期刊文献+

EPON系统安全机制研究及实现 被引量:3

Study and implementation of EPON system secruity mechanism
下载PDF
导出
摘要 从整个EPON接入网层面全面分析了EPON系统存在的设备、链路和业务3个方面的安全威胁,并据此提出了EPON系统安全的5个主要目标。在对设备的控制功能、设备的接入认证和广播风暴的抑制等进行深入研究后,创新性地提出分3个层次对链路安全进行分析的模型,并重点研究了搅动算法和高级加密算法(AES)在EPON系统内的实现方式,其中涉及算法模式的选择、密钥的产生和同步机制等方面;最后对业务安全进行了研究,对受到普遍关注的组播业务源和ONU端口组播业务的安全给出了高效的解决方案。 From the view of the whole EPON access networks, the security of equipment level, link level and service level in EPON system are studied, and it proposes five security goals in EPON system. After the investigation to equipment's control function, ONU access authentication and broadcast storm suppression, it innovatively proposes a model which could analyze the link security from three levels. Furthermore, it studies on the implementation details of ITUT Churning and Advance Encryption Algorithm (AES) in EPON, which involves encryption mode selection, key generation and key synchronization. At last, it discusses the service security and gives an effective solution to the security of multicast service source control and ONU port multicast service management mechanism.
出处 《重庆邮电学院学报(自然科学版)》 2006年第5期553-557,共5页 Journal of Chongqing University of Posts and Telecommunications(Natural Sciences Edition)
基金 国家"863"计划资助项目(2004AA122310)
关键词 安全 以太网无源光网络 加密模式 先进加密算法 搅动 secruity EPON encryption mode advance encryption algorithm (AES) churning
  • 相关文献

参考文献5

  • 1SALA Dolors.Link Security for IEEE 802 Networks.[EB/OL].(2002-11-21)[2006-05-08].http://www.ieee802.org/3/efm/public/nov02/sec/sala_sec_1_1102.pdf.
  • 2KAUAI.Link Security for IEEE 802 Networks,Call For Interest.[EB/OL].(2002-11-23)[2006-05-08].http://www.ieee802.org/3/efm/public/nov02/p2mp/sala_p2mp_1_1102.pdf.
  • 3THOMAS Stephen,WAGNER David.Insecurity in ATM-based Passive Optical networks[EB/OL].(2002-04-26)[2006-05-08].Http://www.Cs.Berkeley.Edu/~ daw/papers/churn-icc02.Pdf.
  • 4孟玉.EPON系统安全保密技术研究[D].武汉:武汉邮电科学研究院,2004.
  • 5孟玉,姜涛,肖定中.EPON上行接入技术的实现[J].重庆邮电学院学报(自然科学版),2004,16(6):61-64. 被引量:2

二级参考文献5

  • 1GLEN Kramer, BISWANATH Mukherjee.Ethernet PON ( EPON ): Design and analysis of an optical access network [J].Phot. Net. Commun. , 2001,3 (3) :307-319.
  • 2GERRY Pesavento. Ethernet passive optical network ( EPON ) architecture for broadband access [EB/OL]. http : //www.mblast. com/files/companies/85776/Document/Teknovus % 20Article. pdf.
  • 3IEEE Draft 802. 3ah/D1. 9-2003. Media access control parameters, physical layers and management parameters for subscriber access networks[S].
  • 4邹远安,寿国础.EPON几个关键技术的讨论[J].电信科学,2003,19(1):61-63. 被引量:6
  • 5何兴,范红,朱运勃.Ethernet-PON QoS实现方案[J].重庆邮电学院学报(自然科学版),2003,15(3):37-40. 被引量:5

共引文献1

同被引文献14

  • 1赵丹,朱娜,赵红.EPON安全问题探悉[J].计算机应用研究,2009,26(2):719-722. 被引量:4
  • 2高红,石旭刚,林盈盈,陈强.EPON中安全机制的研究[J].光通信技术,2004,28(9):20-22. 被引量:3
  • 3敖立,李青.宽带光接入网——下一代接入网的发展方向[J].电信科学,2006,22(7):25-28. 被引量:2
  • 4HAN KYEONG-SOO, KIM KWANG-OK, YOO TAE WHAN. The Design and Implementation of MAC Security in EPON [M].ICACT2006, 2006.2,20-22.
  • 5ITU G.984.3.Gigabit-capable Passive Optical Networks (G-PON): Transmission convergence layer specification[S].Feb,2004.
  • 6斯托林斯.密码编码学与网络安全-原理与实践[M].刘玉珍,王丽娜,译.第三版.北京:电子工业出版设计,2004.
  • 7IEEE Std 802.3ah-2004[S]. 2004.
  • 8Sun Zhongwei, Huo Sitian, Ma Yaning. Security Mechanism For Smart Distribution Grid Using Ethemet Passive Optical Network [C]. IEEE.2010:246-250.
  • 9Xianghua Chen, Guoehu Shou, Zhigang Guo etc. Encryption and Au- thentication Mechanism of 10G EPON Systems Based on GCM[C].IEEE,2010.
  • 10接入网技术要求一基于IEEE802.1x的认证系统[S].2002.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部