dc.contributor.author |
Koulouris, J |
en |
dc.contributor.author |
Koulouris, A |
en |
dc.date.accessioned |
2014-03-01T02:41:33Z |
|
dc.date.available |
2014-03-01T02:41:33Z |
|
dc.date.issued |
1998 |
en |
dc.identifier.issn |
0277786X |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/30530 |
|
dc.subject |
Adaptation cell |
en |
dc.subject |
Basic module |
en |
dc.subject |
Control string |
en |
dc.subject |
Conventional encryption |
en |
dc.subject |
Multiplexing mask |
en |
dc.subject |
Multiplexing pattern |
en |
dc.subject.other |
Broadcasting |
en |
dc.subject.other |
Cryptography |
en |
dc.subject.other |
Data privacy |
en |
dc.subject.other |
Demultiplexing |
en |
dc.subject.other |
Multiplexing |
en |
dc.subject.other |
Security of data |
en |
dc.subject.other |
Telecommunication traffic |
en |
dc.subject.other |
Topology |
en |
dc.subject.other |
Hybrid fiber coaxial (HFC) networks |
en |
dc.subject.other |
Passive optical networks (PON) |
en |
dc.subject.other |
Passive networks |
en |
dc.title |
Securing confidentiality in PON and HFC networks |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1117/12.321880 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1117/12.321880 |
en |
heal.publicationDate |
1998 |
en |
heal.abstract |
In Some kind of networks like PON (Passive Optical Networks) and HFC (Hybrid Fiber Coaxial) networks, the information from the central station (headend) to the terminals is broadcast to all of them. So each one of them besides its own data gets also the data destined for the others. Under these conditions privacy and confidentiality do not exist. The usual way to overcome this drawback is conventional encryption of the data between headend and terminals. This method besides making the communication procedure more complex, has also the drawback that traffic data cannot be protected, since the destination field of each cell cannot be encrypted. Here another method is presented which, although not encryption in the conventional meaning of the term, secures a high degree of individuality and confidentiality. The basic idea is to use different multiplexing patterns for each connection so that each terminal can demultiplex only its own data. The method is suited for the high data speed of the PON networks and maybe preferable to conventional encryption. |
en |
heal.journalName |
Proceedings of SPIE - The International Society for Optical Engineering |
en |
dc.identifier.doi |
10.1117/12.321880 |
en |
dc.identifier.volume |
3408 |
en |
dc.identifier.spage |
148 |
en |
dc.identifier.epage |
158 |
en |