Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Chongqing University of Posts and Telecommunications(Natural Science)》 2006-05
Add to Favorite Get Latest Update

Study and implementation of EPON system secruity mechanism

YANG Zong-kai~1,HE Yan~(1,2),ZHANG Ao~2(1.Department of Electrons and Information,Huazhong University of Science and Technology,Hubei Wuhan 430074,P.R.China;2.Wuhan Research Institute of Posts and Telecommunications,Hubei Wuhan 430074,P.R.China)  
From the view of the whole EPON access networks,the security of equipment level,link level and service level in EPON system are studied,and it proposes five security goals in EPON system.After the investigation to equipment's control function,ONU access authentication and broadcast storm suppression,it innovatively proposes a model which could analyze the link security from three levels.Furthermore,it studies on the implementation details of ITUT Churning and Advance Encryption Algorithm(AES) in EPON,which involves encryption mode selection,key generation and key synchronization.At last,it discusses the service security and gives an effective solution to the security of multicast service source control and ONU port multicast service management mechanism.
【Fund】: 国家“863”计划资助项目(2004AA122310)
【CateGory Index】: TN929.1
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 ZHOU Zhuo-jiao, SHI Xu-gang, HUANG Xiu-zhen (Zhejiang University of Technology college of information engineering, Hangzhou 310014 , China);Research of the MACSec safe protocol based on EPON[J];Optical Communication Technology;2008-10
Chinese Journal Full-text Database 1 Hits
1 MENG Yu1, JIANG Tao2, XIAO Dingzhong1 (1.Wuhan Research Institute of Posts and Telecommunications, Wuhan 430074,P.R.China; 2. FiberHome Telecommunication Technologies CO.LTD, Wuhan 430074,P.R.China);Implementation of EPON upstream access[J];Journal of Chongqing University of Posts and Telecommunications;2004-06
Chinese Journal Full-text Database 10 Hits
1 LIU Lin(School of Management, Hefei University of Technology, Hefei 230009, China);Design of Student Management Information System in Colleges[J];Journal of Anhui Tv University;2002-04
2 Chen Linyu (Zhangjiakou Power Supply Co. Zhangjiakou 075000);A Brief Analysis on Information Network Security Threats[J];Office Informatization;2009-02
3 LUO Hong, BAO Lin-yu, LONG Chao (College of Computer, Southwest University of Science & Technology, Mianyang 621010, China);Exploration on Exchange and Anti-Virus Technical Fusion[J];Ordnance Industry Automation;2006-01
4 LIU Guishan,HU Juncheng(Department of Computer Science and Engineering, School of Information Science and Technology, Beijing Institute of Technology, Beijing100081, China);Design of Communication Stream for the 1553B Bus[J];Journal of Beijing Institute of Technology;2003-03
5 REN Yong-lin~1,QIN Mian~2,REN Wei-lin~3(1.Faculty of Computer Science, University of New Brunswick, New Brunswick Province E3B 5A3,Canada; 2.Beijing Control Industrial Computer Company of P. R. C. State Aerospace Bureau, Beijing 100080,China; 3.Beijing Institute of Control Engineering,Beijing 100080,China);SYSTEM DESIGN AND IMPLEMENTATION OF ELECTRONIC REVENUE AFFAIRS[J];Journal of Beijing Technology and Business University (Natural Science Edition);2005-01
6 LI Shi hong, LI Fang wei (Chongqiing University of Posts and Telecommunications, Chongqiing 400065,P.R.China);Security Improvement of the 3G Mobile Communication System[J];Journal of Chongqing University of Posts and Telecommunications;2002-04
7 GAO Kai-peng,ZHOU WeiChina Netcom(Group)Co.Ltd,Changchun Branch,Changchun 130051,China;Secuity Problems and Countermeasures of the Network Systerm[J];Journal of Jilin University(Earth Science Edition);2008-S1
8 YU Xiu xia (Modern Education Technology Centre,Changchun University,Changchun?130022,China);Analysis of public-key encryption numeration[J];Journal of Changchun University;2002-01
9 Zhang Lin1 Yao Shuo1 Zhang Keli2 (1 China Mobile Group Design Institute Co.,Ltd.,Beijing 100080) (2 Tianjing National Cybernet Security Limited Tianjin 300052);Research of Identity Management[J];Telecom Engineering Technics and Standardization;2009-07
10 Li Delang;Countermeasure of Computer Network Security[J];Computer Study;2008-03
China Proceedings of conference Full-text Database 2 Hits
1 Mo Shiyu (WMCRI No.70005 box wuhan, China 430079);Network Antagonize & Communications Safety[A];[C];2008
2 ZHAO Lin SHANG Yu jin Bengbu tank institute,Bengbu 233050,China;The Application of 3G Mobile Technology in Armored Tactics Networks[A];[C];2008
Chinese Journal Full-text Database 4 Hits
1 Ao Li1,Li Qing2 (1. Research Institute of Communication Standards,China Academy of Telecommunication Research of MII, Beijing 100045, China; 2. ZTE Corporation R&&D Centre (Shanghai),Shanghai 201203,China );Broadband Optical Access Network:Development Trendency of Next Generation Access Network[J];Telecommunications Science;2006-07
2 GAO Hong, SHI Xu-gang, LING Ying-ying, CHEN Qiang( Zhejiang Provincal Key Lab of Fiber Optic Communication Technology,Zhejiang University of Technology, Hangzhou);Research of Security Scheme in Ethernet Passive Optical Networks[J];Optical Communication Technology;2004-09
3 WEI Yi mei,LU Lin,WANG Rong (Department of Telecommunication Engineering ICE, PLAUST, Nanjing 210007,China);Structure and key technologies of EPON[J];Study On Communications;2003-03
4 Jinglin Ruan Lin Liu (Wuhan Research Institute of Posts and Telecommunications);AES Encryption in GPON[J];China Integrated Circuit;2007-12
【Secondary References】
Chinese Journal Full-text Database 1 Hits
1 ZHONG Cui,CHEN Shun-er,LIU Wei-ping(Department of Electronic and Engineering,Jinan University,Guangzhou 510632,China);The LinkSec Protocol in EPON[J];Optical Fiber & Electric Cable and Their Applications;2009-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved