Understanding Degradation Attack and TCP Performance in Next Generation Passive Optical Network
The next-generation gigabit passive optical network (NG-PON) is a promising solution for network growth and expansion. The NG-PON aims to connect more users as fiber's deployment to the home (FTTH) initiative takes place. The network needs urgent attention to its security establishment, which i...
Main Authors: | , , , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IOP Publishing Ltd
2021
|
Subjects: | |
Online Access: | View Fulltext in Publisher View in Scopus |
LEADER | 02210nas a2200397Ia 4500 | ||
---|---|---|---|
001 | 10.1088-1742-6596-1933-1-012107 | ||
008 | 220121c20219999CNT?? ? 0 0und d | ||
020 | |a 17426588 (ISSN) | ||
245 | 1 | 0 | |a Understanding Degradation Attack and TCP Performance in Next Generation Passive Optical Network |
260 | 0 | |b IOP Publishing Ltd |c 2021 | |
650 | 0 | 4 | |a Exposed to |
650 | 0 | 4 | |a Fiber to the x |
650 | 0 | 4 | |a Gigabit passive optical network |
650 | 0 | 4 | |a MAC layer |
650 | 0 | 4 | |a Maximum through-put |
650 | 0 | 4 | |a Network growth |
650 | 0 | 4 | |a Next generation networks |
650 | 0 | 4 | |a Passive networks |
650 | 0 | 4 | |a Passive optical networks |
650 | 0 | 4 | |a Security establishments |
650 | 0 | 4 | |a TCP congestion control |
650 | 0 | 4 | |a TCP performance |
650 | 0 | 4 | |a Transmission control protocol |
856 | |z View Fulltext in Publisher |u https://doi.org/10.1088/1742-6596/1933/1/012107 | ||
856 | |z View in Scopus |u https://www.scopus.com/inward/record.uri?eid=2-s2.0-85114958269&doi=10.1088%2f1742-6596%2f1933%2f1%2f012107&partnerID=40&md5=370691bc01bc4138baa0e5738e9b0a2d | ||
520 | 3 | |a The next-generation gigabit passive optical network (NG-PON) is a promising solution for network growth and expansion. The NG-PON aims to connect more users as fiber's deployment to the home (FTTH) initiative takes place. The network needs urgent attention to its security establishment, which is currently exposed to a degradation attack. During the attack, already available TCP congestion control is invoked to handle collision. The interconnection of TCP in the transport layer and attack in the MAC layer is investigated. During the attack, a reduction of 63% of total throughput is detected. A variation of the number of ONU also determines the competing nature of TCP, which inherently reduces the maximum throughput of 4%. © Published under licence by IOP Publishing Ltd. | |
700 | 1 | 0 | |a Atan, F.M. |e author |
700 | 1 | 0 | |a Hutahean J. |e author |
700 | 1 | 0 | |a Idrus, S.M. |e author |
700 | 1 | 0 | |a Ismail, N.A. |e author |
700 | 1 | 0 | |a Mesran |e author |
700 | 1 | 0 | |a Rahim R. |e author |
700 | 1 | 0 | |a Supriyanto |e author |
700 | 1 | 0 | |a Watrianthos R. |e author |
700 | 1 | 0 | |a Zin, A.M. |e author |
700 | 1 | 0 | |a Zulkifl, N. |e author |