Research on Downstream Encryption Scheme Based on Timestamp in GEPON Network
نویسندگان
چکیده
Gigabit Ethernet Passive Optical Network (GEPON) is considered as the best access means for Triple Play due to its simple structure and low costs. However, the point-to-multi-points tropology endangers its security and users' privacy. By investigating the safety threats in GEPON, a timestamp-based encryption is presented. The timestamp used in ranging is extracted and embedded into Advanced Encryption Standard (AES) algorithm, therefore the encryption keys vary with time due to the different ranging time. this paper presents a new encryption method based on timestamp function. This method combines AES algorithm with timestamp to form keys for encrypting downstream data. By adding an encryption/decryption module in both Optical Line Terminal (OLT) and Optical Network Unit (ONU), unsafe keys transmission through channel can be avoided. In addition, the extraction and synchronization of timestamp, along with the dynamic update and synchronization of keys, are released. Experimental results show that the method has the advantages of low delay, high throughput and high security compared with the traditional encryption algorithm. After the theoretical analysis, the simulation results of proposed scheme are given, proving its validity. Index Terms –timestamp; gigabit ethernet passive optical network (GEPON); advanced encryption standard (AES) algorithm; encryption.
منابع مشابه
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملAn efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملTwo Improved Multi-server Authentication Protocols Based on Hash Function and Smart Card
To use the network services provided by multiple servers in mobile wireless network, recently, Tsai proposed a hash function and smart card based multi-server authentication protocol. Chen et al. showed that Tsai’s scheme cannot resist the server spoofing attack, and proposed a novel one. In this paper, we show that Chen et al.’s protocol cannot resist off-line password guessing attacks, and pr...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JNW
دوره 7 شماره
صفحات -
تاریخ انتشار 2012