首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Research on Encryption Mechanism of Ethernet Passive Optical Network
作者姓名:XU Wei-liang  FAN hong.Guangdong Mobile Communication Co.LTD Shunde Branch  Fushan  P.R. China.College of Optoelectronic Engineering  Nanjing University of Posts and Telecommunications  Nanjing  P.R. China
作者单位:XU Wei-liang1,FAN hong21.Guangdong Mobile Communication Co.LTD Shunde Branch,Fushan 528300,P.R. China2.College of Optoelectronic Engineering,Nanjing University of Posts and Telecommunications,Nanjing 210003,P.R. China
摘    要:1Introduction Thebackbonenetworkshaveexperiencedsubstantial changesinthelastdecade;however,littlehaschanged intheaccessnetwork.Recently,PassiveOpticalNet works(PON)seemtobereadyforcommercialdeploy mentinaccessnetworksduetothematurityofanum berofenablingte…

收稿时间:10 January 2005

Research on Encryption Mechanism of Ethernet Passive Optical Network
XU Wei-liang,FAN hong.Guangdong Mobile Communication Co.LTD Shunde Branch,Fushan ,P.R. China.College of Optoelectronic Engineering,Nanjing University of Posts and Telecommunications,Nanjing ,P.R. China.Research on Encryption Mechanism of Ethernet Passive Optical Network[J].The Journal of China Universities of Posts and Telecommunications,2006,13(2):95-98.
Authors:XU Wei-liang  FAN hong
Institution:1. Guangdong Mobile Communication Co. LTD Shunde Branch, Fushan 528300, P.R. China;2. College of Optoelectronic Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, P.R. China
Abstract:An ethernet-passive-optical-network consists of one optical-line-terminator and multiple optical-network-units with passive optical components. The network is susceptible to variable security threats. In this paper we propose a security model and an encryption layer placed at reconciliation sublayer. We also propose advanced encryption standard as an ideal cipher algorithm to encrypt downstream data. We then discuss three different methods to solve the problem of the last plaintext group, and the methods are realized on digital signal processing. Finally, we study efficiency and delay issues of the three methods.
Keywords:EPON  security  encryption  AES  pad
本文献已被 CNKI 万方数据 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号