Proceedings of the 12th International Conference on Security and Cryptography 2015
DOI: 10.5220/0005559903490354
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…PONs commonly enforce only the Registration ID-based Authentication, a mechanism in which the OLT compares a static pre-shared secret, against a secret sent by the ONU. The research community [3]- [6] has pointed out the issues of this mechanism, as it does not authenticate the OLT to the ONU. Moreover, the preshared secret is sent before a secure channel is established, compromising the secret, if a malicious OLT sniffs upstream bursts.…”
Section: A State Of the Artmentioning
confidence: 99%
See 3 more Smart Citations
“…PONs commonly enforce only the Registration ID-based Authentication, a mechanism in which the OLT compares a static pre-shared secret, against a secret sent by the ONU. The research community [3]- [6] has pointed out the issues of this mechanism, as it does not authenticate the OLT to the ONU. Moreover, the preshared secret is sent before a secure channel is established, compromising the secret, if a malicious OLT sniffs upstream bursts.…”
Section: A State Of the Artmentioning
confidence: 99%
“…Aiming at improving the security of PONs, Malina et al [3] and Li et al [4] proposed the use of Public-Key Cryptography (PKC) for SMA based on Diffie-Hellman. Malina et al focused on ITU Gigabit Passive Optical Network (GPON).…”
Section: A State Of the Artmentioning
confidence: 99%
See 2 more Smart Citations
“…During the measurement, secure communication was enabled. The definition of reached states in which communication security can be performed and the prerequisites for negotiating the key are given in [33][34][35]. The entire process is started with the PLOAM message, "request password" containing "Ident Superframe Counter: 499318309."…”
Section: Gpon Frame Structure and Activation Process Analysismentioning
confidence: 99%