value by using secret key 𝐾𝑖,𝑆𝑃
▪ 𝑈𝑖 gets authenticated by 𝐴𝑆𝑆𝑃 if it can correctly compute HMAC
value by using secret key 𝐾𝑖,𝑆𝑃
▪ Digital Signature-based Authentication Scheme
▪ 𝐴𝑆𝑆𝑃 gets authenticated by 𝑈𝑖 if it can correctly verify the
signature by using public key 𝑃𝐾𝑆𝑃
▪ 𝑈𝑖 gets authenticated by 𝐴𝑆𝑆𝑃 if it can correctly verify the
signature by using public key 𝑃𝐾𝑖
▪ Impersonation & Server Spoofing Attack Resistance
25
Mutual Authentication
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
▪ Fresh nonce-embedded message
▪ The nonce is a random value that used only once
and not repeated
▪ 𝐴𝑆𝑆𝑃 can detect the message is a replay attack
because the scheme uses nonce, if a nonce is found
inconsistencies, 𝐴𝑆𝑆𝑃 will reject the request
26
Replay Attack
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
▪ STB-to-AS connection is based on SSL/TLS
▪ MITM attack is practically infeasible on NFC channel
27
Man-in-the-Middle Attack
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
▪ The prototype system consist of three components:
▪ Application Server (AS)
▪ provides a platform let user register service and apply for key update
▪ Set-top Box (STB)
▪ connected with an NFC reader via USB interface
▪ has an NFC application that can communicate with the HCE-enabled
app installed on the NFC Phone
▪ transfers authenticated messages to the AS for performing
authentication
▪ NFC-enabled Mobile Phone (NFC Phone)
▪ installed an HCE-enabled app that can react to APDU commands
from the NFC reader.
28
Prototype Implementation
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
▪ Application Server Specifications
29
Experimental Platform (1/3)
Application Server
CPU Intel Core i3-3120M
Memory 4GB DDR3 SO-DIMM
Operating
System
GNU/Linux Ubuntu 14.04.2 LTS
Port TCP/IP
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
▪ Set-top Box Specifications
▪ ACR122U USB NFC Reader
30
Experimental Platform (2/3)
Raspberry Pi Model B+
CPU
700 MHz Low Power ARM1176JZFS
Applications Processor
GPU Dual Core VideoCore IV
Memory 512MB SDRAM
Operating
System
Embedded Linux (Raspbian)
Interface Ethernet, USB, HDMI
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
▪ NFC-enabled Mobile Phone Specifications
▪ Android OS version 4.4 or above supports HCE
31
Experimental Platform (3/3)
Samsung Galaxy Note II
CPU 1.6 GHz Quad-Core Cortex-A9
Memory 2GB RAM
Operating
System
Android 4.4.2 (KitKat)
Connectivity
HSPA+, LTE, NFC, Wi-Fi, DLNA, Wi-Fi Direct,
Bluetooth 4.0
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
32
Prototype System (1/3)
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
33
Prototype System (2/3)
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
34
Prototype System (3/3)
NFC Reader
Set-top Box
NFC Phone
TV Screen
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
35
Demo
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
▪ HMAC-based Authentication Scheme
36
Performance Test (1/4)
HMAC-based
Authentication Scheme
Key Size
(bits)
Authentication Session Time (ms)
MIN MAX AVG STDEV
HMAC-MD5
Implementation
80 1088 1243 1151.68 37.72
112 1079 1245 1154.31 42.69
128 1099 1277 1157.93 45.16
192 1081 1258 1144.78 35.77
256 1085 1247 1154.76 40.80
HMAC-SHA1
Implementation
80 1115 1280 1169.02 41.95
112 1093 1270 1156.12 39.10
128 1110 1276 1165.03 41.14
192 1105 1279 1161.14 43.03
256 1107 1275 1176.99 44.29
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
HMAC-based
Authentication Scheme
Key Size
(bits)
Authentication Session Time (ms)
MIN MAX AVG STDEV
HMAC-SHA256
Implementation
80 1120 1295 1181.13 34.80
112 1124 1312 1185.57 42.26
128 1138 1323 1206.81 51.74
192 1119 1330 1192.44 46.86
256 1136 1337 1217.65 62.38
HMAC-SHA384
Implementation
80 1173 1365 1247.53 52.04
112 1174 1367 1228.90 49.82
128 1161 1371 1244.92 54.27
192 1171 1360 1229.44 46.65
256 1178 1358 1241.01 51.64
HMAC-SHA512
Implementation
80 1198 1368 1270.54 43.88
112 1201 1382 1274.98 43.24
128 1221 1384 1280.84 43.30
192 1202 1366 1275.36 41.07
256 1219 1386 1279.97 45.44
37
Performance Test (2/4)
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
▪ Digital Signature-based Authentication Scheme
38
Performance Test (3/4)
Digital Signature-based
Authentication Scheme
Key Size
(bits)
Authentication Session Time (ms)
MIN MAX AVG STDEV
DSA-SHA1
Implementation
1024 1372 1509 1443.27 33.50
2048 1478 1632 1561.54 36.47
3072 1954 2120 2038.29 39.28
DSA-SHA256
Implementation
1024 1379 1505 1448.07 29.69
2048 1503 1636 1568.67 33.44
3072 2008 2130 2073.13 29.55
DSA-SHA384
Implementation
1024 1386 1517 1453.33 33.58
2048 1507 1639 1569.62 35.70
3072 2020 2189 2103.23 44.20
DSA-SHA512
Implementation
1024 1389 1530 1453.39 36.39
2048 1524 1641 1576.72 32.52
3072 2032 2178 2107.98 38.38
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
Digital Signature-based
Authentication Scheme
Key Size
(bits)
Authentication Session Time (ms)
MIN MAX AVG STDEV
ECDSA-SHA1
Implementation
160 1228 1371 1289.26 36.21
224 1268 1393 1335.25 26.39
256 1369 1469 1414.48 23.63
ECDSA-SHA256
Implementation
160 1227 1383 1281.03 37.30
224 1278 1387 1331.28 27.57
256 1358 1472 1410.27 22.98
ECDSA-SHA384
Implementation
160 1228 1368 1281.39 37.30
224 1279 1391 1331.86 23.19
256 1366 1463 1405.64 19.31
ECDSA-SHA512
Implementation
160 1229 1395 1285.96 32.29
224 1268 1364 1318.91 19.79
256 1374 1470 1411.78 21.05
39
Performance Test (4/4)
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
40
Performance Comparison
Performance comparison of the algorithms used in the proposed schemes
NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis
▪ HMAC-based authentication scheme is better than Digital
Signature-based authentication scheme in terms of processing
speed
▪ Selected algorithm is the main factor that effects performance of
the HMAC-based authentication scheme
▪ The key size is the main factor that effects performance of the
Digital Signature-based authentication scheme
▪ Digital Signature-based scheme may be better choice at the
security strength in better than HMAC-based scheme. While the
session time of both scheme is equivalent.
41
Performance Analysis
`
Discussion and
Comparison
NFC-based User Authentication Mechanisms for Personalized IPTV Services
▪ NFC for User-friendly Operation
▪ Users do not need background knowledge about the technology
▪ Use simply by touching two NFC devices together
▪ Non-password Authentication
▪ Not require to remember password
▪ Resist password guessing attacks
43
Usability
Discussion and Comparison
NFC-based User Authentication Mechanisms for Personalized IPTV Services
▪ NFC-enabled STB has been developed
▪ More easily integrate the proposed mechanisms
▪ HCE support could reach 85% of smartphones
▪ New released smartphones are all NFC-ready
▪ Not a barrier for near future
44
Deployability
Discussion and Comparison
Smartphone shipments per OS platform Q2 2014
NFC-based User Authentication Mechanisms for Personalized IPTV Services
▪ Mobile IPTV Services
▪ Live Stream TV
▪ Customers can enjoy Live TV broadcasting anywhere just with
a smartphone or tablet if they have an Internet connection
▪ Personalized EPG (Electronic Program Guide)
▪ A program guide offers a user friendly environment
▪ STB Remote Control
▪ Easy to control the STB directly from smartphone same as
using the classic RC
45
Service Scalability (1/2)
Discussion and Comparison
NFC-based User Authentication Mechanisms for Personalized IPTV Services
▪ Agent Tags
▪ Can have a temporary authority that authorized by an
authenticated user, to execute authentication
▪ Typical reader/writer mode of NFC operations
46
Service Scalability (1/2)
Tag ID
Remaining
Count
Remaining
Time
Accepted
Channel
Accepted
Device
00000001 10 - CH-10 TV
00000002 - 24 Hour - Tablet
00000003 30 7 Day - -
00000004 - - CH-2 PC
00000005 5 30 Min CH-5 -
Discussion and Comparison
NFC-based User Authentication Mechanisms for Personalized IPTV Services
▪ HMAC-based vs. Digital Signature-based
47
Comparison of Two Proposed Schemes
HMAC-based
Authentication Scheme
Digital Signature
Authentication Scheme
Cryptosystem Symmetric Cryptosystem Asymmetric Cryptosystem
Integrity Yes Yes
Authentication
Yes
(not for third-party)
Yes
(support for third-party)
Key Size
(with equivalent security level)
Shorter Longer
Computation Cost Lower Higher
Storage Cost Lower Higher
Additional Infrastructure None
Certificate Authority
(optional)
Discussion and Comparison
NFC-based User Authentication Mechanisms for Personalized IPTV Services
48
Certificate Authority
NFC-based User Authentication Mechanisms for Personalized IPTV Services
Password-based Biometrics-based RFID-based
Identification unit A user A user A user
Authentication factor What you know What you are What you have
Object of identification Username, Password Face-recognition RFID tag
Authentication certifier STB STB
STB, IPTV
Authentication Server
Additional H/W device None Video camera
RFID reader in STB
and RFID tag
49
Comparison with Existing Solutions
USIM-based Bluetooth-based Proposed System
Identification unit A user A user A user
