Security model and authentication protocol in EPON-based optical access network

被引:0
作者
Roh, SS [1 ]
Kim, SH [1 ]
机构
[1] Gwangju Univ, Div Comp Elect & Commun, Gwangju 503703, South Korea
来源
ICTON 2003: 5TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOL 1, PROCEEDINGS | 2003年
关键词
EPON; security; authentication; encryption; optical access network;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An EPON, which is going on standardization in IEEE 802.3ah, consists of a OLT and multiple ONU using passive optical components. So this network is susceptible to variable security threats such as eavesdropping, masquerading, denial of service and so on. In this paper we propose the security model and the security protocol to support authentication in EPON based optical access network. We analyze security threats and security models in EPON reference model. After considering these models, we propose that encryption layer is placed at RS Layer. This paper proposes an authentication protocol based on public key exchange and a key establishment protocol. User authentication and ONU authentication are performed separately to efficient key management and strong authentication service.
引用
收藏
页码:99 / 102
页数:4
相关论文
共 50 条
[21]   New broadband access technology: Ethernet passive optical network (EPON) [J].
Zhu, LL ;
Fan, XL ;
He, Y .
APOC 2003: ASIA-PACIFIC OPTICAL AND WIRELESS COMMUNICATIONS; NETWORK ARCHITECTURES, MANAGEMENT, AND APPLICATIONS, PTS 1 AND 2, 2003, 5282 :182-192
[22]   Towards a New Security Approach Based on Heartbeat Authentication to Ensure Security of Cloud Data Access [J].
Hammami, Hamza ;
Brahmi, Hanen ;
Ben Yahia, Sadok .
2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, :37-43
[23]   Security authentication protocol for RFID based on PRESENT algorithm [J].
Zhang, Xing ;
Han, Dong ;
Cao, Guang-Hui ;
Jia, Xu .
Tongxin Xuebao/Journal on Communications, 2015, 36
[24]   Authentication Protocol of RFID System Based on Security Policy [J].
Wang, Guichao ;
Wang, Yan ;
Li, Yongzhen .
2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, :1242-1246
[25]   Privacy preserving model-based authentication and data security in cloud computing [J].
Pawar, Ankush Balaram ;
Ghumbre, Shashikant U. ;
Jogdand, Rashmi M. .
INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) :173-190
[26]   An Overview on Security Issues in The Optical Access Network [J].
Atan, F. M. ;
MZin, A. ;
Ismail, N. A. ;
Zulkifli, N. ;
Idrus, S. M. .
2018 IEEE 7TH INTERNATIONAL CONFERENCE ON PHOTONICS (ICP), 2018,
[27]   Benchmarking the security protocol and data model (SPDM) for component authentication [J].
Alves, Renan C. A. ;
Albertini, Bruno C. ;
Simplicio Jr, Marcos A. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (03)
[28]   A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones [J].
Mahmood, Khalid ;
Ghaffar, Zahid ;
Farooq, Muhammad ;
Yahya, Khalid ;
Das, Ashok Kumar ;
Chaudhry, Shehzad Ashraf .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (12) :22301-22309
[29]   Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol [J].
Bagheri, Nasour ;
Bendavid, Ygal ;
Safkhani, Masoumeh ;
Rostampour, Samad .
FUTURE INTERNET, 2024, 16 (01)
[30]   A Lightweight Authentication Protocol for UAV Networks Based on Security and Computational Resource Optimization [J].
Lei, Yuan ;
Zeng, Lining ;
Li, Yan-Xing ;
Wang, Mei-Xia ;
Qin, Haisheng .
IEEE ACCESS, 2021, 9 :53769-53785