Font Size: a A A

Research Of Identify Authentication In IPTV System

Posted on:2008-07-25Degree:MasterType:Thesis
Country:ChinaCandidate:W T RuanFull Text:PDF
GTID:2178360272468574Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the maturity of key technologies such as Audio/Video Compression, CDN, DRM, IP Multicast etc. and the rapid growth of the number of broadband consumers, IPTV is now becoming one of the most popular applications in the area of Broadband Multimedia. As the basement of security of IPTV network and IPTV's DRM, authentication has become the emphasis and hotspot of research.Firstly, in this dissersation an overall study on Identify authentication based on the Kerberos protocol is proposed. Secondly, a detailed analysis is made in authentication strategy of UTStarcom's IPTV project in which the author participated; the weaknesses and strongpoint are indicated also. Finally, the author introduces a new authentication strategy of IPTV which has been designed on the base of the former authentication strategy and the authentication thinking of Kerberos Protocol. The new authentication strategy which has less message flows in cross-realm authentication is compatible, expandable and secure. The primary research contents are summarized as follows:(1) Several Identify authentications are reviewed, and the authentication process and distribution method of secret key of Kerberos are analyzed. This paper also analyses its advantages on authentication security and point out all sort of potential security problems.(2) A detailed analysis has been made in authentication strategy of an IPTV project and reveals its shortcomings and strongpoint.(3) Designing a new authentication strategy and analyzing the reason why it makes up the weaknesses.(4)Using load balance strategy and the thinking of high availability to increase the processing capability and stability.
Keywords/Search Tags:IPTV, Identify authentication, Kerberos protocol, Cross-realm Authentication, High Availability
PDF Full Text Request
Related items