Authentication factor
What you have,
What you know
What you have,
What you know
What you have,
What you know
Object of identification
Subscriber
identification module
Bluetooth device MAC
address
HMAC/Signature
Authentication certifier
3G network,
IPTV Service
Provider
Bluetooth STB
STB, IPTV Application
Server
Additional H/W device 3G mobile equipment
Bluetooth module in
STB and Bluetooth
phone
NFC reader in STB
and NFC phone
Discussion and Comparison
`
Conclusion
NFC-based User Authentication Mechanisms for Personalized IPTV Services
▪ NFC-based user authentication mechanisms using HCE
and two authentication schemes are proposed
▪ HMAC-based authentication scheme has lightweight
operations and higher performance
▪ Digital Signature-based authentication scheme is
suitable to design open IPTV services
▪ The proposed mechanisms are suitable for personalized
IPTV services and can be easily deployed onto current
IPTV systems
51
Conclusion
Conclusion
`
Thank You
`
Q & A
NFC-based User Authentication Mechanisms for Personalized IPTV Services
1. S. C. Kim, S. S. Yeo, and S. K. Kim, “A Hybrid User Authentication Protocol for Mobile IPTV Service,” Multimedia tools and
applications, vol. 65, no. 2, pp. 283–296, May 2011.
2. R. Want, “An introduction to RFID technology,” IEEE Pervasive Computing, vol. 5, no. 1, pp. 25–33, Jan. 2006.
3. J. H. Cho, J. Kim, J. W. Kim, K. Lee, K. D. Aim, and S. Kim, “An NFC Transceiver with RF-powered RFID Transponder Mode,”
in Solid-State Circuits Conference, 2007. ASSCC ’07. IEEE Asian, 2007, pp. 172–175.
4. C. Bisdikian, “An Overview of the Bluetooth Wireless Technology,” IEEE Communications Magazine, vol. 39, no. 12, pp. 86–94,
Dec. 2001.
5. R. Bambini, P. Cremonesi, and R. Turrin, “A Recommender System for an IPTV Service Provider: a Real Large-Scale Production
Environment,” in Recommender Systems Handbook, F. Ricci, L. Rokach, B. Shapira, and P. B. Kantor, Eds. Springer US, 2011,
pp. 299–331.
6. V. Coskun, B. Ozdenizci, and K. Ok, “A Survey on Near Field Communication (NFC) Technology,” Wireless Pers Commun, vol.
71, no. 3, pp. 2259–2294, Dec. 2012.
7. H. Lee, W. C. Hong, C. H. Kao, and C. M. Cheng, “A User-Friendly Authentication Solution Using NFC Card Emulation on
Android,” in 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA), 2014, pp. 271–
278.
8. H. L. Wang, J. G. Wang, and W. Y. Yau, “Automated Age Regression for Personalized IPTV Services,” in 2010 IEEE
International Conference on Multimedia and Expo (ICME), 2010, pp. 1333–1336.
9. I. Krevatin, “Biometric Recognition in Telecom Environment,” in 2010 14th International Conference on Intelligence in Next
Generation Networks (ICIN), 2010, pp. 1–6.
10. A. G. Foina, J. Ramirez-Fernandez, and R. M. Badia, “Cell BE and Bluetooth applied to Digital TV,” in 2010 IEEE Network
Operations and Management Symposium (NOMS), 2010, pp. 825–828.
11. R. Jana, Y. F. Chen, D. C. Gibbon, Y. Huang, S. Jora, J. Murray, and B. Wei, “Clicker - An IPTV Remote Control in Your Cell
Phone,” in 2007 IEEE International Conference on Multimedia and Expo, 2007, pp. 1055–1058.
12. P. Urien, “Cloud of Secure Elements: An Infrastructure for the Trust of Mobile NFC Services,” in 2014 IEEE 10th International
Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2014, pp. 213–218.
54
References
NFC-based User Authentication Mechanisms for Personalized IPTV Services
13. K. H. Lin, D. H. Shiue, Y. S. Chiu, W. H. Tsai, F. J. Jang, and J. S. Chen, “Design and Implementation of Face Recognition-aided IPTV
Adaptive Group Recommendation System Based on NLMS Algorithm,” in 2012 International Symposium on Communications and
Information Technologies (ISCIT), 2012, pp. 626–631.
14. J. Lyu, S. Pyo, J. Lim, M. Kim, S. Lim, and S. Kim, “Design of Open APIs for Personalized IPTV Service,” in The 9th International
Conference on Advanced Communication Technology, 2007, vol. 1, pp. 305–310.
15. M. Alattar and M. Achemlal, “Host-Based Card Emulation: Development, Security, and Ecosystem Impact Analysis,” in 2014 IEEE Intl
Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE
11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 2014, pp. 506–509.
16. K. Chang, J. Hightower, and B. Kveton, “Inferring Identity Using Accelerometers in Television Remote Controls,” in Pervasive Computing,
2009, pp. 151–167.
17. S. Zeadally, H. Moustafa, and F. Siddiqui, “Internet Protocol Television (IPTV): Architecture, Trends, and Challenges,” IEEE Systems
Journal, vol. 5, no. 4, pp. 518–527, Dec. 2011.
18. Z. Liu, B. Wei, and H. Yu, “IPTV, Towards Seamless Infotainment,” in 6th IEEE Consumer Communications and Networking Conference,
2009. CCNC 2009, 2009, pp. 1–5.
19. M. Bellare, R. Canetti, and H. Krawczyk, “Keying Hash Functions for Message Authentication,” in Advances in Cryptology —
CRYPTO ’96, 1996, pp. 1–15.
20. S. Park and S.-H. Jeong, “Mobile IPTV: Approaches, Challenges, Standards, and QoS Support,” IEEE Internet Computing, vol. 13, no. 3,
pp. 23–31, May 2009.
21. R. Want, “Near Field Communication,” IEEE Pervasive Computing, vol. 10, no. 3, pp. 4–7, Jul. 2011.
22. N. Saparkhojayev, A. Dauitbayeva, A. Nurtayev, and G. Baimenshina, “NFC-enabled Access Control and Management System,” in 2014
International Conference on Web and Open Access to Learning (ICWOAL), 2014, pp. 1–4.
23. A. Andersen, R. Karlsen, and A. Munch-Ellingsen, “NFC Provided User Friendliness for Technologically Advanced Services,” in Human
Interface and the Management of Information. Information and Interaction for Health, Safety, Mobility and Complex Environments, 2013,
pp. 337–346.
24. S. Shirali-Shahreza, H. Sameti, and M. Shirali-Shahreza, “Parental Control Based on Speaker Class Verification,” IEEE Transactions on
Consumer Electronics, vol. 54, no. 3, pp. 1244–1251, Aug. 2008.
25. R. Morris and K. Thompson, “Password Security: A Case History,” Commun. ACM, vol. 22, no. 11, pp. 594–597, Nov. 1979.
55
References
NFC-based User Authentication Mechanisms for Personalized IPTV Services
26. J. H. Choi, J. Jeok, S. Y. Lim, H. C. Kim, H. K. Lee, and J. W. Hong, “Personalized Data Broadcasting Service based on TV-Anytime
metadata,” in IEEE International Symposium on Consumer Electronics, 2007. ISCE 2007, 2007, pp. 1–6.
27. M. C. Hwang, L. T. Ha, N. H. Kim, C. S. Park, and S. J. Ko, “Person Identification System for Future Digital TV with Intelligence,” IEEE
Transactions on Consumer Electronics, vol. 53, no. 1, pp. 218–226, Feb. 2007.
28. M. Reveilhac and M. Pasquet, “Promising Secure Element Alternatives for NFC Technology,” in First International Workshop on Near
Field Communication, 2009. NFC ’09, 2009, pp. 75–80.
29. T. Jiang, Y. Hou, and S. Zheng, “Secure Communication between Set-top Box and Smart Card in DTV Broadcasting,” IEEE Transactions
on Consumer Electronics, vol. 50, no. 3, pp. 882–886, Aug. 2004.
30. S. K. Panigrahy, S. K. Jena, and A. K. Turuk, “Security in Bluetooth, RFID and Wireless Sensor Networks,” in Proceedings of the 2011
International Conference on Communication, Computing & Security, pp. 628–633.
31. E. Haselsteiner and K. Breitfuß, “Security in Near Field Communication (NFC),” in Workshop on RFID security, 2006, pp. 12–14.
32. S. H. Lee, M. K. Sohn, D. J. Kim, B. Kim, and H. Kim, “Smart TV Interaction System Using Face and Hand Gesture Recognition,” in 2013
IEEE International Conference on Consumer Electronics (ICCE), 2013, pp. 173–174.
33. B. Veselinovska, M. Gusev, and T. Janevski, “State of the Art in IPTV,” in 2014 37th International Convention on Information and
Communication Technology, Electronics and Microelectronics (MIPRO), 2014, pp. 479–484.
34. R. van Brandenburg, H. van den Berg, M. O. van Deventer, and I. M. Schenk, “Towards Multi-user Personalized TV Services,
Introducing Combined RFID Digest Authentication,” Graduate Thesis TNO+ University Twente, vol. 10, 2009.
35. A. Munch-Ellingsen, R. Karlsen, A. Andersen, and S. Akselsen, “Two-factor Authentication for Android Host Card Emulated Contactless
Cards,” in 2015 First Conference on Mobile and Secure Services (MOBISECSERV), 2015, pp. 1–6.
36. Y.-K. Park, S.-H. Lim, O. Yi, S. Lee, and S.H. Kim, “User Authentication Mechanism Using Java Card for Personalized IPTV Services,”
in International Conference on Convergence and Hybrid Information Technology, 2008. ICHIT ’08, 2008, pp. 618–626.
37. T. Silva, J. F. de Abreu, O. Pacheco, and P. Almeida, “User Identification: A Key Factor for Elderly Viewers to Benefit from Interactive
Television Services,” in ENTERprise Information Systems, M. M. Cruz-Cunha, J. Varajão, P. Powell, and R. Martinho, Eds. Springer
Berlin Heidelberg, 2011, pp. 40–48.
38. T. Mlakar, J. Zaletelj, and J. F. Tasic, “Viewer Authentication for Personalized iTV Services,” in Eighth International Workshop on Image
Analysis for Multimedia Interactive Services, 2007. WIAMIS ’07, 2007, pp. 63–63.
39. H. Jabbar, T. Jeong, J. Hwang, and G. Park, “Viewer Identification and Authentication in IPTV using RFID Technique,” IEEE
Transactions on Consumer Electronics, vol. 54, no. 1, pp. 105–109, Feb. 2008.
56
References

