Publication detail

Towards Secure Gigabit Passive Optical Networks

MALINA, L. MÜNSTER, P. HAJNÝ, J. HORVÁTH, T.

Original Title

Towards Secure Gigabit Passive Optical Networks

English Title

Towards Secure Gigabit Passive Optical Networks

Type

conference paper

Language

en

Original Abstract

We describe and analyze the security of the standard ITU-T G.984 and show its security risks. In spite of that transmitted data are encrypted to provide their confidentiality on a multipoint fibre connection, session secret keys during their establishment can be observed by adversaries. To address this security flaw, we propose a key establishment protocol that securely sets the session secret keys between two communication parties in GPON.

English abstract

We describe and analyze the security of the standard ITU-T G.984 and show its security risks. In spite of that transmitted data are encrypted to provide their confidentiality on a multipoint fibre connection, session secret keys during their establishment can be observed by adversaries. To address this security flaw, we propose a key establishment protocol that securely sets the session secret keys between two communication parties in GPON.

Keywords

Communication; Cryptography; Gigabit Passive Optical Networks; Key Establishment; Security

RIV year

2015

Released

22.07.2015

Location

Colmar, Francie

ISBN

978-989-758-117-5

Book

Proceedings of SECRYPT 2015

Pages from

349

Pages to

354

Pages count

5

BibTex


@inproceedings{BUT115361,
  author="Lukáš {Malina} and Petr {Münster} and Jan {Hajný} and Tomáš {Horváth}",
  title="Towards Secure Gigabit Passive Optical Networks",
  annote="We describe and analyze the security of the standard ITU-T G.984 and show its security risks. In spite of that transmitted
data are encrypted to provide their confidentiality on a multipoint fibre connection, session secret keys
during their establishment can be observed by adversaries. To address this security flaw, we propose a key establishment
protocol that securely sets the session secret keys between two communication parties in GPON.",
  booktitle="Proceedings of SECRYPT 2015",
  chapter="115361",
  howpublished="electronic, physical medium",
  year="2015",
  month="july",
  pages="349--354",
  type="conference paper"
}