On security in gigabit passive optical networks

The Gigabit Passive Optical Networks (GPONs) are widely deployed in Europe these days. For example in the Czech Republic, telecommunication access networks will deploy GPONs in order to fulfill a minimal transmission speed 30 Mbps which is planned in 2020. Generally, GPONs are defined by the family of recommendations ITU-T G.984. Nevertheless, the recommendations ITU-T G.984 do not define the security in the default configuration. The key exchange mechanism is only optional and keys are sent in plain texts. This article deals with the security issues of GPONs. We analyze security risks and threats in GPONs and propose our robust solution to enhance security and privacy in GPONs.

[1]  F.F. Froehlich,et al.  All-optical encryption for links at 10 Gbps and above , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[2]  Leonid G. Kazovsky,et al.  Challenges in next-generation optical access networks: addressing reach extension and security weaknesses , 2011 .

[3]  Martin Maier,et al.  Security Issues in Integrated EPON and Next-Generation WLAN Networks , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[4]  Guochu Shou,et al.  Encryption method of next generation PON system , 2010, 2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT).

[5]  Petr Munster,et al.  Towards secure Gigabit Passive Optical Networks: Signal propagation based key establishment , 2015, 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE).

[6]  Guochu Shou,et al.  Encryption and Authentication Mechanism of 10G EPON Systems Based on GCM , 2010, 2010 2nd International Conference on E-business and Information System Security.

[7]  Zhongwei Sun,et al.  Security mechanism for distribution automation using EPON , 2009, 2009 IEEE International Conference on Network Infrastructure and Digital Content.

[8]  A. Teixeira,et al.  Security issues due to reflection in PON physical medium , 2012, 2012 14th International Conference on Transparent Optical Networks (ICTON).

[9]  Giacomo Verticale,et al.  Degradation attacks on Passive Optical Networks , 2012, 2012 16th International Conference on Optical Network Design and Modelling (ONDM).

[10]  Mário M. Freire,et al.  On EPON security issues , 2007, IEEE Communications Surveys & Tutorials.

[11]  Vicente Martin,et al.  Quantum Key Distribution Based on Selective Post-Processing in Passive Optical Networks , 2014, IEEE Photonics Technology Letters.