Analysis of Security Vulnerabilities and Countermeasures of Ethernet Passive Optical Network(EPON)

被引:0
|
作者
Stamatios V.Kartalopoulos [1 ]
Pramode K.Verma [1 ]
机构
[1] School of Electrical and Computer Engineering Telecommunications Systems Program University of Oklahoma-Tulsa Tulsa OK 74135,USA
关键词
EPON; security vulnerabilities; attacks; countermeasures; authentication protocols; key distribution;
D O I
暂无
中图分类号
TN929.1 [光波通信、激光通信];
学科分类号
0803 ;
摘要
Ethernet-based Passive Optical Network(EPON) is considered a very promising solution for the first mile problem of the next generation networks.Due to its particular characteristic of shared media structure,EPON suffers many security vulnerabilities. Communication security must be guaranteed when EPON is applied in practice.This paper gives a general introduction to the EPON system,analyzes the potential threats and attacks pertaining to the EPON system,and presents effective countermea-sures against these threats and attacks with emphasis on the authentication protocols and key distribution.
引用
收藏
页码:17 / 29
页数:13
相关论文
共 50 条
  • [41] Virtual network security: threats, countermeasures, and challenges
    Bays, Leonardo Richter
    Oliveira, Rodrigo Ruas
    Barcellos, Marinho Pilla
    Gaspary, Luciano Paschoal
    Mauro Madeira, Edmundo Roberto
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2015, 6
  • [42] Performance Evaluation of Ethernet-Passive Optical Network with Sleep Mode for Energy Efficiency and Quality of Service
    Jung, Bokrae
    ADVANCED SCIENCE LETTERS, 2016, 22 (11) : 3395 - 3399
  • [43] Analysis of Security Vulnerabilities for IoT Devices
    Kim, Hee-Hyun
    Yoo, Jinho
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2022, 18 (04): : 489 - 499
  • [44] Multipoint Control Protocol With Look-Ahead for Wavelength Division Multiplexed Ethernet Passive Optical Network
    Liu, Xiaomin
    Rouskas, George N.
    He, Feng
    Xiong, Huagang
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2014, 6 (02) : 104 - 113
  • [45] Architecture, Security Vulnerabilities, and the Proposed Countermeasures in Agriculture-Internet-of-Things (AIoT) Systems
    Kansal N.
    Bhushan B.
    Sharma S.
    Studies in Big Data, 2021, 99 : 329 - 353
  • [46] A simulation study of the IPACT protocol for Ethernet Passive Optical Networks
    Casoni, Maurizio
    ICTON 2008: PROCEEDINGS OF 2008 10TH ANNIVERSARY INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOL 4, 2008, : 309 - 311
  • [47] Energy Management Mechanism for Ethernet Passive Optical Networks (EPONs)
    Yan, Ying
    Wong, Shing-Wa
    Valcarenghi, Luca
    Yen, She-Hwa
    Campelo, Divanilson R.
    Yamashita, Shinji
    Kazovsky, Leonid
    Dittmann, Lars
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [48] Discussion About the Computer Network Information Security and Countermeasures
    Hu, Jinsong
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 2, 2011, : 132 - 134
  • [49] Analysis and solutions of security issue in ethernet PON
    Meng, Y
    Jiang, T
    Xiao, DZ
    Network Architectures, Management, and Applications II, Pts 1 and 2, 2005, 5626 : 391 - 399
  • [50] A two-step scheduling algorithm to support dual bandwidth allocation policies in an Ethernet passive optical network
    Lee, HS
    Yoo, TW
    Moon, JH
    Lee, HH
    ETRI JOURNAL, 2004, 26 (02) : 185 - 188