Font Size: a A A

Security Technologies Study Of XG-PON

Posted on:2012-03-25Degree:MasterType:Thesis
Country:ChinaCandidate:X L XuFull Text:PDF
GTID:2178330335459844Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The next generation passive optical network is the major technique choice of broadband access and the FTTx network. There eavesdropping (Eavesdropping) DoS (Denial of Service), fake (Impersonation) and other security threats. With the continuous development of the network, the user demand for bandwidth increases, the development of next-generation passive optical network is imperative. Next-generation passive optical network technology diversity, usually including IEEE802.3av of 10G-EPON, ITU-T's XG-PON1, XG-PON2 and so on. The rate of next-generation passive optical network will reach lOGbps. The increasing high importance of security for users and the more serious consequences of security attacks, so the better need for security guarantees. AES as an American National Standard, the next generation of XG-PON is still using AES encryption technology, it is still can not meet our national security strategy.Based on this problem mainly done the following work:1. Summaried and analyzed the development status of gigabit passive optical network standards and track the progress of XG-PON standardization and system architecture. GPON network faces full investigation of security issues and security solutions adopted, then lead to XG-PON face in terms of security issues.2. Analysis of next-generation optical access network security threats, pointing out that eavesdropping, denial of service and counterfeiting is a major threat facing the optical access network, in particular, may face the threat of the upper link, link encryption from the perspective of the existing optical access network summary discussion of security technology, analysis of the existing multi-byte key encryption algorithm development research,propose a new Aa new encryption technology multi-byte encryption churning.3. Analyze the security of multi-byte churning algorithm and FPGA-based simulation, then analyze multi-byte churning algorithm's security, found that it has the advantage of low-cost, easy implementation and meet the current next-generation PON access the commercial applications rate requirement.4. For the domestic gap research status of XG-PON particular in security, based on multi-byte churred counter mode and authentication algorithm with applications in next-generation passive optical network applications. Proposed Churning-GCM based on next-generation passive optical network encryption and mode. Proposed a new encryption and authentication process scheme prove its security.,Based on the above, we propose to use multi-byte churning-GCM mode of operation to address the XG-PON optical access network security issues. Thus, both the speed to meet the optical access network applications, while GCM can provide good security.Full-text is as follows:Chapter 1 discussed the development of optical access network, especially the next generation optical access network status, summary of domestic and international research on optical access network security situation.Chapter 2 analyzed the exiting GPON standard and track progress of XG-PON, summarized from the link layer perspective used in Gigabit passive optical access network security technologies, including encryption technology churning---AES and its mode of block ciphers and encryption process and so on.Chapter 3 adopt from APON churning and our national security policy point of view, put forward multi-byte encryption algorithm churning, churning, and more weight on the single-byte churningred security of the algorithm for analysis. FPGA-based implementation of a single churning method and algorithm supports multi-byte churning speed and cost comparative analysis of hardware performance, churning algorithm discussed the applicability of XG-PON.Chapter 4 proposed a new encryption and authentication programme based on GCM (Galois Counter Mode) for next-generation passive optical network.Chapter 5 summarized the security of XG-PON and results of this study, forecasted the future development prospects of optical access network security issues.The Conclusion summaried research results of the paper, and forecasted the future development prospects of optical access network security issues.
Keywords/Search Tags:GPON, XG-PON, encryption, churning, GCM
PDF Full Text Request
Related items