More Related Content

What's hot

Session Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysisSession Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysischinmaypadhye1985
 
Machine Learning applications in Voice over IP
Machine Learning applications in Voice over IPMachine Learning applications in Voice over IP
Machine Learning applications in Voice over IPALTANAI BISHT
 
Introduction into SIP protocol
Introduction into SIP protocolIntroduction into SIP protocol
Introduction into SIP protocolMichal Hrncirik
 
NUVX Technologies general solutions
NUVX Technologies general solutionsNUVX Technologies general solutions
NUVX Technologies general solutionsNUVX
 
session initiation protocol - SIP
session initiation protocol - SIPsession initiation protocol - SIP
session initiation protocol - SIPMahmoud Abudaqa
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolLivePerson
 
Videoconference
VideoconferenceVideoconference
Videoconferenceeonx_32
 
H.323 Network Components include H.323 Terminals, Gatekeepers ...
H.323 Network Components include H.323 Terminals, Gatekeepers ...H.323 Network Components include H.323 Terminals, Gatekeepers ...
H.323 Network Components include H.323 Terminals, Gatekeepers ...Videoguy
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip OverviewMayank Vora
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Warren Bent
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...ALTANAI BISHT
 
FRAFOS Secure Session Border Control
FRAFOS Secure Session Border ControlFRAFOS Secure Session Border Control
FRAFOS Secure Session Border Controlstefansayer
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation ProtocolMatt Bynum
 
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...Alex Tan
 

What's hot (18)

Session Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysisSession Initiation Protocol - In depth analysis
Session Initiation Protocol - In depth analysis
 
Machine Learning applications in Voice over IP
Machine Learning applications in Voice over IPMachine Learning applications in Voice over IP
Machine Learning applications in Voice over IP
 
H.323 protocol
H.323 protocolH.323 protocol
H.323 protocol
 
Introduction into SIP protocol
Introduction into SIP protocolIntroduction into SIP protocol
Introduction into SIP protocol
 
SIP security in IP telephony
SIP security in IP telephonySIP security in IP telephony
SIP security in IP telephony
 
NUVX Technologies general solutions
NUVX Technologies general solutionsNUVX Technologies general solutions
NUVX Technologies general solutions
 
session initiation protocol - SIP
session initiation protocol - SIPsession initiation protocol - SIP
session initiation protocol - SIP
 
SIP - Introduction to SIP Protocol
SIP - Introduction to SIP ProtocolSIP - Introduction to SIP Protocol
SIP - Introduction to SIP Protocol
 
Videoconference
VideoconferenceVideoconference
Videoconference
 
H.323 Network Components include H.323 Terminals, Gatekeepers ...
H.323 Network Components include H.323 Terminals, Gatekeepers ...H.323 Network Components include H.323 Terminals, Gatekeepers ...
H.323 Network Components include H.323 Terminals, Gatekeepers ...
 
1 Vo Ip Overview
1 Vo Ip Overview1 Vo Ip Overview
1 Vo Ip Overview
 
Introduction to SIP
Introduction to SIP  Introduction to SIP
Introduction to SIP
 
Marrion Kujinga ; Firewalls
Marrion Kujinga ; FirewallsMarrion Kujinga ; Firewalls
Marrion Kujinga ; Firewalls
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2
 
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
Sip Detailed , Call flows , Architecture descriptions , SIP services , sip se...
 
FRAFOS Secure Session Border Control
FRAFOS Secure Session Border ControlFRAFOS Secure Session Border Control
FRAFOS Secure Session Border Control
 
Session Initiation Protocol
Session Initiation ProtocolSession Initiation Protocol
Session Initiation Protocol
 
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES...
 

Viewers also liked

Introduction to MongoDB
Introduction to MongoDBIntroduction to MongoDB
Introduction to MongoDBChun-Kai Wang
 
Mobility Aware Distributed Service Composition Framework in SOA based MANET A...
Mobility Aware Distributed Service Composition Framework in SOA based MANET A...Mobility Aware Distributed Service Composition Framework in SOA based MANET A...
Mobility Aware Distributed Service Composition Framework in SOA based MANET A...Chun-Kai Wang
 
友增吾簡-互動式名片系統
友增吾簡-互動式名片系統友增吾簡-互動式名片系統
友增吾簡-互動式名片系統Chun-Kai Wang
 
Android NFC Application Development Environment Setup
Android NFC Application Development Environment SetupAndroid NFC Application Development Environment Setup
Android NFC Application Development Environment SetupChun-Kai Wang
 
Android Application Development of NFC Reader-Writer Mode
Android Application Development of NFC Reader-Writer ModeAndroid Application Development of NFC Reader-Writer Mode
Android Application Development of NFC Reader-Writer ModeChun-Kai Wang
 
Introduction to CodeIgniter
Introduction to CodeIgniterIntroduction to CodeIgniter
Introduction to CodeIgniterChun-Kai Wang
 
Nfc reader writer_mode
Nfc reader writer_modeNfc reader writer_mode
Nfc reader writer_modeChun-Kai Wang
 
Android Application Development of NFC Peer-to-Peer Mode
Android Application Development of NFC Peer-to-Peer ModeAndroid Application Development of NFC Peer-to-Peer Mode
Android Application Development of NFC Peer-to-Peer ModeChun-Kai Wang
 

Viewers also liked (8)

Introduction to MongoDB
Introduction to MongoDBIntroduction to MongoDB
Introduction to MongoDB
 
Mobility Aware Distributed Service Composition Framework in SOA based MANET A...
Mobility Aware Distributed Service Composition Framework in SOA based MANET A...Mobility Aware Distributed Service Composition Framework in SOA based MANET A...
Mobility Aware Distributed Service Composition Framework in SOA based MANET A...
 
友增吾簡-互動式名片系統
友增吾簡-互動式名片系統友增吾簡-互動式名片系統
友增吾簡-互動式名片系統
 
Android NFC Application Development Environment Setup
Android NFC Application Development Environment SetupAndroid NFC Application Development Environment Setup
Android NFC Application Development Environment Setup
 
Android Application Development of NFC Reader-Writer Mode
Android Application Development of NFC Reader-Writer ModeAndroid Application Development of NFC Reader-Writer Mode
Android Application Development of NFC Reader-Writer Mode
 
Introduction to CodeIgniter
Introduction to CodeIgniterIntroduction to CodeIgniter
Introduction to CodeIgniter
 
Nfc reader writer_mode
Nfc reader writer_modeNfc reader writer_mode
Nfc reader writer_mode
 
Android Application Development of NFC Peer-to-Peer Mode
Android Application Development of NFC Peer-to-Peer ModeAndroid Application Development of NFC Peer-to-Peer Mode
Android Application Development of NFC Peer-to-Peer Mode
 

Similar to NFC-based User Authentication Mechanisms for Personalized IPTV Services

OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability InitiativeOPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability InitiativeNFC Forum
 
Remote access connection
Remote access connection Remote access connection
Remote access connection Ah Fawad Saiq
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGBjorn Hjelm
 
Blockchain Explored: A technical deep-dive
Blockchain Explored: A technical deep-diveBlockchain Explored: A technical deep-dive
Blockchain Explored: A technical deep-diveBinh Nguyen
 
SDN, NFV and customer centric networks
SDN, NFV and customer centric networksSDN, NFV and customer centric networks
SDN, NFV and customer centric networksPatrick Lopez
 
OpenID Connect: The Mobile Profile
OpenID Connect: The Mobile ProfileOpenID Connect: The Mobile Profile
OpenID Connect: The Mobile ProfileBjorn Hjelm
 
Introduction to the Interoperability Initiative
Introduction to the Interoperability InitiativeIntroduction to the Interoperability Initiative
Introduction to the Interoperability InitiativeNFC Forum
 
Telefonica innovation edge computing and services
Telefonica innovation edge computing and servicesTelefonica innovation edge computing and services
Telefonica innovation edge computing and servicesPatrick Lopez
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC SecurityAlex Hunte
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTCQuobis
 
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...NFC Forum
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGBjorn Hjelm
 
Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Videoguy
 

Similar to NFC-based User Authentication Mechanisms for Personalized IPTV Services (20)

NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 
Voip security
Voip securityVoip security
Voip security
 
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability InitiativeOPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
OPTIMOS Interoperability Event - Introduction to the Interoperability Initiative
 
Remote access connection
Remote access connection Remote access connection
Remote access connection
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
 
Blockchain Explored: A technical deep-dive
Blockchain Explored: A technical deep-diveBlockchain Explored: A technical deep-dive
Blockchain Explored: A technical deep-dive
 
SDN, NFV and customer centric networks
SDN, NFV and customer centric networksSDN, NFV and customer centric networks
SDN, NFV and customer centric networks
 
