Font Size: a A A

Research On Secure Communication Protocols For TWDM-PON

Posted on:2020-05-06Degree:MasterType:Thesis
Country:ChinaCandidate:X R ZengFull Text:PDF
GTID:2428330590471737Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Classical PON(Passive Optical Network)and quantum PON have always been the research hotspots of access network.The TWDM-PON(Time and Wavelength Division Multiplexing Passive Optical Network),with the advantages of high transmission rate,long communication distance and being able to accommodate a huge number of users,is considered to be an appropriate access network technology to meet the long-term bandwidth demand of users.However,although the architectures of PON have been innovating,their security problems have not been fully resolved.Compared to Ethernet PON,Gigabit-Capable PON and other PONs,TWDM-PON has not only added a lot of specified frame informations in TC(Transmission convergence)layer,but also has higher probability of being attacked due to the rapid increase of the user,which put higer security requirements for the TWDM-PON.In this context,the development status at home and abroad of TWDM-PON is studied,and two protocols are proposed in an attempt to solve the security threats that the system faces in the process of communication.(1)In order to confirm the legitimacy of both parties in the communication process,the thesis designs a two-party CL-AKA(Certificateless Authentication Key Agreement)protocol for TWDM-PON.The one-way registration_based authentication mechanism is improved in the protocol,and the AKA process is embedded in the activation process,which solves the two-way authentication problem of OLT(Optical Line Terminal)and ONUs(Optical Network Units).It provides a basis for the system to complete the encryption work through the main session key in the next step.In addition,the overall protocol flow and related PLOAM(Physical Layer Operation Administration and Maintenance)frames are also designed in detail.After security analysis,algorithm implementation and performance discussion,the protocol can resist the security threats such as eavesdropping,camouflage and bit flip attacks,and will not affect the normal operation of activation work.(2)In order to avoid the system being attacked by quantum-capable eavesdroppers in the process of secure communication,the thesis designs a QBC(Quantum Broadcast Communication)protocol for TWDM-PON.A QBC model is proposed firstly to meet the broadcasting communication requirements of the system,,which combining TDM(Time Division Multiplexing)technology and WDM(Wavelength Division Multiplexing)technology.Through the model,one wavelength can accommodate n users,which can save mn-n wavelength resources,and can expand the number of ONUs that can be accommodated effectively.Meanwhile,a QBC scheme based on EPR state is designed by combining the model.The security analysis shows that this protocol can resist camouflage,interception-forwarding,entanglement-measurement and other attacks.The efficiency analysis shows that compared with other protocols,the models and schemes in this protocol based on TWDM-PON system have higher communication efficiency,moreover,the preparation cost can be reduced effectively because no additional single photon is required.
Keywords/Search Tags:time and wavelength division multiplexing passive optical network, two-way authtication, key agreement quantum broadcast communication, security threat
PDF Full Text Request
Related items