Abstract
Internet of Things (IoT) is increasingly used through smart devices with internet-based networks. Communication and data sharing between these devices have also grown in several ways. It is presenting a new dimension to the whole digital right management (DRM) industry. The main focus of IoT based DRM technology is to facilitate the authorised user for using multimedia content through smart devices. However, threats of information breach between communication channels also rapidly increasing, which is making content distribution a challenging task. Moreover, the computation and communication efficiency along with user privacy also requires an ideal DRM system. To address concerns of security, efficiency and privacy over internet-based networks, we design a content key distribution framework for DRM systems. The security proof of the proposed framework is given in the random oracle model along with informal security analysis. Moreover, the security analysis performed using widely adopted simulation tool, namely, “Automated Validation of Internet Security Protocol and Application (AVISPA)”. The study of performance is conducted, which indicates that it fulfils the requirements of computation and computation efficiency.
Similar content being viewed by others
References
Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuéllar J, Drielsma PH, Héam PC, Kouchnarenko O, Mantovani J et al (2005) The avispa tool for the automated validation of internet security protocols and applications. In: International Conference on Computer Aided Verification, Springer, pp 281–285
Armando A, Basin D, Cuellar J, Rusinowitch M, Viganò L (2006) Avispa: automated validation of internet security protocols and applications. ERCIM News 64(January)
Ashton K, et al. (2009) That internet of things thing. RFID J 22(7):97–114
Bellare M, Pointcheval D, Rogaway P (2000) Authenticated key exchange secure against dictionary attacks. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 139–155
Chang CC, Chang SC, Yang JH (2013) A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment. Secur Commun Netw 6(8):972–984
Chang CC, Yang JH, Wang DW (2010) An efficient and reliable e-drm scheme for mobile environments. Expert Syst Appl 37(9):6176–6181
Chen CL (2008) A secure and traceable e-drm system based on mobile device. Expert Syst Appl 35(3):878–886
Chen HB, Lee WB, Chen TH (2018) A novel drm scheme for accommodating expectations of personal use. Multimedia Tools and Applications, pp 1–16
Chen YY, Wang YJ, Chen CJ (2008) A fair-use drm system based on web service. In: Eighth International Conference on Intelligent Systems Design and Applications, 2008. ISDA’08, vol 3, IEEE, pp 11–16
Conrado C, Kamperman F, Schrijen GJ, Jonker W (2003) Privacy in an identity-based drm system. In: 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings, IEEE, pp 389–395
Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 523–540
Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208
Jung J, Kang D, Lee D, Won D (2017) An improved and secure anonymous biometric-based user authentication with key agreement scheme for the integrated epr information system. Plos One 12(1):e0169414
Kim H (2007) Scalable drm system for media portability. In: Annual Asian Computing Science Conference, Springer, pp 78–85
Lee CC, Li CT, Chen ZW, Lai YM (2018) A biometric-based authentication and anonymity scheme for digital rights management system. Inf Technol Control 47 (2):262–274
Lee CC, Li CT, Chen ZW, Lai YM, Shieh JC (2018) An improved e-drm scheme for mobile environments. J Inf Secur Appl 39:19–30
Lee I, Lee K (2015) The internet of things (iot): applications, investments, and challenges for enterprises. Bus Horiz 58(4):431–440
Lee WB, Wu WJ, Chang CY (2007) A portable drm scheme using smart cards. J Organ Comput Electron Commer 17(3):247–258
Li CT, Weng CY, Lee CC, Wang CC (2015) A hash based remote user authentication and authenticated key agreement scheme for the integrated epr information system. J Med Syst 39(11):144
Mishra D, Das AK, Mukhopadhyay S (2015) An anonymous and secure biometric-based enterprise digital rights management system for mobile environment. Secur Commun Netw 8(18):3383–3404
Odelu V, Das AK, Goswami A (2015) An efficient ecc-based privacy-preserving client authentication protocol with key agreement using smart card. J Inf Secur Appl 21:1–19
Odelu V, Das AK, Wazid M, Conti M (2018) Provably secure authenticated key agreement scheme for smart grid. IEEE Trans Smart Grid 9(3):1900–1910
Peinado M (2006) Binding a digital license to a portable device or the like in a digital rights management (drm) system and checking out/checking in the digital license to/from the portable device or the like. US Patent 7,073,063
Popescu BC, Crispo B, Tanenbaum AS, Kamperman FL (2004) A drm security architecture for home networks. In: Proceedings of the 4th ACM Workshop on Digital Rights Management, ACM, pp 1–10
Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: Vision and challenges. IEEE Internet Things J 3(5):637–646
Sovio S, Asokan N, Nyberg K (2003) Defining authorization domains using virtual devices. In: 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings, IEEE, pp 331–336
Sundmaeker H, Guillemin P, Friess P, Woelfflé S (2010) Vision and challenges for realising the internet of things. Cluster of European Research Projects on the Internet of Things, European Commision 3(3):34–36
Tewari A, Gupta B (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for iot devices using rfid tags. J Supercomput 73(3):1085–1102
Tewari A, Gupta B (2017) A lightweight mutual authentication protocol based on elliptic curve cryptography for iot devices. Int J Adv Intell Paradig 9(2-3):111–121
Wang J, Wang C (2018) Full secure identity-based encryption scheme over lattices for wireless sensor networks in the standard model. International Journal of High Performance Computing and Networking 12(2):111–117
Wang M, Fan K, Pei Q, Wang S, Cao S (2007) A novel digital content protection system based on iris biometric. In: Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007. FSKD 2007, vol 4, IEEE, pp 221–225
Werner SR, Cope WB, McConnell V (2013) Application digital rights management (drm) and portability using a mobile device for authentication. US Patent 8,353,048
Xiao G, Guo J, Da Xu L, Gong Z (2014) User interoperability with heterogeneous iot devices through transformation. IEEE Trans Ind Inform 10 (2):1486–1496
Zhang YC, Yang L, Xu P, Zhan YS (2009) A drm authentication scheme based on smart-card. In: International Conference on Computational Intelligence and Security, 2009. CIS’09, vol 2, IEEE, pp 202–207
Acknowledgements
This work is supported by Science and Engineering Research Board under File No:ECR/2015/000243.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Rana, S., Mishra, D. Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system. Multimed Tools Appl 79, 20319–20341 (2020). https://doi.org/10.1007/s11042-020-08683-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08683-2