期刊文献+

Research on Encryption Mechanism of Ethernet Passive Optical Network 被引量:2

Research on Encryption Mechanism of Ethernet Passive Optical Network
原文传递
导出
摘要 An ethernet-passive-optical-network consists of one optical-line-terminator and multiple optical-network-units with passive optical components. The network is susceptible to variable .security threats. In this paper we propose a security model and an encryption layer placed at reconciliation sublayer. We also propose advanced encryption standard as an ideal cipher algorithm to encrypt downstream data, We then discuss three different methods to solve the problem of the last plaintext group, and the methods are realized on digital signal processing. Finally, we study efficiency and delay issues of the three methods. An ethernet-passive-optical-network consists of one optical-line-terminator and multiple optical-network-units with passive optical components. The network is susceptible to variable .security threats. In this paper we propose a security model and an encryption layer placed at reconciliation sublayer. We also propose advanced encryption standard as an ideal cipher algorithm to encrypt downstream data, We then discuss three different methods to solve the problem of the last plaintext group, and the methods are realized on digital signal processing. Finally, we study efficiency and delay issues of the three methods.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2006年第2期95-98,共4页 中国邮电高校学报(英文版)
基金 ThisworkissupportedbytheNaturalScienceResearchoftheEducationDepartmentofJiangsuProvince(01KJP510008).
关键词 EPON SECURITY ENCRYPTION AES PAD EPON security encryption AES pad
  • 相关文献

参考文献6

  • 1ITU-T G.983.1,Broadband Optical Access Systems Based on Passive Optical Networks (PON)[S].
  • 2THOMAS S,WAGNER D.Insecurity in ATM-based passive optical networks[J].IEEE International Conference on Communications:Vol 5,Apr 28-May 2,2002,New York,NY,USA.Piscataway,NJ,USA:IEEE,2002,2803-2805.
  • 3Federal Information Processing Standard (FIPS) for the Advanced Encryption Standard,FIPS17,AES Algorithm (Rijindael) Information[EB/OL].http://csrc.nist.gov/CryptoToolkit/aes/.
  • 4DAEMEN J,KUNDSEN L,RIJMEN V.The block cipher square[J].Dr Dobb's Journal of Software Tools for Professional Programmer,1997,22(10):54.
  • 5JIN KIM.Authentication and Privacy in EPON[EB/OL].http://www.IEEE802.org,2002.
  • 6DOLORS SALA,MCKAMMON K,FrankEffenberger.Efficiency Considerations in EFM[EB/OL].http://www.ieee802.org/3/efm/public/jul02/ p2mp/gummalla_ p2mp_1 _ 0702.pdf,2002.

同被引文献25

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部