The security of EPON system means information security, which involves the Confidentiality, integrity, availability, and
controllabitlity. EPON is combined by PON technology and ETHERNET technology. So the analysis of its security
mechanism must aim to the character of PON and ETHERNET. The applying environment and network topology should
also be considered. In this paper we propose the security model of triple churning o support date encryption and
decryption to avoid ONU receiving other ONU's information. We analyze security models in EPON reference model.
This paper introduce the churning and de-Churning scheme, include the single churning and the triple churning, the
detail of the key message mutual process and the key update process.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.