Vulnerability Assessment and Security of Scalable and Bandwidth Elastic Next Generation PONs
نویسندگان
چکیده
The next generation WDM/TDM-PON is scalable and delivers elastically ultra-high data rates to thousands of end-users, and therefore network security becomes particularly important. We identify different levels of security and responsibilities in the communications network, we identify vulnerabilities in the optical access network and we describe the security features of the next generation PON network.
منابع مشابه
ملزومات امنیتی پیادهسازی IMS SIP سرور امن
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
متن کاملModel-based Vulnerability Analysis of IMS Network
IP Multimedia Subsystem (IMS) as the core of Next Generation Network (NGN), its security is vital important. However, IMS is a network with openarchitecture based on IP, which brings a lot of security issues. There has already some research results about IMS security, but systematic and model-based research results are lacked. Based on TVRA method, this paper establishes a comprehensive vulnera...
متن کاملVulnerability Evaluation of Multimedia Subsystem Based on Complex Network
IP multimedia subsystems bring huge security threats to the IMS-based next-generation networks although they bring IMS-based network integration and business ability enhancement. Therefore, the research on the vulnerability of IP multimedia subsystems attracts widespread attention recently. In this article, the security threats of next-generation core networks are discussed first. And then we a...
متن کاملAnalysis of Next Generation PON Architecture for Optical Broadband Access Networks
In this paper we have proposed a next generation hybrid WDM/TDM based PON architecture. We have analyzed the role of WDM in access networks, the challenges and strategies to enable smooth and economical migration from current TDM-PONs to future WDM-PONs. The proposed architecture is based on collector ring and distributed star networks that can support both existing TDMPONs and new WDM-PONs. Th...
متن کاملNew Tool And Technique For Remote Operating System Fingerprinting
Information gathering is an essential part of acute vulnerability assessment, especially when the whole process is automated. In this context, host Operating System detection must be precise, even when networks are well defended. We present an original Operating System detection method, based on temporal response analysis. As a proof of concept, we release the open source tool called RING – for...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007