期刊文献+

EPON系统中的认证与加密机制研究 被引量:3

Research of the encryption and authentication mechanism in EPON
下载PDF
导出
摘要 EPON通信系统采用点对多点通信模式,而这种通信模式使得OLT与ONU通信过程中存在非法接入、窃听、伪造等安全威胁,针对这种情况,提出了一种基于SHA-256散列算法及AES加密算法的认证、密钥更新、加密技术来解决上述安全威胁,并对方案中认证、会话密钥生成和密钥更新各阶段进行了详细分析。 EPON communication system using a point-to-multipoint communication mode, Which is faced with a series of security threats due to its communication mode, such as illegal access, eavesdropping, imper- sonation and other security threats. The paper proposed a kind of authentication, key updating,encryption technique, based on the SHA-256 hash algorithm.Furthermore, this paper analyzes the certification stage, the session key generation and key update stage in detial.
出处 《光通信技术》 CSCD 北大核心 2012年第6期17-20,共4页 Optical Communication Technology
基金 重庆市科技攻关计划项目(2011AB2096)资助 重庆市自然科学基金项目(csct2011jjA40040)资助 重庆市教委科学技术研究项目(KJ110510)资助 汽车电子与嵌入式系统理论 技术及应用项目(201014)
关键词 EPON 认证 加密 SHA-256散列算法 AES算法 EPON authentication encrypt SHA-256 hashing algorithm AES algorithm
  • 相关文献

参考文献8

  • 1赵丹,朱娜,赵红.EPON安全问题探悉[J].计算机应用研究,2009,26(2):719-722. 被引量:4
  • 2IEEE Std 802.3ah-2004[S]. 2004.
  • 3Sun Zhongwei, Huo Sitian, Ma Yaning. Security Mechanism For Smart Distribution Grid Using Ethemet Passive Optical Network [C]. IEEE.2010:246-250.
  • 4孙中伟,马亚宁,王一蓉,霍司天,徐光年.基于EPON的配电网自动化通信系统及其安全机制[J].电力系统自动化,2010,34(8):72-75. 被引量:69
  • 5Xianghua Chen, Guoehu Shou, Zhigang Guo etc. Encryption and Au- thentication Mechanism of 10G EPON Systems Based on GCM[C].IEEE,2010.
  • 6接入网技术要求一基于IEEE802.1x的认证系统[S].2002.
  • 7杨宗凯,何岩,张傲.EPON系统安全机制研究及实现[J].重庆邮电学院学报(自然科学版),2006,18(5):553-557. 被引量:3
  • 8Zhongwei Sun, Hongbin Zhang, Jing Ma. Key Management for Ad- vanced Power Distribution System Using EPON[C].IEEE,2010:1-5.

二级参考文献16

  • 1孟玉,姜涛,肖定中.EPON上行接入技术的实现[J].重庆邮电学院学报(自然科学版),2004,16(6):61-64. 被引量:2
  • 2黄绪勇,刘沛,苗世洪,吴昕.无线传感自组网在电力监控中的应用动态[J].电力系统自动化,2007,31(7):99-103. 被引量:52
  • 3GUNGOR V C, LAMBERT F C. A survey on communication networks for electric system automation. Computer Networks, 2006, 50(3): 877- 897.
  • 4CHOI T, LEE K Y, LEE D R, et al. Communication system for distribution automation using CDMA. IEEE Trans on Power Delivery, 2008, 23(2): 650-655.
  • 5MENG Yu, JIANG Tao, XIAO Dingzhong. Analysis and solutions of security issue in Ethernet PON// Proceedings of Conference on Network Architectures, Management and Application II: Proceedings of SPIE: Vol 5626, November 9 11, 2004, Beijing, China: 391-399.
  • 6R OH S S, KIM S H, KIM G H. Design of authentication and key exchange protocol in EPON optical access network// Proceedings of International Conference on Computational Science and Its Application, May 14-17, 2004, Assisi, Italy. Berlin, Germany: Springer-Verlag, 2004: 1035-1043.
  • 7YD/T1475-2006接入网技术要求--基于以太网方式的无源光网络(EPON).2006.
  • 8MAO W. Modern cryptography: theory and practice. Upper Saddle River, NJ, USA: Prentice-Hall, 2003.
  • 9苏永智,潘贞存,赵建国,丛伟.基于IEEE 802.16d标准的馈线保护通信方案[J].电力系统自动化,2007,31(15):79-83. 被引量:5
  • 10SALA Dolors.Link Security for IEEE 802 Networks.[EB/OL].(2002-11-21)[2006-05-08].http://www.ieee802.org/3/efm/public/nov02/sec/sala_sec_1_1102.pdf.

共引文献73

同被引文献16

  • 1杨壮,何岩,张傲.基于千兆以太网的无源光网络系统及其实现技术[J].电子学报,2004,32(F12):78-81. 被引量:5
  • 2苏振宇,寿国础,胡怡红.EPON三重搅动加密算法及其安全性分析[J].光通信技术,2007,31(10):20-22. 被引量:8
  • 3林容.“平安鹰潭”天网工程高清视频监控系统总体设计[D].南昌:南昌大学,2011:4-5.
  • 4IEEE.802.3[S].IEEE, Standard 2005.
  • 5KRAMER G.Ethemet Passive Optical Networks [M]. New York: Mc- Graw-HiU, 2005.
  • 6HAJDUCZENIA M,PEDRO R M,SILVA J A .On EPON Security Issues [J].IEEE Commun.Surveys & Tutorials,1 st Quarter,2007,9(1):68-83.
  • 7KIM J.Authentication and Privacy in EPON [C]. IEEE802.3ah Ethernet in the First Mile, 2002.
  • 8MURAKAMI K, FUJIMOTO Y, YOSHIHARA O.Authentication and Encryption in EPON[C].IEEE802.3ah Ethemet in the first mile, 2003.
  • 9GOFF Y L,FRANCE Telecom,YUK/HIRO Fujimoto,et al. Encryption Layer Comparison[C],IEEE 802.3ah Ethemet in the first mile,2003.
  • 10IEEE.IEEE Standard for Broadband over Power line networks: Medi- um Access Control and Physical Layer Specifications [M]. IEEE Std 1901- 2010, 30, December 2010.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部