Hybrid Encryption Scheme of EOC Traffic

Article Preview

Abstract:

To improve the security of EoC network traffic, the hybrid encryption scheme was presented. The relevant encryption algorithm was analyzed, and the hybrid encryption scheme was proposed for EOC downlink traffic encryption, in which ECC algorithm is taken to produce and encrypt session key, and Blowfish algorithm is improved to encrypt the broadband-authorized frame and downlink data. The security analysis show the encryption scheme can guarantee the integrity and confidentiality of the data in the EoC transmission process.

You have full access to the following eBook

Info:

Periodical:

Pages:

907-912

Citation:

Online since:

September 2012

Export:

Share:

Citation:

[1] William Stallings. Cryptography and Network Security -Practice Principles[M]. Translated by Liu Yuzhen, Wang Lina, etc. Beijing: Publishing House of Electronics Industry, (2004).

Google Scholar

[2] Wang Yinglai. Application of EOC Base on Homeplug AV in the Transformation of Two-way Radio and TV Network in Xinjiang. China Digital Cable TV, 2009 (7): 719-722.

Google Scholar

[3] Shang Huayi, Yao Guoxiang, Guan Quanlong. Hybrid Encryption Based on Blowfish and MD5[J]. Application Research of Computers, 2010, 27(1): 231-233.

Google Scholar

[4] Zhong Qianchuan, Zhu qingxin. Blowfish Cryptography Analysis. Journal of Computer Application, 2007, 27(12): 2940-2941.

Google Scholar

[5] Zhang Zhong. Comparison and Evaluation of EOC Systems of Radio and TV Network. International Broadband Network, 2010(4): 85-88.

Google Scholar

[6] He Yimin, Gu Yaping, Zhu Yunbin. Research of Registration Authentication and Communication Encryption in EOC System. Technical Acoustics, 2010, 29(6): 434-435.

Google Scholar

[7] Li Zongjie. Research of Data Security in EPON. Jiaozuo: Henan Polytechnic University, (2010).

Google Scholar

[8] Kuo-Feng Hwang, Chin-Chen Chang. A Self-Encryption Mechanism for Authentication of Roaming and Teleconference Services. IEEE Transactions on Wireless Communications, 2003, 2(2): 400-407.

DOI: 10.1109/twc.2003.809452

Google Scholar