VPN
VPNVPN
VPN
 
Vp ns
Vp nsVp ns
Vp ns
 
OpenID Connect: The Mobile Profile
OpenID Connect: The Mobile ProfileOpenID Connect: The Mobile Profile
OpenID Connect: The Mobile Profile
 
Sto L Pa N@Nfc Academy 2009
Sto L Pa N@Nfc Academy 2009Sto L Pa N@Nfc Academy 2009
Sto L Pa N@Nfc Academy 2009
 
Introduction to the Interoperability Initiative
Introduction to the Interoperability InitiativeIntroduction to the Interoperability Initiative
Introduction to the Interoperability Initiative
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Telefonica innovation edge computing and services
Telefonica innovation edge computing and servicesTelefonica innovation edge computing and services
Telefonica innovation edge computing and services
 
WebRTC Security
WebRTC SecurityWebRTC Security
WebRTC Security
 
Security and identity management on WebRTC
Security and identity management on WebRTCSecurity and identity management on WebRTC
Security and identity management on WebRTC
 
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
VISIONFC – an NFC Forum event: The future of NFC in Wearables, Health Care & ...
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
 
Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...Internet2 National Video Conferencing Service: Getting ...
Internet2 National Video Conferencing Service: Getting ...
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

NFC-based User Authentication Mechanisms for Personalized IPTV Services

  • 1. 基於近場通訊技術且適用於 IPTV 個人化服務之使用者身分鑑別機制 NFC-based User Authentication Mechanisms for Personalized IPTV Services Student : Chun-Kai Wang (王雋凱) Advisor : Dr. Nai-Wei Lo (羅乃維 博士) 2015/06/29
  • 2. NFC-based User Authentication Mechanisms for Personalized IPTV Services ▪ Introduction ▪ Related Work ▪ Proposed Mechanisms ▪ Security and Performance Analysis ▪ Discussion and Comparison ▪ Conclusion 2 Outline
  • 4. NFC-based User Authentication Mechanisms for Personalized IPTV Services Introduction ▪ IPTV (Internet Protocol Television) ▪ Combined with modern technologies to deliver high-quality television content and rich services through IP networks ▪ Features of IPTV ▪ Support for interactive TV ▪ Time shifting ▪ Personalization ▪ Low bandwidth requirements ▪ Accessible on multiple devices 4 Background (1/2)
  • 5. NFC-based User Authentication Mechanisms for Personalized IPTV Services Introduction ▪ STB (Set-top Box) ▪ A device at the customer side ▪ Connects an ordinary TV to the external network ▪ Converts the received signal display on the TV screen 5 Background (2/2)
  • 6. NFC-based User Authentication Mechanisms for Personalized IPTV Services Introduction ▪ Existing IPTV authentication based on STB-level ▪ STB contains a unique hardware identifier registered by service provider ▪ STB-level authentication leads to whole family members get the same access level to IPTV services ▪ Family Services ≠ Personalized Services ▪ IPTV service provider cannot identify who is actually watching a certain program ▪ Inconsistent with IPTV's main intention to provide personalized services 6 Motivation
  • 7. NFC-based User Authentication Mechanisms for Personalized IPTV Services Introduction ▪ To survey studies on identification for TV viewer ▪ To design a user authentication mechanism for personalized IPTV services ▪ To develop a proof-of-concept implementation ▪ To analyze security and performance of the proposed mechanism ▪ To evaluate the system by comparing with existing solutions 7 Objectives
  • 9. NFC-based User Authentication Mechanisms for Personalized IPTV Services Related Work ▪ Previous works can be classified into five types: 9 Viewer Identification Systems Type Object of Identification Password-based [26] ID, Password Biometrics-based [8] [27] [38] Face-recognition RFID-based [34] [39] RFID Tag USIM-based [36] Subscriber Identification Module Bluetooth-based [10] Bluetooth Device MAC Address
  • 10. NFC-based User Authentication Mechanisms for Personalized IPTV Services Related Work ▪ Short range and wireless technology based on RFID ▪ NFC devices: NFC Reader, NFC Tag, NFC Phone ▪ NFC operation modes: 10 Near Field Communication (NFC) Operation Mode Initiator Device Target Device Reader / Writer NFC Phone NFC Tag Peer-to-Peer NFC Phone NFC Phone Card Emulation NFC Reader NFC Phone
  • 11. NFC-based User Authentication Mechanisms for Personalized IPTV Services Related Work ▪ Conventional card emulation requires Secure Element (SE) embedded in NFC mobile ▪ HCE allows NFC mobile can emulate a contactless smart card using only software 11 Host Card Emulation (HCE) SE-based card emulation HCE-based card emulation
  • 13. NFC-based User Authentication Mechanisms for Personalized IPTV Services 13 Overview (1/2) The proposed personalized IPTV service architecture Proposed Mechanisms
  • 14. NFC-based User Authentication Mechanisms for Personalized IPTV Services Proposed Mechanisms ▪ The proposed mechanisms have two authentication schemes: ▪ HMAC-based Authentication Scheme ▪ Digital Signature-based Authentication Scheme ▪ Both schemes comprise three phases: ▪ Registration Phase ▪ To register a user becoming an IPTV service subscriber ▪ Authentication Phase ▪ To authenticate a IPTV service subscriber ▪ Key Update Phase ▪ To update the secret key of an IPTV service subscriber 14 Overview (2/2)
  • 15. NFC-based User Authentication Mechanisms for Personalized IPTV Services Proposed Mechanisms Notation Description The IPTV services provider The user , who is an IPTV subscriber The personal computer of the user The NFC-enabled mobile phone owned by the user The set-top box , which equipped with NFC reader The Application Server of The HCE-enabled mobile app, which is developed by The email address of the user The password chosen by the user The personal information of the user The cell phone number of the user The unique identifier of entity The secret key, only known to entity and The public key of entity 15 Notations (1/2)
  • 16. NFC-based User Authentication Mechanisms for Personalized IPTV Services Proposed Mechanisms Notation Description The security (private) key of entity The X.509 certificate of entity A random number is generated by entity The n th nonce value is generated by entity The n th timestamp is generated by entity The maximum allowed time interval for transmission delay Check the message is valid The message is encrypted by the public key of entity The message is decrypted by the secret (private) key of entity The message is signed by the secret (private) key of entity The message is verified by the public key of entity A keyed-hash message authentication code of message using security key Entity send the message to entity A concatenation operator 16 Notations (2/2)
  • 17. NFC-based User Authentication Mechanisms for Personalized IPTV Services Registration Phase 17 HMAC-based Auth. Scheme Digital-signature-based Auth. Scheme Proposed Mechanisms
  • 18. NFC-based User Authentication Mechanisms for Personalized IPTV Services Authentication Phase 18 HMAC-based Auth. Scheme Digital-signature-based Auth. Scheme Proposed Mechanisms
  • 19. NFC-based User Authentication Mechanisms for Personalized IPTV Services 19 Proposed Mechanisms pp.21 pp.32 HMAC-based Auth. Scheme Digital-signature-based Auth. Scheme
  • 20. NFC-based User Authentication Mechanisms for Personalized IPTV Services Key Update Phase 20 HMAC-based Auth. Scheme Digital-signature-based Auth. Scheme Proposed Mechanisms
  • 22. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis 22 Trust Boundary Trust boundary and the communication channels
  • 23. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis ▪ The data received during the registration phase are all correct. ▪ The trusted NFC phone is equipped with secure storage ▪ The NFC channel is insecure ▪ The STB and NFC reader in an open environment, any IPTV subscriber can use his/her NFC phone to get authenticated ▪ The Internet channel protected by SSL/TLS ▪ The trusted Application Server connects to the database is secure 23 Assumptions
  • 24. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis ▪ Providing Mutual Authentication ▪ Impersonation Attack resistance ▪ Server Spoofing Attack resistance ▪ Replay Attack resistance ▪ Man-in-the-Middle Attack resistance 24 Security Analysis
  • 25. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis ▪ HMAC-based Authentication Scheme ▪ 𝐴𝑆𝑆𝑃 gets authenticated by 𝑈𝑖 if it can correctly compute HMAC value by using secret key 𝐾𝑖,𝑆𝑃 ▪ 𝑈𝑖 gets authenticated by 𝐴𝑆𝑆𝑃 if it can correctly compute HMAC value by using secret key 𝐾𝑖,𝑆𝑃 ▪ Digital Signature-based Authentication Scheme ▪ 𝐴𝑆𝑆𝑃 gets authenticated by 𝑈𝑖 if it can correctly verify the signature by using public key 𝑃𝐾𝑆𝑃 ▪ 𝑈𝑖 gets authenticated by 𝐴𝑆𝑆𝑃 if it can correctly verify the signature by using public key 𝑃𝐾𝑖 ▪ Impersonation & Server Spoofing Attack Resistance 25 Mutual Authentication
