Security model and authentication protocol in EPON-based optical access network

被引:0
作者
Roh, SS [1 ]
Kim, SH [1 ]
机构
[1] Gwangju Univ, Div Comp Elect & Commun, Gwangju 503703, South Korea
来源
ICTON 2003: 5TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOL 1, PROCEEDINGS | 2003年
关键词
EPON; security; authentication; encryption; optical access network;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An EPON, which is going on standardization in IEEE 802.3ah, consists of a OLT and multiple ONU using passive optical components. So this network is susceptible to variable security threats such as eavesdropping, masquerading, denial of service and so on. In this paper we propose the security model and the security protocol to support authentication in EPON based optical access network. We analyze security threats and security models in EPON reference model. After considering these models, we propose that encryption layer is placed at RS Layer. This paper proposes an authentication protocol based on public key exchange and a key establishment protocol. User authentication and ONU authentication are performed separately to efficient key management and strong authentication service.
引用
收藏
页码:99 / 102
页数:4
相关论文
共 50 条
[11]   RAD: reinforcement authentication model based on DYMO protocol for MANET [J].
Hamamreh, Rushdi A. A. ;
Ayyad, Mohammed R. R. ;
Abutaha, Mohammed .
INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2023, 16 (01) :46-57
[12]   RFID security authentication protocol based on key update mechanism [J].
Wei, Ruidong ;
Jiang, Lei .
INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 :1395-1401
[13]   Security authentication based on generated address algorithm for software-defined optical communication network [J].
Liu, Tao ;
Tang, Yongli ;
Qin, Panke .
2019 18TH INTERNATIONAL CONFERENCE ON OPTICAL COMMUNICATIONS AND NETWORKS (ICOCN), 2019,
[14]   A Network Authentication Protocol Based on Kerberos [J].
El-Emam, Eman ;
Koutb, Magdy ;
Kelash, Hamdy ;
Allah, Osama Farag .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (08) :17-26
[15]   A New Password Authentication Based On The Dual Model Of Apollonian Network Model [J].
Su, Jing ;
Wang, Hongyu ;
Yao, Bing .
PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, :226-230
[16]   On the Security of a Mutual Authentication and Key Agreement Protocol based on Chaotic Maps [J].
Chen, Chien-Ming ;
Xu, Linlin ;
Zhang, Xiaojie ;
Wu, Tsu-Yang ;
Pan, Jeng-Shyang .
2015 THIRD INTERNATIONAL CONFERENCE ON ROBOT, VISION AND SIGNAL PROCESSING (RVSP), 2015, :143-146
[17]   AN EXTENDED CERTIFICATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS [J].
Lee, Cheng-Chi ;
Liao, I-En ;
Hwang, Min-Shiang .
INFORMATION TECHNOLOGY AND CONTROL, 2009, 38 (01) :61-66
[18]   Analysis of Security Vulnerabilities and Countermeasures of Ethernet Passive Optical Network(EPON) [J].
Stamatios V.Kartalopoulos ;
Pramode K.Verma .
中国通信, 2007, 4 (03) :17-29
[19]   Design and analysis on trusted network equipment access authentication protocol [J].
Lai, Yingxu ;
Chen, Yinong ;
Zou, Qichen ;
Liu, Zenghui ;
Yang, Zhen .
SIMULATION MODELLING PRACTICE AND THEORY, 2015, 51 :157-169
[20]   Analysis of Security Vulnerabilities and Countermeasures of Ethernet Passive Optical Network (EPON) [J].
Jin, Di ;
Kartalopoulos, Stamatios V. ;
Verma, Pramode K. .
CHINA COMMUNICATIONS, 2007, 4 (03) :17-29