Context
In the PON system, downstream data is broadcast to all ONUs. As a result, downstream data destined for certain ONUs or all ONUs may be intercepted by illegal users.
Working Principle
Line encryption technologies are required to eliminate the data theft risk, Figure 2 shows line encryption process.
· The encryption algorithm to be used is the advanced encryption standard (AES).
Highlight and Application
· The line encryption algorithms neither increase overhead nor decrease bandwidth usages.
· The line encryption algorithms will not prolong transmission delays.
· Enable line encryption if the usage scenarios promote high security requirements
More related:
No comments:
Post a Comment