  • 26. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis ▪ Fresh nonce-embedded message ▪ The nonce is a random value that used only once and not repeated ▪ 𝐴𝑆𝑆𝑃 can detect the message is a replay attack because the scheme uses nonce, if a nonce is found inconsistencies, 𝐴𝑆𝑆𝑃 will reject the request 26 Replay Attack
  • 27. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis ▪ STB-to-AS connection is based on SSL/TLS ▪ MITM attack is practically infeasible on NFC channel 27 Man-in-the-Middle Attack
  • 28. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis ▪ The prototype system consist of three components: ▪ Application Server (AS) ▪ provides a platform let user register service and apply for key update ▪ Set-top Box (STB) ▪ connected with an NFC reader via USB interface ▪ has an NFC application that can communicate with the HCE-enabled app installed on the NFC Phone ▪ transfers authenticated messages to the AS for performing authentication ▪ NFC-enabled Mobile Phone (NFC Phone) ▪ installed an HCE-enabled app that can react to APDU commands from the NFC reader. 28 Prototype Implementation
  • 29. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis ▪ Application Server Specifications 29 Experimental Platform (1/3) Application Server CPU Intel Core i3-3120M Memory 4GB DDR3 SO-DIMM Operating System GNU/Linux Ubuntu 14.04.2 LTS Port TCP/IP
  • 30. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis ▪ Set-top Box Specifications ▪ ACR122U USB NFC Reader 30 Experimental Platform (2/3) Raspberry Pi Model B+ CPU 700 MHz Low Power ARM1176JZFS Applications Processor GPU Dual Core VideoCore IV Memory 512MB SDRAM Operating System Embedded Linux (Raspbian) Interface Ethernet, USB, HDMI
  • 31. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis ▪ NFC-enabled Mobile Phone Specifications ▪ Android OS version 4.4 or above supports HCE 31 Experimental Platform (3/3) Samsung Galaxy Note II CPU 1.6 GHz Quad-Core Cortex-A9 Memory 2GB RAM Operating System Android 4.4.2 (KitKat) Connectivity HSPA+, LTE, NFC, Wi-Fi, DLNA, Wi-Fi Direct, Bluetooth 4.0
  • 32. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis 32 Prototype System (1/3)
  • 33. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis 33 Prototype System (2/3)
  • 34. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis 34 Prototype System (3/3) NFC Reader Set-top Box NFC Phone TV Screen
  • 35. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis 35 Demo
  • 36. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis ▪ HMAC-based Authentication Scheme 36 Performance Test (1/4) HMAC-based Authentication Scheme Key Size (bits) Authentication Session Time (ms) MIN MAX AVG STDEV HMAC-MD5 Implementation 80 1088 1243 1151.68 37.72 112 1079 1245 1154.31 42.69 128 1099 1277 1157.93 45.16 192 1081 1258 1144.78 35.77 256 1085 1247 1154.76 40.80 HMAC-SHA1 Implementation 80 1115 1280 1169.02 41.95 112 1093 1270 1156.12 39.10 128 1110 1276 1165.03 41.14 192 1105 1279 1161.14 43.03 256 1107 1275 1176.99 44.29
  • 37. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis HMAC-based Authentication Scheme Key Size (bits) Authentication Session Time (ms) MIN MAX AVG STDEV HMAC-SHA256 Implementation 80 1120 1295 1181.13 34.80 112 1124 1312 1185.57 42.26 128 1138 1323 1206.81 51.74 192 1119 1330 1192.44 46.86 256 1136 1337 1217.65 62.38 HMAC-SHA384 Implementation 80 1173 1365 1247.53 52.04 112 1174 1367 1228.90 49.82 128 1161 1371 1244.92 54.27 192 1171 1360 1229.44 46.65 256 1178 1358 1241.01 51.64 HMAC-SHA512 Implementation 80 1198 1368 1270.54 43.88 112 1201 1382 1274.98 43.24 128 1221 1384 1280.84 43.30 192 1202 1366 1275.36 41.07 256 1219 1386 1279.97 45.44 37 Performance Test (2/4)
  • 38. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis ▪ Digital Signature-based Authentication Scheme 38 Performance Test (3/4) Digital Signature-based Authentication Scheme Key Size (bits) Authentication Session Time (ms) MIN MAX AVG STDEV DSA-SHA1 Implementation 1024 1372 1509 1443.27 33.50 2048 1478 1632 1561.54 36.47 3072 1954 2120 2038.29 39.28 DSA-SHA256 Implementation 1024 1379 1505 1448.07 29.69 2048 1503 1636 1568.67 33.44 3072 2008 2130 2073.13 29.55 DSA-SHA384 Implementation 1024 1386 1517 1453.33 33.58 2048 1507 1639 1569.62 35.70 3072 2020 2189 2103.23 44.20 DSA-SHA512 Implementation 1024 1389 1530 1453.39 36.39 2048 1524 1641 1576.72 32.52 3072 2032 2178 2107.98 38.38
  • 39. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis Digital Signature-based Authentication Scheme Key Size (bits) Authentication Session Time (ms) MIN MAX AVG STDEV ECDSA-SHA1 Implementation 160 1228 1371 1289.26 36.21 224 1268 1393 1335.25 26.39 256 1369 1469 1414.48 23.63 ECDSA-SHA256 Implementation 160 1227 1383 1281.03 37.30 224 1278 1387 1331.28 27.57 256 1358 1472 1410.27 22.98 ECDSA-SHA384 Implementation 160 1228 1368 1281.39 37.30 224 1279 1391 1331.86 23.19 256 1366 1463 1405.64 19.31 ECDSA-SHA512 Implementation 160 1229 1395 1285.96 32.29 224 1268 1364 1318.91 19.79 256 1374 1470 1411.78 21.05 39 Performance Test (4/4)
  • 40. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis 40 Performance Comparison Performance comparison of the algorithms used in the proposed schemes
  • 41. NFC-based User Authentication Mechanisms for Personalized IPTV Services Security and Performance Analysis ▪ HMAC-based authentication scheme is better than Digital Signature-based authentication scheme in terms of processing speed ▪ Selected algorithm is the main factor that effects performance of the HMAC-based authentication scheme ▪ The key size is the main factor that effects performance of the Digital Signature-based authentication scheme ▪ Digital Signature-based scheme may be better choice at the security strength in better than HMAC-based scheme. While the session time of both scheme is equivalent. 41 Performance Analysis
  • 43. NFC-based User Authentication Mechanisms for Personalized IPTV Services ▪ NFC for User-friendly Operation ▪ Users do not need background knowledge about the technology ▪ Use simply by touching two NFC devices together ▪ Non-password Authentication ▪ Not require to remember password ▪ Resist password guessing attacks 43 Usability Discussion and Comparison
  • 44. NFC-based User Authentication Mechanisms for Personalized IPTV Services ▪ NFC-enabled STB has been developed ▪ More easily integrate the proposed mechanisms ▪ HCE support could reach 85% of smartphones ▪ New released smartphones are all NFC-ready ▪ Not a barrier for near future 44 Deployability Discussion and Comparison Smartphone shipments per OS platform Q2 2014
  • 45. NFC-based User Authentication Mechanisms for Personalized IPTV Services ▪ Mobile IPTV Services ▪ Live Stream TV ▪ Customers can enjoy Live TV broadcasting anywhere just with a smartphone or tablet if they have an Internet connection ▪ Personalized EPG (Electronic Program Guide) ▪ A program guide offers a user friendly environment ▪ STB Remote Control ▪ Easy to control the STB directly from smartphone same as using the classic RC 45 Service Scalability (1/2) Discussion and Comparison
  • 46. NFC-based User Authentication Mechanisms for Personalized IPTV Services ▪ Agent Tags ▪ Can have a temporary authority that authorized by an authenticated user, to execute authentication ▪ Typical reader/writer mode of NFC operations 46 Service Scalability (1/2) Tag ID Remaining Count Remaining Time Accepted Channel Accepted Device 00000001 10 - CH-10 TV 00000002 - 24 Hour - Tablet 00000003 30 7 Day - - 00000004 - - CH-2 PC 00000005 5 30 Min CH-5 - Discussion and Comparison
  • 47. NFC-based User Authentication Mechanisms for Personalized IPTV Services ▪ HMAC-based vs. Digital Signature-based 47 Comparison of Two Proposed Schemes HMAC-based Authentication Scheme Digital Signature Authentication Scheme Cryptosystem Symmetric Cryptosystem Asymmetric Cryptosystem Integrity Yes Yes Authentication Yes (not for third-party) Yes (support for third-party) Key Size (with equivalent security level) Shorter Longer Computation Cost Lower Higher Storage Cost Lower Higher Additional Infrastructure None Certificate Authority (optional) Discussion and Comparison
  • 48. NFC-based User Authentication Mechanisms for Personalized IPTV Services 48 Certificate Authority
  • 49. NFC-based User Authentication Mechanisms for Personalized IPTV Services Password-based Biometrics-based RFID-based Identification unit A user A user A user Authentication factor What you know What you are What you have Object of identification Username, Password Face-recognition RFID tag Authentication certifier STB STB STB, IPTV Authentication Server Additional H/W device None Video camera RFID reader in STB and RFID tag 49 Comparison with Existing Solutions USIM-based Bluetooth-based Proposed System Identification unit A user A user A user Authentication factor What you have, What you know What you have, What you know What you have, What you know Object of identification Subscriber identification module Bluetooth device MAC address HMAC/Signature Authentication certifier 3G network, IPTV Service Provider Bluetooth STB STB, IPTV Application Server Additional H/W device 3G mobile equipment Bluetooth module in STB and Bluetooth phone NFC reader in STB and NFC phone Discussion and Comparison
