Share Email Print

Proceedings Paper

Analysis of security mechanism in EPONs
Author(s): Chuanqing Cheng; Li Wang
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

The security of EPON system means information security, which involves the Confidentiality, integrity, availability, and controllabitlity. EPON is combined by PON technology and ETHERNET technology. So the analysis of its security mechanism must aim to the character of PON and ETHERNET. The applying environment and network topology should also be considered. In this paper we propose the security model of triple churning o support date encryption and decryption to avoid ONU receiving other ONU's information. We analyze security models in EPON reference model. This paper introduce the churning and de-Churning scheme, include the single churning and the triple churning, the detail of the key message mutual process and the key update process.

Paper Details

Date Published: 19 November 2007
PDF: 7 pages
Proc. SPIE 6784, Network Architectures, Management, and Applications V, 67843U (19 November 2007); doi: 10.1117/12.745431
Show Author Affiliations
Chuanqing Cheng, Wuhan Univ. of Science and Engineering (China)
Li Wang, Wuhan Univ. (China)
Fiberhome Communication Technologies Co. Ltd. (China)

Published in SPIE Proceedings Vol. 6784:
Network Architectures, Management, and Applications V
Jianli Wang; Gee-Kung Chang; Yoshio Itaya; Herwig Zech, Editor(s)

© SPIE. Terms of Use
Back to Top