[1]
V.C. Gungor, F.C. Lambert. A survey on communication networks for electric system automation. Computer Networks, 2006, 50(3): 877–897.
DOI: 10.1016/j.comnet.2006.01.005
Google Scholar
[2]
D. Bassett, K. Clinard, J. Grainger, S. Purucker, and D. Ward. Tutorial course: distribution automation. IEEE Tutorial Publ. 88EH0280-8-PWR, (1988).
Google Scholar
[3]
M. P. McGarry, M. Maier, and M. Reisslein. Ethernet PONs: A survey of dynamic bandwidth allocation (DBA) algorithms. IEEE Commun. Mag., 2004, 42, pp. S8–S15.
DOI: 10.1109/mcom.2004.1321381
Google Scholar
[4]
M. Hajduczenia, H. J. A. d. Silva, and P. P. Monteiro. EPON versus APON and GPON: a detailed performance comparison, " OSA J. Opt. Net., 2006, 5(2): 298–319.
DOI: 10.1364/jon.5.000298
Google Scholar
[5]
F. Effenberger,T. S. El-Bawab. Passive Optical Networks (PONs): Past, present, and future. Optical Switching and Networking, 2009, 6(2)143-150.
DOI: 10.1016/j.osn.2009.02.001
Google Scholar
[6]
S.S. Roh, S. -H. Kim. Security Model and Authentication Protocol in EPON-based Optical Access Network. IEEE ICTON 2003, pp.99-102.
DOI: 10.1109/icton.2003.1264588
Google Scholar
[7]
Y. Meng, T. Jiang, D. Xiao. Analysis and solutions of security issue in Ethernet PON. Proceedings of SPIE, 2005, v. 5626, pp.391-399.
Google Scholar
[8]
M. Hajduczenia, P. R. M. Inacio, H. J. A. Da Silva, M. M. Freire, P. Monteiro. On EPON Security Issues. IEEE Communications Surveys, 2007, 9(1): 68-83.
DOI: 10.1109/comst.2007.358972
Google Scholar
[9]
L. Chen, Z. Cheng, N.P. Smart, Identity-based key agreement protocols from pairings, Int. J. Inform. Security. 2007, 6 (4)213–241.
DOI: 10.1007/s10207-006-0011-9
Google Scholar
[10]
D. Boneh and M. Franklin. Identify-based encryption from the weil pairing. SIAM Journal of Computing, 2003, 32(3): 586–615.
DOI: 10.1137/s0097539701398521
Google Scholar
[11]
Y. Challal, H. Seba. Group key management protocols: A novel taxonomy. International Journal of Information. Technology, 2005, 2(1): 105-117.
Google Scholar
[12]
S. Rafaeli, D. Hutchison. A survey of key management for secure group communication. ACM Computing Surveys, 35(3): 309–329.
DOI: 10.1145/937503.937506
Google Scholar
[13]
H. Harney, C. Muckenhirn, Group key management protocol(GKMP) architecture, RFC 2094, (1999).
DOI: 10.17487/rfc2094
Google Scholar
[14]
C.K. Wong et al., Secure group communications using key graphs, IEEE/ACM Transactions on Networking. 2000, 8 (1): 16–30.
DOI: 10.1109/90.836475
Google Scholar
[15]
McGrew, A.T. Sherman, Key establishment in large dynamic groups using one-way function trees, IEEE Transaction on Software Engineering. 2003, 29 (5): 444–458.
DOI: 10.1109/tse.2003.1199073
Google Scholar
[16]
R. Mukherjee, J.W. Atwood. Scalable solutions for secure group communications. Computer Networks, 2007, 51(12): 3525-3548.
DOI: 10.1016/j.comnet.2007.02.002
Google Scholar