  • 51. NFC-based User Authentication Mechanisms for Personalized IPTV Services ▪ NFC-based user authentication mechanisms using HCE and two authentication schemes are proposed ▪ HMAC-based authentication scheme has lightweight operations and higher performance ▪ Digital Signature-based authentication scheme is suitable to design open IPTV services ▪ The proposed mechanisms are suitable for personalized IPTV services and can be easily deployed onto current IPTV systems 51 Conclusion Conclusion
  • 54. NFC-based User Authentication Mechanisms for Personalized IPTV Services 1. S. C. Kim, S. S. Yeo, and S. K. Kim, “A Hybrid User Authentication Protocol for Mobile IPTV Service,” Multimedia tools and applications, vol. 65, no. 2, pp. 283–296, May 2011. 2. R. Want, “An introduction to RFID technology,” IEEE Pervasive Computing, vol. 5, no. 1, pp. 25–33, Jan. 2006. 3. J. H. Cho, J. Kim, J. W. Kim, K. Lee, K. D. Aim, and S. Kim, “An NFC Transceiver with RF-powered RFID Transponder Mode,” in Solid-State Circuits Conference, 2007. ASSCC ’07. IEEE Asian, 2007, pp. 172–175. 4. C. Bisdikian, “An Overview of the Bluetooth Wireless Technology,” IEEE Communications Magazine, vol. 39, no. 12, pp. 86–94, Dec. 2001. 5. R. Bambini, P. Cremonesi, and R. Turrin, “A Recommender System for an IPTV Service Provider: a Real Large-Scale Production Environment,” in Recommender Systems Handbook, F. Ricci, L. Rokach, B. Shapira, and P. B. Kantor, Eds. Springer US, 2011, pp. 299–331. 6. V. Coskun, B. Ozdenizci, and K. Ok, “A Survey on Near Field Communication (NFC) Technology,” Wireless Pers Commun, vol. 71, no. 3, pp. 2259–2294, Dec. 2012. 7. H. Lee, W. C. Hong, C. H. Kao, and C. M. Cheng, “A User-Friendly Authentication Solution Using NFC Card Emulation on Android,” in 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications (SOCA), 2014, pp. 271– 278. 8. H. L. Wang, J. G. Wang, and W. Y. Yau, “Automated Age Regression for Personalized IPTV Services,” in 2010 IEEE International Conference on Multimedia and Expo (ICME), 2010, pp. 1333–1336. 9. I. Krevatin, “Biometric Recognition in Telecom Environment,” in 2010 14th International Conference on Intelligence in Next Generation Networks (ICIN), 2010, pp. 1–6. 10. A. G. Foina, J. Ramirez-Fernandez, and R. M. Badia, “Cell BE and Bluetooth applied to Digital TV,” in 2010 IEEE Network Operations and Management Symposium (NOMS), 2010, pp. 825–828. 11. R. Jana, Y. F. Chen, D. C. Gibbon, Y. Huang, S. Jora, J. Murray, and B. Wei, “Clicker - An IPTV Remote Control in Your Cell Phone,” in 2007 IEEE International Conference on Multimedia and Expo, 2007, pp. 1055–1058. 12. P. Urien, “Cloud of Secure Elements: An Infrastructure for the Trust of Mobile NFC Services,” in 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2014, pp. 213–218. 54 References
  • 55. NFC-based User Authentication Mechanisms for Personalized IPTV Services 13. K. H. Lin, D. H. Shiue, Y. S. Chiu, W. H. Tsai, F. J. Jang, and J. S. Chen, “Design and Implementation of Face Recognition-aided IPTV Adaptive Group Recommendation System Based on NLMS Algorithm,” in 2012 International Symposium on Communications and Information Technologies (ISCIT), 2012, pp. 626–631. 14. J. Lyu, S. Pyo, J. Lim, M. Kim, S. Lim, and S. Kim, “Design of Open APIs for Personalized IPTV Service,” in The 9th International Conference on Advanced Communication Technology, 2007, vol. 1, pp. 305–310. 15. M. Alattar and M. Achemlal, “Host-Based Card Emulation: Development, Security, and Ecosystem Impact Analysis,” in 2014 IEEE Intl Conf on High Performance Computing and Communications, 2014 IEEE 6th Intl Symp on Cyberspace Safety and Security, 2014 IEEE 11th Intl Conf on Embedded Software and Syst (HPCC,CSS,ICESS), 2014, pp. 506–509. 16. K. Chang, J. Hightower, and B. Kveton, “Inferring Identity Using Accelerometers in Television Remote Controls,” in Pervasive Computing, 2009, pp. 151–167. 17. S. Zeadally, H. Moustafa, and F. Siddiqui, “Internet Protocol Television (IPTV): Architecture, Trends, and Challenges,” IEEE Systems Journal, vol. 5, no. 4, pp. 518–527, Dec. 2011. 18. Z. Liu, B. Wei, and H. Yu, “IPTV, Towards Seamless Infotainment,” in 6th IEEE Consumer Communications and Networking Conference, 2009. CCNC 2009, 2009, pp. 1–5. 19. M. Bellare, R. Canetti, and H. Krawczyk, “Keying Hash Functions for Message Authentication,” in Advances in Cryptology — CRYPTO ’96, 1996, pp. 1–15. 20. S. Park and S.-H. Jeong, “Mobile IPTV: Approaches, Challenges, Standards, and QoS Support,” IEEE Internet Computing, vol. 13, no. 3, pp. 23–31, May 2009. 21. R. Want, “Near Field Communication,” IEEE Pervasive Computing, vol. 10, no. 3, pp. 4–7, Jul. 2011. 22. N. Saparkhojayev, A. Dauitbayeva, A. Nurtayev, and G. Baimenshina, “NFC-enabled Access Control and Management System,” in 2014 International Conference on Web and Open Access to Learning (ICWOAL), 2014, pp. 1–4. 23. A. Andersen, R. Karlsen, and A. Munch-Ellingsen, “NFC Provided User Friendliness for Technologically Advanced Services,” in Human Interface and the Management of Information. Information and Interaction for Health, Safety, Mobility and Complex Environments, 2013, pp. 337–346. 24. S. Shirali-Shahreza, H. Sameti, and M. Shirali-Shahreza, “Parental Control Based on Speaker Class Verification,” IEEE Transactions on Consumer Electronics, vol. 54, no. 3, pp. 1244–1251, Aug. 2008. 25. R. Morris and K. Thompson, “Password Security: A Case History,” Commun. ACM, vol. 22, no. 11, pp. 594–597, Nov. 1979. 55 References
  • 56. NFC-based User Authentication Mechanisms for Personalized IPTV Services 26. J. H. Choi, J. Jeok, S. Y. Lim, H. C. Kim, H. K. Lee, and J. W. Hong, “Personalized Data Broadcasting Service based on TV-Anytime metadata,” in IEEE International Symposium on Consumer Electronics, 2007. ISCE 2007, 2007, pp. 1–6. 27. M. C. Hwang, L. T. Ha, N. H. Kim, C. S. Park, and S. J. Ko, “Person Identification System for Future Digital TV with Intelligence,” IEEE Transactions on Consumer Electronics, vol. 53, no. 1, pp. 218–226, Feb. 2007. 28. M. Reveilhac and M. Pasquet, “Promising Secure Element Alternatives for NFC Technology,” in First International Workshop on Near Field Communication, 2009. NFC ’09, 2009, pp. 75–80. 29. T. Jiang, Y. Hou, and S. Zheng, “Secure Communication between Set-top Box and Smart Card in DTV Broadcasting,” IEEE Transactions on Consumer Electronics, vol. 50, no. 3, pp. 882–886, Aug. 2004. 30. S. K. Panigrahy, S. K. Jena, and A. K. Turuk, “Security in Bluetooth, RFID and Wireless Sensor Networks,” in Proceedings of the 2011 International Conference on Communication, Computing & Security, pp. 628–633. 31. E. Haselsteiner and K. Breitfuß, “Security in Near Field Communication (NFC),” in Workshop on RFID security, 2006, pp. 12–14. 32. S. H. Lee, M. K. Sohn, D. J. Kim, B. Kim, and H. Kim, “Smart TV Interaction System Using Face and Hand Gesture Recognition,” in 2013 IEEE International Conference on Consumer Electronics (ICCE), 2013, pp. 173–174. 33. B. Veselinovska, M. Gusev, and T. Janevski, “State of the Art in IPTV,” in 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2014, pp. 479–484. 34. R. van Brandenburg, H. van den Berg, M. O. van Deventer, and I. M. Schenk, “Towards Multi-user Personalized TV Services, Introducing Combined RFID Digest Authentication,” Graduate Thesis TNO+ University Twente, vol. 10, 2009. 35. A. Munch-Ellingsen, R. Karlsen, A. Andersen, and S. Akselsen, “Two-factor Authentication for Android Host Card Emulated Contactless Cards,” in 2015 First Conference on Mobile and Secure Services (MOBISECSERV), 2015, pp. 1–6. 36. Y.-K. Park, S.-H. Lim, O. Yi, S. Lee, and S.H. Kim, “User Authentication Mechanism Using Java Card for Personalized IPTV Services,” in International Conference on Convergence and Hybrid Information Technology, 2008. ICHIT ’08, 2008, pp. 618–626. 37. T. Silva, J. F. de Abreu, O. Pacheco, and P. Almeida, “User Identification: A Key Factor for Elderly Viewers to Benefit from Interactive Television Services,” in ENTERprise Information Systems, M. M. Cruz-Cunha, J. Varajão, P. Powell, and R. Martinho, Eds. Springer Berlin Heidelberg, 2011, pp. 40–48. 38. T. Mlakar, J. Zaletelj, and J. F. Tasic, “Viewer Authentication for Personalized iTV Services,” in Eighth International Workshop on Image Analysis for Multimedia Interactive Services, 2007. WIAMIS ’07, 2007, pp. 63–63. 39. H. Jabbar, T. Jeong, J. Hwang, and G. Park, “Viewer Identification and Authentication in IPTV using RFID Technique,” IEEE Transactions on Consumer Electronics, vol. 54, no. 1, pp. 105–109, Feb. 2008. 56 References

Editor's Notes

  1. 各位老師,評審委員,大家好,我叫王雋凱,指導教授是羅乃維老師。 我的論文題目是基於近場通訊技術且適用於 IPTV 個人化服務之使用者身分鑑別機制。 這篇論文的主要研究是結合 NFC 行動裝置,設計一個以使用者為中心的個人化 IPTV 服務。
  2. 這是本論文的大綱,我們將分為 6 個章節作說明。
  3. 首先是 Introduction,在這個部份我們會說明研究的背景、動機和目的。
  4. IPTV 的全名是 Internet Protocol Television,它透過網路協定並結合現代技術提供高品質電視內容以及多樣化服務。 與傳統電視相比,它包含了一些獨特的功能,像是: IPTV 系統允許雙向傳輸,讓服務供應商能夠提供互動電視的應用。 然後具備 Time Shifting 機制,可以記錄並儲存電視內容讓使用者在以後觀看。 並且可以針對使用者的不同需求提供個人化服務。 此外還有相對較低的頻寬需求。 也允許多台設備存取,例如電腦、手機及平板。
  5. Set-top Box 就是我們所說的機上盒,是在 IPTV 系統中消費者端的必要設備。 它連接家庭的電視到外部的通訊網路,並且可以轉換接收到的信號顯示在電視螢幕上。
  6. 就目前而言,絕大多數的 IPTV 服務供應商都是透過 Set-top Box 來執行服務授權認證。 Set-top Box 包含了由 IPTV 服務供應商所註冊的硬體識別碼,這樣的認證機制這得整個家庭成員都得到相同的存取權限與服務。 但是家庭服務並不等於個人化服務,每個人的收視習慣與偏好都不同,無法正確識別出正在收視的觀眾,就無法提供適合的服務給個別使用者。 這表示現行的認證機制與我們剛才所提到的 IPTV 提供個人化服務的目標並不一致。
  7. 為了解決這個問題: 首先我們 survey 了關於識別電視觀眾的研究。 然後設計出一個適用於 IPTV 個人化服務的使用者身分鑑別機制。 並且開發一個 prototype system 來證明我們的概念可行。 進而去分析系統安全性與效能。 然後與現有的解決方案作一個綜合性的比較。
  8. 好,那接下來我們進入 Related Work 的部分。
  9. 過去探討電視觀眾識別的研究主要可以分為 5 種類型: 第一種是 password-based 的方法,主要識別的對象是使用者 ID 與密碼。這種方式簡單易於實現,不過安全性相對比較弱,特別容易受到密碼猜測的攻擊。 第二種是基於生物識別技術的方法,目前主要的研究是臉部識別,在電視機前設置一個鏡頭不斷地捕捉收視觀眾的臉部特徵,所以需要比較 powerful 的 Set-top box 來做大量的圖形運算,系統實作也比較複雜,會導致整體成本的提高。 第三種是基於 RFID 的系統,它透過 Set-top Box 來連接一台 RFID reader,然後假設每個使用者都擁有一個 RFID 標籤,透過識別標籤來確定收視的觀眾。不過這種方法有 RFID tag 被盜取冒用以及標籤被複製的潛在問題。 第四種是基於 USIM 的方案,USIM 是一種特別的 SIM 卡嵌入在使用者的手機中,主要是透過上面的 Java Card 運行的小程式來執行認證。但是這種方法認證過程比較複雜,因為牽涉 USIM 所以需要電信業者的配合,也存在可部署性的問題。 第五種是基於藍牙技術的識別方法,透過藍牙功能的 Set-top Box 與使用者的藍牙手機與進行配對來識別使用者,這種方法支援一對多的識別,不過因為藍牙是一種無線技術,也需要考量一些針對藍牙攻擊的防範措施。
  10. 接著介紹我們所使用到的技術,NFC 是以 RFID 為基礎的近距離無線通訊技術,一個 NFC 裝置可以是 NFC reader、NFC tag 或具有 NFC 功能的手機。 NFC 主要被定義成 3 種操作模式: 在 reader or writer mode 下,NFC 手機可以讀取資料或將資料寫入一個 NFC tag。 P2P mode 則是將兩支 NFC 手機碰觸在一起進行資料交換的模式。 而 card emulation mode 可以將 NFC 手機模擬成一張非接觸式智慧卡,與 NFC reader 進行通訊。 在我們的研究中,主要是應用了 card emulation mode 。
  11. Host Card Emulation 是一種以軟體實現的 card emulation,我們簡稱為 HCE。 傳統的 card emulation,需要藉由手機上的 secure element 來實現,它可能置於手機內、嵌在 SIM 卡中,或是放在外接式 SD 卡裡面。 相對來說,HCE 允許 NFC 手機可以繞過 secure element 實現 card emulation,所以成本較低、彈性更高,並且任何一個 App 都可以模擬成一張非接觸式智慧卡。
  12. 接下來要介紹我們所提出的身分鑑別機制。
  13. 這是我們提出的個人化 IPTV 服務的系統架構,主要可以分成三個部份:上方是服務供應商端、左下方是使用者端,而右下方是家庭端。 IPTV Network 表示現有的核心網路和多個伺服器,例如 EPG Server 和 Content Server。另外有一個處於 IPTV 網路外的應用伺服器,它包含網頁伺服器與身分鑑別伺服器的功能,可以展示網頁並執行使用者身分驗證。 步驟 (1) – (4) 是我們設計的主要流程,以及本研究討論的範圍: 首先使用者用它的個人電腦向應用伺服器進行註冊。 然後應用伺服器會去驗證使用者的手機將必要資料傳送給它。 完成註冊之後使用者就可以使用手機開啟 NFC 功能去感應 Set-top Box 上的 NFC reader 進行登入程序。 當使用者身分驗證成功後,就可以開始使用 IPTV 服務。
  14. 我們提出兩個身分鑑別方案,第一個是基於 HMAC 的方法,另一個是基於數位簽章的方法。 在我們的機制下,主要有 3 個階段,包含使用者註冊與身分鑑別階段以及金鑰更新階段: 透過註冊階段讓使用者成為一個合法的 IPTV 服務訂閱人。 經由身分鑑別階段授權 IPTV 服務給合法使用者。 如果使用者有金鑰更改的需求,例如更換手機或金鑰定期更新,我們也設計了一個金鑰更新階段提供使用者更換金鑰的服務。
  15. 這些是我們所用到的符號,稍後介紹我們的協定時,會再說明符號的意義。
  16. (skip)
  17. 我們先說明使用者註冊階段,左邊是基於 HMAC 的方案,右邊是使用數位簽章的方案。 在這個階段中,參與的角色有4個, 𝑼 𝒊 表示使用者 𝒊, 𝑵𝑷 𝒊 表示使用者 𝒊 的 NFC 手機, 𝑷𝑪 𝒊 表示使用者 𝒊 的個人電腦, 𝑨𝑺 𝑺𝑷 表示服務供應商所建置的應用伺服器。 首先使用者用他的個人電腦透過瀏覽器訪問 SP 網站,然後建立 HTTPS 連線。 使用者在註冊表單上填寫必要的個人資訊,包含 Email 與密碼及手機電話號碼,然後送出註冊請求。 當應用伺服器收到請求後,儲存使用者資訊並產生一個隨機驗證碼,經由簡訊傳送到使用者的手機上,然後在網頁上顯示訊息通知使用者接收簡訊。 在這個時候,使用者執行服務供應商的 App,開啟之後手機與應用伺服器建立 SSL/TLS 安全連線。 使用者輸入驗證訊息,傳送給應用伺服器。 然後應用伺服器會驗證訊息是否正確。從這裡開始,兩個方案做的事情開始不一樣。基於 HMAC 方案,應用伺服器會產生一把與使用者的共通金鑰,然後將使用者的 ID 與金鑰傳送給使用者的手機上。在基於數位簽章的方案,應用伺服器則是將它的公鑰與使用者 ID 傳送出去。 使用者手機端收到後將它們儲存到安全儲存空間,基於 HMAC 的方案使用共通金鑰與 ID 計算出 HMAC 值傳送給應用伺服器作驗證。基於數位簽章的方式則是使用者手機端會產生一組非對稱式金鑰,然後使用產生的私鑰將收到的 ID 作為簽章與產生的公鑰傳送給應用伺服器。 基於 HMAC 的方案,應用伺服器使用共通金鑰計算出 HMAC,如果相同,表示使用者已收到正確的 ID 與共通金鑰。基於數位簽章的方式應用伺服器使用收到的公鑰驗證簽章,如果是真的,則完成註冊程序。
  18. 這裡是身分鑑別階段的說明,在這個階段中,參與的角色有一樣有 4 個。 𝑺𝑻𝑩 𝑗 表示一個家庭所安裝的機上盒,它配備了 NFC reader 可以用來感應 NFC 裝置並執行登入程序。 使用者使用 NFC 手機感應 Set-top Box 上的 NFC reader,準備執行登入程序。在 NFC 手機與 NFC reader 通信之前,使用者必須先輸入 PIN 碼,才可以開啟 HCE 模式。 如果 NFC reader 感應到 NFC 手機,會向 NFC 手機發出「SELECT AID」的 command,來確認使用者手機是否已安裝服務供應商的 App。 當 NFC 手機接收到命令後,如果 App 存在,會回傳一個狀態碼表示 OK,然後進行下一個步驟,否則它就會停止登入程序。從第 4 步驟開始,就是我們所設計的身分鑑別協定的核心部份,我們再下一張投影片作詳細說明。
