Security enhanced dynamic bandwidth allocation algorithm against degradation attacks in next generation passive optical networks

被引:3
作者
Atan, F. M. [1 ,2 ]
Zulkifli, N. [1 ]
Idrus, S. M. [1 ]
Ismail, N. A. [1 ,2 ]
Zin, A. M. [1 ,2 ]
Ramli, A. [1 ]
Yusoff, N. Md [3 ]
机构
[1] Univ Teknol Malaysia, Lightwave Commun Res Grp, Johor Baharu, Malaysia
[2] Univ Teknol MARA, Fac Elect Engn, Shah Alam, Selangor, Malaysia
[3] Univ Teknol Malaysia, Razak Fac Technol & Informat, Johor Baharu, Malaysia
关键词
Optical network units; Bandwidth; Passive optical networks; Degradation; Standards; Protocols; Channel allocation; ACCESS NETWORKS; CHALLENGES; TRANSPORT;
D O I
10.1364/JOCN.434739
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The dynamic bandwidth allocation (DBA) algorithm is highly impactful in improving the network performance of gigabit passive optical networks (GPON). However, reports delineating its vulnerability to certain attacks can be found in the literature, thus raising concerns. A degradation attack manipulates the transmission control protocol (TCP) congestion control algorithm, which may impact the received bandwidth of targeted network users. Here, the absence of electronics within the passive splitter renders attack identification in GPONs a significant challenge. Therefore, the current study aimed to propose a secured DBA mechanism known as security enhanced DBA capable of overcoming this particular threat. A detection phase served as a critical component for sensing and subsequently mitigating any abnormal behaviors observed among optical network units (ONUs). Upon identification of the attacker, penalties were imposed to deter the next attack attempt and reestablish the fairness to previously attacked ONUs. The simulation findings revealed throughput improvement of up to 63% due to the security feature offered by the mechanism. Besides, significant improvements for the upstream delay performance recorded at 52%, 60%, and 65% for traffic containers (TCONT) TCONT2, TCONT3, and TCONT4, respectively, were observed in comparison to the non-secure DBA mechanism. Hence, the integration of the security mechanisms in DBA renders it possible to avoid any exploitation of GPON vulnerability in hacking other users' bandwidth. (C) 2021 Optical Society of America
引用
收藏
页码:301 / 311
页数:11
相关论文
共 35 条
[1]  
Aleksic S, 2013, EUR CONF NETW OPTIC, P11, DOI 10.1109/NOC-OCI.2013.6582861
[2]   Efficient transport of packets with QoS in an FSAN-aligned GPON [J].
Angelopoulos, JD ;
Leligou, HC ;
Argyriou, T ;
Zontos, S ;
Ringoot, E ;
Van Caenegem, T .
IEEE COMMUNICATIONS MAGAZINE, 2004, 42 (02) :92-98
[3]  
[Anonymous], 2010, ITU-T Recommendation G987.1
[4]  
[Anonymous], 2009, SERIES G TRANSMISSI, P48
[5]  
Ansari N., 2013, MEDIA ACCESS CONTROL, P23
[6]  
Arokkiam JA, 2014, IEEE GLOB COMM CONF, P2223, DOI 10.1109/GLOCOM.2014.7037138
[7]  
Atan FM, 2018, 2018 IEEE 7TH INTERNATIONAL CONFERENCE ON PHOTONICS (ICP)
[8]  
Bahrani S, 2019, INT CONF ACOUST SPEE, P7988, DOI 10.1109/ICASSP.2019.8683681
[9]   Code-based physical layer secret key generation in passive optical networks [J].
Baldi, Marco ;
Chiaraluce, Franco ;
Incipini, Lorenzo ;
Ruffini, Marco .
AD HOC NETWORKS, 2019, 89 :1-8
[10]   A Survey of Dynamic Bandwidth Assignment Schemes for TDM-Based Passive Optical Network [J].
Butt R.A. ;
Waqar Ashraf M. ;
Faheem M. ;
Idrus S.M. .
Journal of Optical Communications, 2020, 41 (03) :279-293