Abstract
Passive Optical Network (PON) provides the answer to increasing demand on bandwidth in access networks; however, PON uses shared fiber link with Broadcast and Select (B&S) type of downstream traffic on single wavelength, which introduces data vulnerability to eavesdropping. This paper proposes an approach to enhance security using slow wavelength hopping and codes cycling in order to make it difficult for eavesdropper to collect good sample for crypto-analysis. Current state of optical transmitters and filters technology does not support high data rate operation in fast hopping mode, and the approach for slow hopping based on encoding each Ethernet frame/packet by single wavelength selected from ONU’s specific wavelength sequence generated by mapping ONU’s code matrices to network’s wavelength grid matrix. Multiple code matrices assignment to single ONU cycled in different order enhances security by reducing probability of tracking the hopping pattern.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Glen Kramer and Gerry Pesavento,” Ethernet Passive Optical Network (EPON): Building a Next-Generation Optical Access Network“,IEEE Communications Magazine, February 2002.
Charles P. Pfleeger, “ Security in Computing”, 2PndP edition, 1997. Printice-Hall, Inc, 1 Lake Street, Upper Saddle River, NJ 07458. PP 9.
Thomas H. Shake, “Security Performance of Optical CDMA Against Eavesdropping”, JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 23, NO. 2, FEBRUARY 2005.
International Telecommunication Union-Telecommunication Standardization sector (ITUT), G9831 standard, “Broadband optical access systems based on Passive Optical Networks (PON)”, October, 1998.
International Telecommunication Union-Telecommunication Standardization sector (ITUT), G984.1 standard, “Gigabit-capable Passive Optical Networks (GPON)”, March 2003.
IEEE Standard for Information technology, IEEE Std 802.3ah.-2004, IEEE Computer Society
Muriel Medard, Douglas Marquis, Richard A. Barry, and Steven G. Finn,” Security Issues in All Optical Network”, IEEE Network May/June 1997.
Swapnil Bhatia and Radim Barto, “Performance of the IEEE 802.3 EPON Registration Scheme Under High Load”, Department of Computer Science, University of New Hampshire, Durham, NH 03824, USA, Society of Photo-Optical Instrumentation Engineers, 2004.
Douglas R. Stinson, “Cryptography: Theory and Practice”, Second Edition, CHAPMAN & HALL/CRC, CRC Press LLC, 2000 N.W Corporate Blvd, Boca Raton, FL 33431
Karen J. Profet, Charles H. Lavine, Kraig R. Meyer, “The Risk of Trust vs the Cost of Assurance-Trades in the Implementation of a Secure LAN”, IEEE Proceedings. On Aerospace Applications Conference, 1994.
Guu-Chang Yang, Wing C. Kwong, “ Prime Codes with applications to CDMA Optical and Wireless Network”, Artech House mobile communication series, ISBN1-58053-073-7, 2002. PP 44,.247.
Fan R.K Chung, JAWAD A. Salehi, “Optical Orthogonal Codes: Design, Analysis, and Application”. IEEE Transaction on Information Theory, Vol 35, No 3, May 1989.
L. Tancevski, Ian Andonvic, “ Hybrid Wavelength Hopping/Time Spreading Schemes for use in Massive Optical Network with Increase Security”, IEEE Journal of lightwave technology, VOL 14, No 12, December 1996..
S. V. Maric, “ New Family Of Algebraically Designed Optical Orthogonal Codes For Use In CDMA Fibre-Optic Networks”, Electronics Letters, 18PthP March 1993 Vol. 29 NO. 6.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag London Limited
About this paper
Cite this paper
Shawbaki, W. (2006). Security in Passive Optical Network via Wavelength Hopping and Codes cycling techniques. In: Blyth, A. (eds) EC2ND 2005. Springer, London. https://doi.org/10.1007/1-84628-352-3_8
Download citation
DOI: https://doi.org/10.1007/1-84628-352-3_8
Publisher Name: Springer, London
Print ISBN: 978-1-84628-311-6
Online ISBN: 978-1-84628-352-9
eBook Packages: Computer ScienceComputer Science (R0)