On security in gigabit passive optical networks

@article{Horvth2015OnSI,
  title={On security in gigabit passive optical networks},
  author={Tom{\'a}s Horv{\'a}th and Lukas Malina and Petr Munster},
  journal={2015 International Workshop on Fiber Optics in Access Network (FOAN)},
  year={2015},
  pages={51-55}
}
The Gigabit Passive Optical Networks (GPONs) are widely deployed in Europe these days. For example in the Czech Republic, telecommunication access networks will deploy GPONs in order to fulfill a minimal transmission speed 30 Mbps which is planned in 2020. Generally, GPONs are defined by the family of recommendations ITU-T G.984. Nevertheless, the recommendations ITU-T G.984 do not define the security in the default configuration. The key exchange mechanism is only optional and keys are sent in… CONTINUE READING

Figures from this paper.

Citations

Publications citing this paper.
SHOWING 1-3 OF 3 CITATIONS

GPON Parser for Database Analysis

Michal Jurcik, Tomás Horváth, Vaclav Oujezsky, Vladislav Skorpil, Martin Holík
  • 2019 42nd International Conference on Telecommunications and Signal Processing (TSP)
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

Key Exchange with PUF in NG-PON2 Networks

Tomás Horváth, Vlastimil Clupek, Petr Munster, Vaclav Oujezsky
  • 2019 42nd International Conference on Telecommunications and Signal Processing (TSP)
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 11 REFERENCES

Towards secure Gigabit Passive Optical Networks: Signal propagation based key establishment

  • 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE)
  • 2015
VIEW 1 EXCERPT

Degradation attacks on Passive Optical Networks

  • 2012 16th International Conference on Optical Network Design and Modelling (ONDM)
  • 2012
VIEW 1 EXCERPT

Security issues due to reflection in PON physical medium

  • 2012 14th International Conference on Transparent Optical Networks (ICTON)
  • 2012
VIEW 1 EXCERPT

Encryption and Authentication Mechanism of 10G EPON Systems Based on GCM

  • 2010 2nd International Conference on E-business and Information System Security
  • 2010
VIEW 1 EXCERPT

Encryption method of next generation PON system

  • 2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT)
  • 2010
VIEW 1 EXCERPT

Security Issues in Integrated EPON and Next-Generation WLAN Networks

  • 2010 7th IEEE Consumer Communications and Networking Conference
  • 2010
VIEW 1 EXCERPT

Security mechanism for distribution automation using EPON

  • 2009 IEEE International Conference on Network Infrastructure and Digital Content
  • 2009
VIEW 1 EXCERPT