期刊文献+

嵌入时戳的10G EPON高效加密方案研究

Study on Efficient Encryption Scheme with Timestamp Embedded in 10G EPON
下载PDF
导出
摘要 为了保护10G EPON中下行数据的安全,基于10G EPON的测距原理,在加密算法中嵌入时戳信息。改进的安全方案的密钥和密文可随时间变化,同时OLT和ONU可利用时戳在动态测距过程中安全交换密钥,实现密钥的更新同步。实验结果证明了该方案的有效性。 In order to protect downstream traffic in 10G EPON from eavesdropping, the timestamps used in ranging are added into the eneryption algo- rithm. Therefore, the cipher key and text vary with time. Meanwhile, the secure key exchange can be achieved during the dynamic ranging process, to safely update and synchronize the cipher key. The experimental results prove the validity of this scheme.
出处 《电视技术》 北大核心 2014年第3期114-116,共3页 Video Engineering
基金 河南省青年骨干教师资助项目(2012GGJS-251)
关键词 10G EPON 安全 时戳 RC6 10G EPON security timestamp RC6
  • 相关文献

参考文献5

  • 1KAZOVSKY L G,WONG S W,GUDLA V. Challenges in next- genera- tion optical access networks: addressing reach extension and security weaknesses[J]. IET Optoelectronics, 2011,5(4) : 133-43.
  • 2杨晓非,赵婷.基于AES算法改进的蓝牙安全机制研究[J].电视技术,2013,37(5):106-109. 被引量:3
  • 3王一蓉,赵丙镇,袁洲.10G EPON系统关键技术的分析[J].电力系统通信,2012,33(1):93-97. 被引量:2
  • 4TANAKA K. IEEE 802.3av 10G-EPON standardization and its research and development status [ J ]. Journal of Lightwave Technology, 2010, 28 (4) : 651-661.
  • 5EL-FISHAWY N, ABU ZAID 0 M. Quality of eneryption measurement of bitmap images with RC6, MRC6, and Rijndael block cipher algorithms [J]. International Journal of Network Security, 2007, 5(3) :241-251.

二级参考文献10

  • 1李雪梅,欧海文,路而红,童新海.基于FPGA快速AES算法IP核的设计与实现[J].计算机工程与应用,2006,42(24):84-86. 被引量:6
  • 2IEEE Std 802.3av.Infomation technology-Telecommunications and information exchange between systemsLocal and metropolitan area networks-Specific requirements Part 3:Cartier sense multiple access with collision detection (CSMA/CD) access method and physical layer specifications[S].2009.
  • 3HAJDUCZENIAI Marek.Next generation PON systems-cunent status[C].ICTON,2009.
  • 4NAFIE S M,DABAK A G,SCHMIDL T M,et 'al. Enhancements to the Blue-tooth specification[J]. Systems and Computers,2010,35(2):1591-1595.
  • 5LANSFORD J,STEPI{ENS A, NEVO R. WiFi and Bluetooth: enabling coexistence [ J ]. [EEE Network,20 l I , 15 (5) :33-34.
  • 6ZHANG Qitao. On a hardware implementing method of the optimized AES encryption a/gorithm[ C]//Proc. 2010 Second International Conference on Multimedia and Information Technology (MMIT). [ S. 1. ] : IEEE Press,2010:82-84.
  • 7SHEPHERD R. Bluetooth wireless technology ira the home[ J ]. Electron- ics Communication Engineering Journal ,2011,13 (5) : 195-198.
  • 8王莹,何大军.AES加密算法的改进与实现[J].电脑编程技术与维护,2010(17):83-84.
  • 9张毅,叶天翔,马子超.面向移动终端的蓝牙网关设计与实现[J].电视技术,2012,36(5):41-43. 被引量:3
  • 10宣善立,吴永忠,韩江洪,谢华.蓝牙技术安全研究[J].计算机工程,2002,28(9):93-95. 被引量:4

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部