HEAL DSpace

Securing confidentiality in PON and HFC networks

Αποθετήριο DSpace/Manakin

Εμφάνιση απλής εγγραφής

dc.contributor.author Koulouris, J en
dc.contributor.author Koulouris, A en
dc.date.accessioned 2014-03-01T02:41:33Z
dc.date.available 2014-03-01T02:41:33Z
dc.date.issued 1998 en
dc.identifier.issn 0277786X en
dc.identifier.uri https://dspace.lib.ntua.gr/xmlui/handle/123456789/30530
dc.subject Adaptation cell en
dc.subject Basic module en
dc.subject Control string en
dc.subject Conventional encryption en
dc.subject Multiplexing mask en
dc.subject Multiplexing pattern en
dc.subject.other Broadcasting en
dc.subject.other Cryptography en
dc.subject.other Data privacy en
dc.subject.other Demultiplexing en
dc.subject.other Multiplexing en
dc.subject.other Security of data en
dc.subject.other Telecommunication traffic en
dc.subject.other Topology en
dc.subject.other Hybrid fiber coaxial (HFC) networks en
dc.subject.other Passive optical networks (PON) en
dc.subject.other Passive networks en
dc.title Securing confidentiality in PON and HFC networks en
heal.type conferenceItem en
heal.identifier.primary 10.1117/12.321880 en
heal.identifier.secondary http://dx.doi.org/10.1117/12.321880 en
heal.publicationDate 1998 en
heal.abstract In Some kind of networks like PON (Passive Optical Networks) and HFC (Hybrid Fiber Coaxial) networks, the information from the central station (headend) to the terminals is broadcast to all of them. So each one of them besides its own data gets also the data destined for the others. Under these conditions privacy and confidentiality do not exist. The usual way to overcome this drawback is conventional encryption of the data between headend and terminals. This method besides making the communication procedure more complex, has also the drawback that traffic data cannot be protected, since the destination field of each cell cannot be encrypted. Here another method is presented which, although not encryption in the conventional meaning of the term, secures a high degree of individuality and confidentiality. The basic idea is to use different multiplexing patterns for each connection so that each terminal can demultiplex only its own data. The method is suited for the high data speed of the PON networks and maybe preferable to conventional encryption. en
heal.journalName Proceedings of SPIE - The International Society for Optical Engineering en
dc.identifier.doi 10.1117/12.321880 en
dc.identifier.volume 3408 en
dc.identifier.spage 148 en
dc.identifier.epage 158 en


Αρχεία σε αυτό το τεκμήριο

Αρχεία Μέγεθος Μορφότυπο Προβολή

Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στην ακόλουθη συλλογή(ές)

Εμφάνιση απλής εγγραφής