Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
This paper shows that malicious upstream transmissions can be used to conduct very intrusive degradation attacks upon the upstream traffic and quantifies the ...
... The above mention attack is known as a degradation attack [5] . A degradation attack is a security breach that harmed the throughput fairness mechanism ...
This work addresses security risks in a gigabit passive optical network by replacing a modified end unit with a laser with a wavelength of 1310 nm.
People also ask
The Passive Optical Network (PON) is the solution for network expansion due to its ability to provide higher transmission speed, a lower overall cost per ...
This paper shows that malicious upstream transmissions can be used to conduct very intrusive degradation attacks upon the upstream traffic and quantifies the ...
The network needs urgent attention to its security establishment, which is currently exposed to a degradation attack. During the attack, already available TCP ...
Sep 10, 2021 · A degradation attack manipulates the transmission control protocol (TCP) congestion control algorithm, which may impact the received bandwidth ...
The dynamic bandwidth allocation (DBA) algorithm is highly impactful in improving the network performance of gigabit passive optical networks (GPON).
However, immediate attention is required due to threats to its security infrastructure, such as degradation attacks in the presence of transmission protocol ( ...
Jan 12, 2021 · I want to know more about upstream bandwidth allocation. What protocol(s) does the OLT use to tell the ONTs when to transmit upstream data?