Skip to main content

Preamble Encryption Mechanism for Enhanced Privacy in Ethernet Passive Optical Networks

  • Conference paper
On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (OTM 2006)

Abstract

Ethernet Optical Passive Networks (EPONs), defined as low cost access networks, combine Ethernet technology with an optical fiber infrastructure to deliver voice, video and data services from a Central Office (CO) to end-users. Since all data in the downstream is broadcasted, it is susceptible to be eavesdropped by a malicious user, which can use it to try Theft of Service (ToS) through masquerading techniques. These threats remain present when encryption is applied to EPON frame payloads. In order to avoid user profile inference through data mining techniques, a method for encryption of the preamble of the data units is proposed in this paper and a short description of its operations is presented. This new encryption mechanism assures that any two EPON frames are always transmitted with different and uncorrelated preambles.

An erratum to this chapter can be found at http://dx.doi.org/10.1007/11915034_125.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kramer, G., Pesavento, G.: Ethernet Passive Optical Network (EPON): Building a Next-Generation Optical Access Network. IEEE Communications Magazine, 62–73 (2002)

    Google Scholar 

  2. IEEE Standard 802.3ah - Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications (2004)

    Google Scholar 

  3. Hiironen, O.P., Pietiläinen, A.: Security Threats and Defense Models in EPON (2002) (Last Access at May 15, 2006), available at http://grouper.ieee.org/groups/802/3/efm/public/sep02/sec/Pietilainen_sec_1_0902.pdf

  4. Pietiläinen, A., Maislos, A., Kramer, G., Hiironen, O.P., Haran, O.: Security Baseline Proposal (2002) (Last Access at May 15, 2006), available at the http://grouper.ieee.org/groups/802/3/efm/public/jul02/p2mp/hiironen_general_1_0702.pdf

  5. Hiironen, O.P., Pietiläinen, A., Nylund, A.: IEEE802.3ah Ethernet in the First Mile, Privacy in EPON (2002) (Last Access at June 13, 2006), available at the http://www.ieee802.org/3/efm/public/may02/hiironen_1_0502.pdf

  6. IEEE 802.3ah Ethernet in the First Mile Task Force - IEEE 802.3ah P2MP (2002) Presentation Materials (Last Access at May 15, 2006), available at the http://grouper.ieee.org/groups/802/3/efm/public/jul02/p2mp/index.html

  7. Cook, C., Ford, B., Haran, O., Legoff, Y., Mahalingam, M., Mccammon, K., Michalowski, R., Pietilainen, A., Fujimoto, Y., Romascanu, D., Sala, D., Sambasivan, S.: IEEE 802.3ah, Security Objectives for Ethernet Passive Optical Networks (EPON) (2002) (Last Access at May 15, 2006), available at the http://grouper.ieee.org/groups/802/3/efm/public/sep02/sec/FordMccammon_sec_1_0902.pdf

  8. Goff, Y.L., Fujimoto, Y., Murakami, K., Haran, O., Hiironen, O.P.: Encryption layer comparison (2002) (Last Access at May 15, 2006), available at the http://grouper.ieee.org/groups/802/3/efm/public/jul02/p2mp/hiironen_p2mp_4_0702.pdf

  9. Hiironen, O.P.: Message Authentication in EPON (2002) (Last Access at June 13, 2006), available at the http://grouper.ieee.org/groups/802/3/efm/public/jul02/p2mp/hiironen_p2mp_2_0702.pdf

  10. Kim, J.: Authentication and Privacy in EPON (2002) (Last Access at May 15, 2006), available at the http://grouper.ieee.org/groups/802/3/efm/public/jul02/p2mp/kim_jin_p2mp_3_0702.pdf

  11. Murakami, K.: Authentication and Encryption in EPON (2002) (Last Access at May 15, 2006), available at the http://grouper.ieee.org/groups/802/3/efm/public/jul02/p2mp/murakami_p2mp_1_0702.pdf

  12. PMC-Sierra: PAS5001 EPON OLT for FTTH Broadband Access (Last Access at May 15, 2006), available at the http://www.pmc-sierra.com/products/details/pas5001/index.html , http://www.pmc-sierra.com/cgi-bin/download_p.pl?res_id=12160&filename=2061016_012120.pdf

  13. Teknovus, Inc.: TK3701 Product Brief (2005) (Last Access at May 15, 2006), available at the http://www.teknovus.com/tk3722.html , http://www.teknovus.com/downloads/TK3701_PB.pdf

  14. Pohjola, O.P., Tervonen, A.: Method and System for Secure Upstream Transmissions in Passive Optical Networks, PCT/FI2004/000486 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Inácio, P.R.M., Hajduczenia, M., Freire, M.M., da Silva, H.J.A., Monteiro, P.P. (2006). Preamble Encryption Mechanism for Enhanced Privacy in Ethernet Passive Optical Networks. In: Meersman, R., Tari, Z., Herrero, P. (eds) On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops. OTM 2006. Lecture Notes in Computer Science, vol 4277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11915034_64

Download citation

  • DOI: https://doi.org/10.1007/11915034_64

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48269-7

  • Online ISBN: 978-3-540-48272-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics