Font Size: a A A

The Research And Simulation Of Encryption Scheme For EPON

Posted on:2009-11-29Degree:MasterType:Thesis
Country:ChinaCandidate:F S MengFull Text:PDF
GTID:2178360242966016Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the development of Internet, the capability and transmission rate of the backbone network keep increasing. At the same time, along with the development of Ethernet technology, the bandwidth of residential network such as Local Area Network (LAN) and Customer Premises Network (CPN) is growing rapidly. But the Access network which is between a high capacity LAN and backbone remains the bottleneck of the next generation network. Ethernet Passive Optical Network (EPON), which combines the advantages of both Ethernet and PON, is being considered as a promising solution for next generation broadband access network. However, there are some security attacks in the EPON system.Security property becomes one of issues which need to be solved for EPON.The thesis briefly introduces the system architecture and working principles and advantages of EPON at first, then the Multi-Point MAC Control Protocol (MPCP) is mainly introduced. MPCP performs functions as follows: control auto discovery process, provide timing reference to synchronize ONUs and allocate timeslots or bandwidth to ONUs.Two kinds of security threats eavesdropping and masquerade are mainly analyzed.Authentication and encryption are proposed to counteract security threats.The thesis discusses mainly the encryption techniques and researches the present encryption scheme in depth. Based on the analysis of encryption layer, encryption scope, encryption content and the comparison of the encryption algorithm, we design an encryption project in which AES and ECC are selected as the encryption algorithm. The public key algorithm ECC is performed to encrypt the key of AES and provide mutual authentication between OLT and ONU.The key of AES is updated through new defined key management frame and the key of ECC is updated by GATE/REPORT mechanism.The paper researches the algorithm principles of AES and ECC, implements the encryption scheme by the software programming based on JAVA, realizes the simulation of the whole project and certificates its feasibility.At last, the thesis concludes the main working of the paper and analyses the existing problems and defects in the encryption scheme and software simulation.
Keywords/Search Tags:Ethernet Passive Optical Network(EPON), Key management, Authentication, Encryption, Advanced Encryption Standard(AES), Elliptic Curve Cryptography (ECC)
PDF Full Text Request
Related items