Font Size: a A A

Research On 10G EPON Security Authentication Mechanism

Posted on:2020-04-16Degree:MasterType:Thesis
Country:ChinaCandidate:X GuoFull Text:PDF
GTID:2428330590952526Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
As the first mature and widely used next generation PON technology,10 G EPON conforms to the development trend of network environment.It has the advantages of large bandwidth,large spectral ratio,EPON compatible networking,network management unification and smooth upgrade.However,due to the characteristics of 10 G EPON network's own network topology,illegal OLT or ONU can be multiplied organically,which leaks user data and consumes a lot of system resources.Therefore,in order to avoid this security threat,this paper analyzed the working principle of 10 G EPON system,studied the progress of 10 G EPON security status at home and abroad,and did the following work:(1)This paper designs a 10 G EPON encryption scheme based on NTRUSign digital signature algorithm.In order to prevent man-in-the-middle attacks and other security problems in the process of data transmission,NTRUSign algorithm is used to authenticate each other in the process of ONU automatic registration,and ECDH elliptic curve key exchange algorithm is used to negotiate keys independently.In the process of ONU registration with OLT,key exchange is realized and a secure session key is established.(2)This paper introduces RSA algorithm and ECDSA digital signature algorithm,compares them with NTRUSign algorithm,and uses Java language to program and simulate RSA,ECDSA and NTRUSign authentication algorithm,respectively,for analysis and comparison.The results show that the 10 G EPON scheme based on NTRUSign digital signature algorithm has better performance and security than the other two algorithms,and is more suitable for practical application.(3)In this paper,a new idea of introducing quantum key agreement protocol into10 G EPON system is proposed.The authentication process of quantum key agreement scheme will be embedded in the registration process.The validity of OLT and ONU will be verified by detecting quantum states.The two-way authentication of OLT and ONU will be satisfied,and the shared key will be established as the session key of both sides of the communication safely.
Keywords/Search Tags:10G EPON, illegal eavesdropping, NTRUSign encryption algorithm, two-way authentication, QKD
PDF Full Text Request
Related items