Browse > Article

An Authentication and Key Management Protocol for Secure Data Exchange in EPON MAC Layer  

Kang, In-kon (국가보안기술연구소)
Lee, Do-Hoon (국가보안기술연구소)
Lee, Bong-Ju (전북대학교 영상공학과)
Kim, Young-Chon (전북대학교 컴퓨터공학과)
Abstract
An EPON which is going on standardization in IEEE 802.3ah, is tree topology consists of a OLT and multiple ONU using passive optical components, so this network is susceptible to variable security threats - eavesdropping, masquerading, denial of service and so on. In this paper, we design a security protocol supporting authentication and confidentiality services in MAC layer in order to prevent these security threats and to guarantee secure data exchange The designed security protocol introduce public-key based authentication and key management protocols for efficient key management, and choose Rijndael algorithm, which is recent standard of AES, to provide the confidentiality of EPON Proposed authentication and key management protocols perform authentication and public-key exchange at a time, and are secure protocols using derived common cipher key by exchanging public random number To implement the designed security protocol, we propose the procedures of authentication and public-key exchange, session key update, key recovery. This proposed protocol is verified using unknown session key, forward secrecy, unknown key-share, key-compromise impersonation.
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 강주성, 박상우, 박춘식, 지성택, 천정희, 한재우, 현대암호학, 제 2판, 한국전자통신연구회, 1999
2 FIPS 197, Specification for the Advanced Encryption Standard(AES), NIST, Nov. 2001.
3 http://www.rsa.com/rsalabs/des3/. January, 1999
4 ITU-T Recommendation G.PONB - Draft D, "ATM PON Specification," April 1997
5 lTU-T Recommendation G.983, 'High Speed Optical Access Systems Based on Passive Optical Network (PON) Techniques' ITU-T Study Group 15, Feb. 1998
6 William Stallings, Cryptography and Network Security, 2nd Edition, Prentice-Hall, 1999
7 Simon Blake-Wilson, Don Johnson, Alfred Menezes, "Key Agreement Protocols and their Security Analysis," 6th IMA Conference on Cryptography and Coding, LNCS1355, pp. 30-45, 1997
8 U.Killat, editor. "Access to B-ISDN via PONs: ATM Communication in Practices", John Wiley & Sons Ltd & B.G. Teubner, 1996
9 http://www.heliontech.com/core2.htm
10 IEEE 802.3ah Ethernet in the First Mile Task Force