One of the promising multimedia services is the mobile pay-TV
service. Due to its wireless nature, mobile pay-TV is vulnerable to attacks
especially during hand-off. In 2011, an efficient anonymous authentication
protocol for mobile pay-TV is proposed. The authors claim that their scheme
provides an anonymous authentication to users by preventing intruders from
obtaining users’ IDs during the mutual authentication between mobile subscribers and
head end systems. However, after analysis, it was found that the scheme does
not provide anonymous authentication and users can be easily tracked while using
their anonymous identity. The scheme is also subject to denial of service
attack. In this paper the deficiencies of the original scheme are demonstrated, and then a proposed improved scheme that eliminates these deficiencies is
Cite this paper
W. Khedr, "On the Security of Anonymous Authentication Protocol for Mobile Pay-TV," Journal of Information Security
, Vol. 4 No. 4, 2013, pp. 225-233. doi: 10.4236/jis.2013.44025
 H. S. L. Pequeno, G. A. M. Gomes, R. M. C. Andrade, J. N. de Souza and M. F. de Castro, “FrameIDTV: A Framework for Developing Interactive Applications on Digital Television Environments,” Journal of Network and Computer Applications, Vol. 33, No. 4, 2010, pp. 503-511.
 H.-M. Sun and M.-C. Leu, “An Efficient Authentication Scheme for Access Control in Mobile Pay-TV Systems,” IEEE Transactions on Multimedia, Vol. 11, No. 5, 2009, pp. 947-959.
http://dx.doi.org/10. 1109/TMM. 2009.2021790
 X. Li, J. Niu, M. Khurram Khan and J. Liao, “An Enhanced Smart Card Based Remote User Password Authentication Scheme,” Journal of Network and Computer Applications, Vol. 36, No. 5, 2013, pp. 1365-1371.
 X. Li, Y. Xiong, J. Ma and W. Wang, “An Efficient and Security Dynamic Identity Based Authentication Protocol for Multi-Server Architecture Using Smart Cards,” Journal of Network and Computer Applications, Vol. 35, No. 2, 2012, pp. 763-769.
 Z. Tan, “A Lightweight Conditional Privacy-Preserving Authentication and Access Control Scheme for Pervasive Computing Environments,” Journal of Network and Computer Applications, Vol. 35, No. 6, 2012, pp. 1839-1846.
 N.-Y. Lee, C.-C. Chang, C.-L. Lin and T. Hwang, “Privacy and Non-Repudiation on Pay-TV Systems,” IEEE Transactions on Consumer Electronics, Vol. 46, No. 1, 2000, pp. 20-27. http://dx.doi.org/ 10.1109/30. 826376
 R. Song and L. Korba, “Pay-TV System with Strong Privacy and Non-Repudiation Protection,” IEEE Transactions on Consumer Electronics, Vol. 49, No. 2, 2003, pp. 408-413. http://dx.doi.org/10.1109/ TCE.2003.1209533
 S. F. Yeung, J. C. Lui and D. K. Yau, “A Multikey Secure Multimedia Proxy Using Asymmetric Reversible Parametric Sequences: Theory, Design and Implementation,” IEEE Transactions on Multimedia, Vol. 7, No. 2, 2005, pp. 330-338.
 H. Roh and S. Jung, “An Authentication Scheme for Consumer Electronic Devices Accessing Mobile IPTV Service From Home Networks,” 2011 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, 9-12 January 2011, pp. 717-718.
 Y.-L. Huang, S. Shieh, F.-S. Ho and J.-C. Wang, “Efficient Key Distribution Schemes for Secure Media Delivery in Pay-TV Systems,” IEEE Transactions on Multimedia, Vol. 6, No. 5, 2004, pp. 760-769.
 H.-M. Sun, C.-M. Chen and C.-Z. Shieh, “Flexible-Payper-Channel: A New Model for Content Access Control in Pay-TV Broadcasting Systems,” IEEE Transactions on Multimedia, Vol. 10, No. 5, 2008, pp. 1109-1120.
 R. Di Pietro and R. Molva, “An Optimal Probabilistic Solution for Information Confinement, Privacy, and Security in RFID Systems,” Journal of Network and Computer Applications, Vol. 34, No. 3, 2011, pp. 853-863.
 W. I. Khedr, “SRFID: A Hash-Based Security Scheme for Low Cost RFID Systems,” Egyptian Informatics Journal, Vol. 14, No. 1, 2013, pp. 89-98.
 T.-H. Chen, Y.-C. Chen, W.-K. Shih and H.-W. Wei, “An Efficient Anonymous Authentication Protocol for Mobile Pay-TV,” Journal of Network and Computer Applications, Vol. 34, No. 4, 2011, pp. 1131-1137.
 J.-H. Yang and C.-C. Chang, “An ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on Elliptic Curve Cryptosystem,” Computers & Security, Vol. 28, No. 3-4, 2009, pp. 138-143.
 WMF-T33-107-R020v02, “Architecture, detailed Protocols and Procedures,” 2012.
 OpenSSL, “OpenSSL 1.0.1e,” 2013.