An Improved Authentication Scheme for Digital Rights Management System

dc.authoridhttps://orcid.org/0000-0003-1540-4940en_US
dc.authoridhttps://orcid.org/0000-0002-6570-5306en_US
dc.authoridhttps://orcid.org/0000-0003-3428-9802en_US
dc.authoridhttps://orcid.org/0000-0002-6502-472Xen_US
dc.authoridhttps://orcid.org/0000-0001-9520-330Xen_US
dc.authoridhttps://orcid.org/0000-0002-7378-8009en_US
dc.authoridhttps://orcid.org/0000-0002-9321-6956en_US
dc.contributor.authorHussain, Sajid
dc.contributor.authorBin Zikria, Yousaf
dc.contributor.authorMallah, Ghulam Ali
dc.contributor.authorChen, Chien-Ming
dc.contributor.authorAlshehri, Mohammad Dahman
dc.contributor.authorIshmanov, Farruh
dc.contributor.authorChaudhry, Shehzad Ashraf
dc.date.accessioned2023-10-06T07:39:04Z
dc.date.available2023-10-06T07:39:04Z
dc.date.issued2022en_US
dc.departmentMühendislik ve Mimarlık Fakültesien_US
dc.description.abstractWith the increasing number and popularity of digital content, the management of digital access rights has become an utmost important field. Through digital rights management systems (DRM-S), access to digital contents can be defined and for this, an efficient and secure authentication scheme is required. The DRM authentication schemes can be used to give access or restrict access to digital content. Very recently in 2020, Yu et al. proposed a symmetric hash and xor-based DRM and termed their system to achieve both security and performance efficiency. Contrarily, in this study, we argue that their scheme has several issues including nonresistance to privileged insider and impersonation attacks. Moreover, it is also to show in this study that their scheme has an incorrect authentication phase and due to this incorrectness, the scheme of Yu et al. lacks user scalability. An improved scheme is then proposed to counter the insecurities and incorrectness of the scheme of Yu et al. We prove the security of the proposed scheme using BAN logic. For a clear picture of the security properties, we also provide a textual discussion on the robustness of the proposed scheme. Moreover, due to the usage of symmetric key-based hash functions, the proposed scheme has a comparable performance efficiency.en_US
dc.identifier.doi10.1155/2022/1041880en_US
dc.identifier.endpage11en_US
dc.identifier.issn1530-8669
dc.identifier.issn1530-8677
dc.identifier.scopus2-s2.0-85124431122en_US
dc.identifier.scopusqualityQ2en_US
dc.identifier.startpage1en_US
dc.identifier.urihttps://hdl.handle.net/11363/5778
dc.identifier.urihttps://doi.org/
dc.identifier.volume2022en_US
dc.identifier.wosWOS:000772145600008en_US
dc.identifier.wosqualityN/Aen_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.indekslendigikaynakScopusen_US
dc.institutionauthorChaudhry, Shehzad Ashraf
dc.language.isoenen_US
dc.publisherWILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLANDen_US
dc.relation.ispartofWireless Communications and Mobile Computingen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/*
dc.titleAn Improved Authentication Scheme for Digital Rights Management Systemen_US
dc.typeArticleen_US

Dosyalar

Orijinal paket
Listeleniyor 1 - 1 / 1
Yükleniyor...
Küçük Resim
Ä°sim:
1041880.pdf
Boyut:
833.25 KB
Biçim:
Adobe Portable Document Format
Açıklama:
Makale / Article
Lisans paketi
Listeleniyor 1 - 1 / 1
Küçük Resim Yok
Ä°sim:
license.txt
Boyut:
1.56 KB
Biçim:
Item-specific license agreed upon to submission
Açıklama: