2014
DOI: 10.1016/j.ijleo.2014.06.089
|View full text |Cite
|
Sign up to set email alerts
|

Secure authentication scheme for 10 Gbit/s Ethernet passive optical networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…8 The lack of OLT authentication in EPONs is highlighted by. 9,10 They notice that EPONs contain an automatic discovery and registration process, while a standard authentication mechanism has not been defined. An attacker can introduce a fake OLT to the network that operates in promiscuous mode and disables the Logical Link Identification (LLID) filtering rules in order to eavesdrop sensitive information and gain access to the network resources.…”
Section: Introductionmentioning
confidence: 99%
“…8 The lack of OLT authentication in EPONs is highlighted by. 9,10 They notice that EPONs contain an automatic discovery and registration process, while a standard authentication mechanism has not been defined. An attacker can introduce a fake OLT to the network that operates in promiscuous mode and disables the Logical Link Identification (LLID) filtering rules in order to eavesdrop sensitive information and gain access to the network resources.…”
Section: Introductionmentioning
confidence: 99%
“…In this society of highly developed information technology, authentication technology is particularly important as the first line of defense in information security. In recent years, a series of authentication techniques that use optical structures and principles have been reported [1][2][3][4][5]. Due to its fast operation speed and multi-dimensional information loading, optical identity authentication technology has attracted more and more attention.…”
Section: Introductionmentioning
confidence: 99%