Lightweight Key Distribution Protocol for Streaming Media DRM

Hao Li, Tang Xuyue, Jiayin Tian, Jianbo Liu, Cheng Yang
2016 International Journal of Security and Its Applications  
In the daily-real systems, protecting the data only is far less enough. The process about the generation, distribution, storage, and the revocation of the key is the core problem in the system-security consideration. If the management of the key is insecure, attackers could easily get the key used in the encryption steps to the context, leading to useless processing in the encryption no matter how secure the system be. Unlike the period of validity for the different key, the key can easily be
more » ... tacked by various methods due to its distribution through the complex net links, which would bring about the threatening of the security. In this paper, we analyze three models of the key distribution, associated with the actual applications for the encryption in the hypermedia video stream. Besides, we raise up a new protocol based on the IKEV2 distribution protocol and evaluate the stability when it suffer the Man-in -the-Middle Attacks, DoS and Replay attacks.
doi:10.14257/ijsia.2016.10.9.26 fatcat:a3d7gm2qzrekbcrgvcp3y2xgpy