An Improved Authentication Scheme for Digital Rights Management System


Creative Commons License

Hussain S., Zikria Y. B., Mallah G. A., Chen C., Alshehri M. D., Ishmanov F., ...More

Wireless Communications and Mobile Computing, vol.2022, 2022 (SCI-Expanded) identifier

  • Publication Type: Article / Article
  • Volume: 2022
  • Publication Date: 2022
  • Doi Number: 10.1155/2022/1041880
  • Journal Name: Wireless Communications and Mobile Computing
  • Journal Indexes: Science Citation Index Expanded (SCI-EXPANDED), Scopus, Aerospace Database, Applied Science & Technology Source, Communication Abstracts, Compendex, Computer & Applied Sciences, INSPEC, Metadex, Directory of Open Access Journals, Civil Engineering Abstracts
  • Istanbul Gelisim University Affiliated: Yes

Abstract

© 2022 Sajid Hussain et al.With the increasing number and popularity of digital content, the management of digital access rights has become an utmost important field. Through digital rights management systems (DRM-S), access to digital contents can be defined and for this, an efficient and secure authentication scheme is required. The DRM authentication schemes can be used to give access or restrict access to digital content. Very recently in 2020, Yu et al. proposed a symmetric hash and xor-based DRM and termed their system to achieve both security and performance efficiency. Contrarily, in this study, we argue that their scheme has several issues including nonresistance to privileged insider and impersonation attacks. Moreover, it is also to show in this study that their scheme has an incorrect authentication phase and due to this incorrectness, the scheme of Yu et al. lacks user scalability. An improved scheme is then proposed to counter the insecurities and incorrectness of the scheme of Yu et al. We prove the security of the proposed scheme using BAN logic. For a clear picture of the security properties, we also provide a textual discussion on the robustness of the proposed scheme. Moreover, due to the usage of symmetric key-based hash functions, the proposed scheme has a comparable performance efficiency.