Security For Next Generation Access Networks (2002)

By Stephen Thomas, Wave7 Optics

Broadband access networks—including those built with advanced HFC, wireless, and fiber technologies—have unique network security concerns. This paper analyzes the security threats present in such networks, and it develops a general security threat model for broadband access networks. Significant threats include masquerade and eavesdropping. The paper then examines cryptographic techniques appropriate for countering these threats, focusing on authentication and encryption. It considers the strengths and costs of various alternatives. The final section discusses practical implementation issues, particularly those that arise because of the potential size of access networks and because of the data rates at which they operate. These characteristics demand security measures that are very scalable and capable of very high speed operation.

By clicking the "Download Paper" button, you are agreeing to our terms and conditions.

Similar Papers

Security For Next Generation Access Networks
By Stephen Thomas, Wave7 Optics
Fifty Shades of Grey Optics: A Roadmap for Next Generation Access Networks
By Venk Mutalik, Bob Gaydos, Dan Rice & Doug Combs, Comcast
Powering the Future: Next Generation Access Networks
By Todd Musat, Shaw Communications Inc.; Chuck Carroll, Lew Rakowsky & Rene Spee, Saras Energy Consulting
Optical Transmitter Technology for Next Generation Access Networks
By Phil Miguelez, Motorola Mobility, Inc.
Next Generation - Cable Access Network
By M. Emmendorfer, S. Shupe, D. Cummings, T. Cloonan Contributors: Z. Maricevic, M. Schemmann, B. Dawson, V. Mutalik, J.Howe, A. Al-Banna,and F. O'Keeffe, ARRIS
Next Generation - Gigabit Coaxial Access Network
By Michael Emmendorfer, Tom Cloonan, Ph.D., Scott Shupe, Zoran Maricevic, Ph.D., ARRIS
Next Generation Cable Network Architecture
By Stephen D. Dukes, Cable Television Laboratories, Inc.
Transport Of CBR Traffic On IP Networks
By Tom Carr, Bruce Roe, Wave7 Optics
Security Issues For Remote Access And Virtual Private Networks Involving Cable Modems
By Daniel Howard, Digital Furnace Corporation
A Side-By-Side Comparison Of Centralized vs. Distributed Access Architectures
By Michael J. Emmendorfer, Thomas J. Cloonan, John Ulm, and Zoran Maricevic, ARRIS
More Results >>