Authentication method of Ethernet passive optical network (EPON) system

A passive optical network and authentication method technology, applied in the field of Ethernet passive optical network system authentication, to achieve the effects of preventing replay attacks, preventing tampering, and achieving good security

Inactive Publication Date: 2009-11-11
BEIJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In practical applications, the IEEE 802.1x protocol has solved the problems caused b...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method of Ethernet passive optical network (EPON) system
  • Authentication method of Ethernet passive optical network (EPON) system
  • Authentication method of Ethernet passive optical network (EPON) system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention realizes the authentication process of the EPON system in combination with Galois domain message authentication code (GMAC), can support ONU authentication and user authentication at the same time, and designs the frame structure of EPON system GMAC authentication, and the protocol flow of ONU authentication and user authentication , can overcome the one-way authentication defect existing in the EPON system authentication mode under the IEEE 802.1x port access control mode, and effectively guarantee the source authenticity and data integrity of the authentication. The whole authentication process involves four parts: user, ONU, OLT and Radius authentication server. In the implementation process of ONU authentication and user authentication, they respectively assume the roles of applicant, authenticator, and authentication server to ensure that legitimate ONUs and authorized users access EPON system. Among them, the authentication module with GMAC f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication method of an Ethernet passive optical network (EPON) system. By combining Galois field message authentication code (GMAC), the method realizes authentication process of the EPON system, can support ONU authentication and user authentication simultaneously, and designs a frame structure of the GMAC authentication of the EPON system and protocol process of the ONU authentication and the user authentication. The method can overcome the defect of one-way authentication existing in the EPON system authentication mode under the IEEE802.1X port access control mode, and effectively guarantee the source authenticity and data integrity of the authentication. GMAC has provable security, hash function structure thereof based on a binary Galois field multiplier is suitable for parallel and high-speed implementation of hardware and has increment authentication characteristic, thus leading the method to be capable of meeting the requirements of high-speed and effective identification authentication of the EPON system better and to have good security.

Description

technical field [0001] The present invention relates to an authentication method for optical access network system equipment and user access, in particular to an Ethernet Passive Optical Network (EPON) system authentication method using Galois Domain Message Authentication Code (GMAC), which belongs to information security technology field. Background technique [0002] At present, with the continuous development of network technology and the increasing abundance of broadband services, users' demand for network bandwidth is also increasing. Compared with the digital, highly integrated and intelligent core network, the construction process of the access network is relatively lagging behind, and the access network has become the bottleneck of the broadbandization and further development of the whole network. In recent years, various broadband access technologies have emerged one after another. Among them, the Ethernet passive optical network (EPON) combines the PON technolog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06H04Q11/00
Inventor 寿国础胡怡红宁帆郭志刚陆阳屈善新霍甲高泽华钱宗珏
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products