  19. 因為版面大小有限,這兩張圖可以參照紙本論文第 21 及第 32 頁。 接著 NFC reader 會發出一個查詢的命令給 NFC 手機。 NFC 手機收到命令後會回傳使用者 ID 與一個隨機亂數。 然後 Set-top Box 也會產生一個隨機亂數,將使用者 ID與 Set-top Box 的 ID 以及兩個產生的隨機亂數傳送給應用伺服器。 應用伺服器接收到訊息之後,會再產生一個隨機亂數,在我們所設計的 HMAC 方案中,會利用與使用者的共通金鑰以及 Set-top Box 的共通金鑰,結合產生的隨機亂數計算出兩個 HMAC 值,這邊我們用 M1 以及 M2 來表示,然後連同應用伺服器產生的隨機亂數回傳給 Set-top Box 作驗證。 M2 是結合 Set-top Box 所產生的隨機亂數計算出來的,如果 Set-top Box 如果計算出相同的 HMAC 值,代表應用伺服器合法,然後再產生一個亂數送給 NFC 手機。 NFC 手機會利用與應用伺服器的共通金鑰計算出 HMAC 值是否相同,如果一樣,那它會產生一個亂數並計算出 M3,然後回傳給 Set-top Box。 Set-top Box 接著再用共通金鑰計算出 M4,然後將 M3、M4 以及新產生的亂數傳送給應用伺服器作認證。 如果應用伺服能夠計算出相同的 HMAC 值,則代表使用者通過認證,否則拒絕登入請求。 基本上數位簽章的方法流程與 HMAC 方案大同小異,主要差別是使用非對稱式金鑰,以私鑰產生的數位簽章來取代 HMAC 值,然後透過公鑰來驗證產生的簽章是否合法。
  20. 金鑰更新階段與使用者註冊階段大致相同,主要不同的地方在於使用者已經註冊了帳號,所以只需要登入他先前所註冊的帳號,然後要求金鑰更改就可執行後續的動作。
  21. 接下來我們評估系統安全性以及效能分析。
  22. 在進行安全性分析前,我們先確立系統的 trust boundary。 在我們的機制中,有 5 個 components 和 4 個用於傳輸資料的 channels,我們假設使用者的 NFC 手機是可信賴設備,因為在大多數情況下,它是一個私有的配件。 而 Set-top Box 與 NFC reader 透過 USB 介面連接,因此我們可以將它們看作是一部份。 與後端 Server 的連線是基於 SSL/TLS 連線,然後我們假設應用伺服器與資料庫之間的存取是可信賴的。
  23. 這邊是我們所列出的一些基本假設,比較需要注意的是 NFC 通道是不安全的,因為傳輸的資料有可能被攔截。 然後 Set-top Box 處在一個開放的環境中,容易被攻擊,並且任何人皆可以使用 NFC 手機進行登入。
  24. 經由分析,我們設計的 protocol 可以提供雙向鑑別,可以抵擋使用者假冒攻擊和伺服器偽裝攻擊,也可以防止 Replay Attack 和 Man-in-the-Middle Attack。 我們在下一張投影片說明。
  25. 首先說明雙向鑑別的部份,在 HMAC 方案中,使用者與應用伺服器有一把共通金鑰,用來計算正確的 HMAC 值,因為第三方沒有這把金鑰無法計算出正確的 HMAC 值,所以無法通過認證。 在數位簽章的方法中,使用者與應用伺服器各有一對非對稱式金鑰,私鑰用來產生簽章,公鑰用來驗證簽章,因為第三方無法取得私鑰,沒辦法產生正確的簽章,所以也不可能通過認證。 因此兩個方案都提供了雙向鑑別的功能,可以抵擋使用者與伺服器的假冒攻擊。
  26. 我們在給個訊息中都包含了新鮮的隨機亂數,這個亂數只能被使用一次而且不會重複,如果伺服器發現前後亂數不一致,那麼它可以偵測出這可能是一個重送攻擊,然後拒絕登入請求。
  27. Set-top Box 與應用伺服器之間的連線是基於 SSL/TLS,所以不會被竊聽或修改資料。 NFC 通道本身是不安全的,但由於它短距離通訊的特性,而且傳送訊息的速度非常快,因此實務上不可能在 NFC 的通道中應用中間人攻擊。
  28. 為了進行實驗,我們實作了一個 Prototype System,這個系統包含了應用伺服器、Set-top Box 與 NFC 手機。 應用伺服器提供一個平台讓使用者進行註冊以及金鑰更改的請求。 Set-top Box 透過 USB 介面連接一個 NFC reader,然後我們在上面寫了一個應用程式可以和 NFC 手機通訊並連線到應用伺服器執行認證。 在 NFC 手機上,我們開發的一個 App,可以將手機模擬成一張非接觸式智慧卡,和 NFC reader 交換資料。
  29. 關於實驗設備,我們使用一台電腦作為應用伺服器。 這是它的規格。
  30. 我們使用型號 Model B plus 的 Raspberry Pi 作為 Set-top Box,然後使用 ACR122U 型號的 NFC reader。
  31. 我們使用 Samsung Galaxy Note II 作為使用者的 NFC 手機。 需要注意的是,Android 作業系統版本 4.4 以上才支援 Host Card Emulation,為了滿足系統需求,使用者手機作業系統必須為 Android 4.4 或更高的版本,並且具備 NFC 與 HCE 功能。
  32. 這是我們所開發的 prototype system 的畫面截圖,使用者準備進行認證前的畫面。
  33. 然後使用者認證成功後會轉換到我們設計的主畫面。
  34. 這是實際的系統展示圖,我們有一支用來測試的 NFC 手機,一個連接 NFC reader 的 Set-top Box 和一個用來顯示畫面的螢幕。
  35. 在這邊我們用影片簡單地呈現我們的系統登入功能。 使用者用 NFC 手機去感應 Set-top Box 上的 NFC reader,如果驗證成功就會轉換到系統的主畫面。
  36. 接著我們說明效能測試。 基於 HMAC 身分鑑別方案,我們分別使用 MD5、SHA1、SHA256、SHA384 及 SHA512 的雜湊演算法,並考慮 80、112、128、192、256 等位元的金鑰長度下進行測試。 表格所呈現的是測試數據。
  37. (skip)
  38. 基於數位簽章的身分鑑別方案,我們使用 DSA 與 ECDSA 演算法,並考慮 1024、2048、3072 等位元的金鑰長度。 在正式進行實驗之前我們也測試過 RSA 演算法,最後沒有採用的原因是因為 NFC card emulation 是基於 smart card 協定,它的最大附加資料量為 255 bytes,在這個限制下,因為 RSA 產生的簽章長度過長,所以我們沒有將 RSA 納入考量。 表格所呈現的是測試數據。
  39. (skip)
  40. 這張圖是我們使用演算法的綜合比較,大體來說 HMAC 所呈現的效能是比較好的。
  41. 根據測試結果我們作一個小結,HMAC 整體表現比數位簽章優異。 而在相同安全強度的條件下,對於 HMAC 而言,選用的演算法是影響效能的主要因素。 對於數位簽章而言,金鑰長度是影響效能的主要因素。
  42. 接下來我們針對提出的機制作了一些討論與比較。
  43. 首先我們討論系統的易用性。 NFC 是一種對使用者友善的技術,使用者不需具備其背景知識,只要將設備感應目標裝置,就可以完成通訊。 因為我們採用非密碼的身分鑑別方案,使用者不需要記憶及管理密碼,所以密碼猜測攻擊在我們的機制中是無效的。
  44. 然後我們考慮系統的實際部署。在硬體需求的部分,為了使用 NFC 功能,需要在 Set-top Box 上加入 NFC 模組。 在我們的實驗中,Set-top Box 使用 USB 介面來連接 NFC reader。目前,具 NFC 功能的 Set-top Box 已經被開發出來,它已內建 NFC 功能,這可以更容易地整合我們所提出的鑑別機制。 對於使用者而言,額外的成本是需具備 NFC 功能的手機。不過現在幾乎人手一支智慧型手機,而且根據 IDC 的調查報告指出,支援 NFC 及 HCE 的手機市場占有率在 2014 年第 2 季已達到將近 85%,所以我們認為這在未來不會是一個障礙。
  45. 在服務擴展性的部份,我們利用使用者的手機作為鑑別目標,所以可以很容易地整合行動 IPTV 服務。 透過服務供應商開發的 App,使用者可隨時隨地收看電視節目。 根據使用者的收視行為,可以提供個人化的電子節目表,甚至將手機當成電視遙控器使用。
  46. 如果考量到不是所有人都有 NFC 手機,我們可以加入代理標籤的概念套用到我們的機制中。 我們的代理標籤是一個標準的 NFC tag,一個合法使用者可以授予臨時權限將必要的資料寫入標籤中,代替使用者執行認證。 這在 NFC 的操作模式中,是一個典型的 reader and writer mode。 下面這張表格是一個範例,例如第 1 個 tag 可以收看電視 10 次,只被允許觀看第 10 頻道,並且只能用家中電視收看。第 2 個 tag 可以觀看 24 小時,有權觀看所有頻道,並且可以透過平板電腦收看節目。依此類推。
  47. 前面我們已經比較過兩個方案的效能,基於 HMAC 優於數位簽章方案。而兩個方案都提供了資料完整性以及身分確認的功能。 但基於 HMAC 之方案無法向第三方提供證明與不可否認性。這是因為 HMAC 使用的是共通金鑰,只有使用者與應用伺服器擁有,第三方無法計算出正確的 HMAC 值,並且 HMAC 有可能是由使用者或應用伺服器所計算出來的,所以不具備不可否認性。 對於數位簽章方案而言,使用私鑰產生簽章,公鑰進行驗章。因公鑰是可公開的,任何對象都可以驗章,因此可以向第三方提供認證以及不可否認性。
  48. 在我們進行數位簽章方案的實驗中,使用者的金鑰對是自行產生後傳送給應用伺服器。 在實際部署的情況下,我們可以加入一個可信賴的第三方作為憑證中心,來確保公鑰確實是來自目標使用者。
  49. 這是與其它方案的比較,我們已經在 related work 討論它們的優缺點。 在我們在提出的兩個方案下,識別目標分別是 HMAC 值和簽章,透過 IPTV 服務供應商所建置應用伺服器來驗證使用者是否為合法。
  50. 最後是結論。
  51. 在這篇論文中,我們提出一個基於 NFC 技術的使用者鑑別機制,並提出兩個方案。 基於 HMAC 的鑑別方案具有輕量化及快速認證的優點,而基於數位簽章的方法則特別適用於設計開放式的服務。 我們認為提出的機制是適用於個人化的 IPTV 服務,並且可以應用在現實的環境中。
  52. 我的報告到此結束,懇請各位評審委員給予指教,謝謝! (next)