Publication detail

Towards secure Gigabit Passive Optical Networks: Signal propagation based key establishment

MALINA, L. MÜNSTER, P. HAJNÝ, J. HORVÁTH, T.

Original Title

Towards secure Gigabit Passive Optical Networks: Signal propagation based key establishment

English Title

Towards secure Gigabit Passive Optical Networks: Signal propagation based key establishment

Type

conference paper

Language

en

Original Abstract

We describe and analyze the security of the standard ITU-T G.984 and show its security risks. In spite of that transmitted data are encrypted to provide their confidentiality on a multipoint fibre connection, session secret keys during their establishment can be observed by adversaries. To address this security flaw, we propose a key establishment protocol that securely sets the session secret keys between two communication parties in GPON.

English abstract

We describe and analyze the security of the standard ITU-T G.984 and show its security risks. In spite of that transmitted data are encrypted to provide their confidentiality on a multipoint fibre connection, session secret keys during their establishment can be observed by adversaries. To address this security flaw, we propose a key establishment protocol that securely sets the session secret keys between two communication parties in GPON.

Keywords

Communication; Cryptography; Gigabit Passive Optical Networks; Key Establishment; Security

RIV year

2015

Released

22.07.2015

Location

Colmar, Francie

ISBN

978-989-758-117-5

Book

Proceedings of SECRYPT 2015

Pages from

349

Pages to

354

Pages count

6

URL

BibTex


@inproceedings{BUT115361,
  author="Lukáš {Malina} and Petr {Münster} and Jan {Hajný} and Tomáš {Horváth}",
  title="Towards secure Gigabit Passive Optical Networks: Signal propagation based key establishment",
  annote="We describe and analyze the security of the standard ITU-T G.984 and show its security risks. In spite of that transmitted
data are encrypted to provide their confidentiality on a multipoint fibre connection, session secret keys
during their establishment can be observed by adversaries. To address this security flaw, we propose a key establishment
protocol that securely sets the session secret keys between two communication parties in GPON.",
  booktitle="Proceedings of SECRYPT 2015",
  chapter="115361",
  howpublished="electronic, physical medium",
  year="2015",
  month="july",
  pages="349--354",
  type="conference paper"
}