Dent, Alex and Tomlinson, Allan (2004) Regional blackouts: protection of broadcast content on 3G networks. Fifth International Conference on 3G Mobile Communications Technologies, 3G 2004
Full text access: Open
One of the driving forces behind the development of 3G systems is the potential to deliver complex content to consumers. This is evident from the growing collaboration between broadcast and mobile network operators, and the expectation that future broadcast receivers will be able to forward content to mobile devices. One challenge in providing such a service is the requirement for content protection. An aspect of this that is particularly relevant to mobile systems is the ability to control where content is viewed. Although 3G networks can provide location of a user’s receiver, this device may be in a different location from the device that renders the content. Thus the provider cannot be certain where the content will be viewed. This paper proposes two protocols that will provide the location of the end device in a secure manner that can be trusted by the content provider.
This is a Published version This version's date is: 10/2004 This item is peer reviewed
https://repository.royalholloway.ac.uk/items/cc6ec989-b6a7-1563-2524-0ae6c4a14495/1/
Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 23-Dec-2009
[1] ISO, âInformation technology â Multimedia framework (MPEG-21) â part 1: Vision, technologies and strategyâ, Technical Report ISO/IEC TR 21000- 1:2001, International Organization for Standardization (ISO), Geneva, Switzerland, (2001). [2] P. Bahl and V. N. Padmanabhan. âRADAR: An in-building RF-based user location and tracking systemâ, In Proc. IEEE INFOCOM, volume 2, pp. 775â 784, Tel-Aviv, Israel, (2000), IEEE. [3] J. S. Erickson. âFair use, DRM, and trusted computingâ, Communications of the ACM, volume 46, No. 4, pp. 34â39, (2003). [4] European Commission. âSetting up the Galileo joint undertaking, council regulation (EC) no 876/2002â, Official Journal of the EC L 138, page 1, (2002). [5] United Statesâ FAA satellite navigation website, http://gps.faa.gov/ [6] E. Gabber and A. Wool. âHow to prove where you are: Tracking the location of customer equipmentâ, In Proc. Computer and Communications Security, pp. 142â149, San Francisco, CA, USA, (1998). Assoc. Computing Machinery, ACM Press. [7] S. Giordano, I. Stojmenovic, and L. Blazevic. âPosition based routing algorithms for ad hoc networks: A taxonomyâ, In X. Huang X. Cheng and D.Z. Du, editors, Ad Hoc Wireless Networking. Kluwer Academic Publishers, Dordrecht, The Netherlands, (2003), to appear. [8] Renato Iannella. âOpen digital rights language (ODRL)â, Technical Report ODRL-11, The Open Digital Rights Language Initiative, (2002). [9] D. K. Mulligan. âDigital rights management and fair use by designâ, Communications of the ACM, volume 46, No.4, pp. 30â33, (2003). [10] T. Roos, P. Myllymaki, and M. Tirri. âA statistical modeling approach to location estimationâ, IEEE Transactions on Mobile Computing, volume 1, No. 1, pp. 59â69, (2002). [11] N. Sastry, U. Shankar, and D. Wagner. âSecure verification of location claimsâ, In Proc. ACM workshop on wireless security (WiSE â03), pp. 1â10, San Diego, CA, USA, (2003). Assoc. Computing Machinery, ACM Press. [12] M. Valimaki and O. Pitkanen. âDigital rights management on open and semi-open networksâ, In Proc. Second IEEE Workshop on Internet Applications (WIAPP â01), pp. 154â155, IEEE Computer Society, IEEE, (2001). [13] X. Wang. âDigital rights management for broadband content distributionâ, In Proc. 2003 Symposium on Applications and the Internet (SAINT 2003), page 5, IEEE Computer Society, IEEE, (2003).