CN112787801A - Method for authentication between PON (Passive optical network) equipment based on MD5 algorithm - Google Patents

Method for authentication between PON (Passive optical network) equipment based on MD5 algorithm Download PDF

Info

Publication number
CN112787801A
CN112787801A CN202110083179.1A CN202110083179A CN112787801A CN 112787801 A CN112787801 A CN 112787801A CN 202110083179 A CN202110083179 A CN 202110083179A CN 112787801 A CN112787801 A CN 112787801A
Authority
CN
China
Prior art keywords
equipment
authentication
onu
olt
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110083179.1A
Other languages
Chinese (zh)
Inventor
唐鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen C-Data Technology Co ltd
Original Assignee
Shenzhen C-Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen C-Data Technology Co ltd filed Critical Shenzhen C-Data Technology Co ltd
Priority to CN202110083179.1A priority Critical patent/CN112787801A/en
Publication of CN112787801A publication Critical patent/CN112787801A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q11/0067Provisions for optical access or distribution networks, e.g. Gigabit Ethernet Passive Optical Network (GE-PON), ATM-based Passive Optical Network (A-PON), PON-Ring

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Power Engineering (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention relates to the technical field of optical network communication, in particular to a method for authenticating PON equipment based on MD5 algorithm, which comprises the following steps: step S1: connecting OLT equipment with ONU equipment; step S2: the OLT equipment authenticates the ONU equipment; step S3: if the authentication in the step S2 is passed, the next step is carried out, otherwise, the step S2 is returned; step S4: the ONU equipment authenticates the OLT equipment; step S5: and if the authentication in the step S4 is passed, the authentication is completed, the OLT equipment and the ONU equipment enter a normal interaction state, otherwise, the step S2 is returned. The method for authentication among PON equipment based on the MD5 algorithm is relatively low in cost and universal in applicability, solves the problem of insufficient authentication safety among the PON equipment, and avoids the risks of being easy to crack and pretending to be registered.

Description

Method for authentication between PON (Passive optical network) equipment based on MD5 algorithm
[ technical field ] A method for producing a semiconductor device
The invention relates to the technical field of optical network communication, in particular to a method for authenticating PON equipment based on an MD5 algorithm.
[ background of the invention ]
Oam (operation Administration and maintenance) refers to dividing the management work of a network into 3 general categories according to the actual needs of the operator network operation: operation (Operation), management (Administration), Maintenance (Maintenance). The OAM of the EPON can quickly find out a failure link, determine the fault position and ensure the network quality; and meanwhile, the system supports the user expansion function and facilitates upper management.
The OMCI (optical network unit Management and Control Interface) is a protocol for information interaction between the OLT and the ONT defined in the GPON standard, and is used for the OLT to manage the ONT in the GPON network, including configuration Management, fault Management, performance Management, security Management, and the like.
In the two PON protocol standards, only a few plaintext authentication methods are defined, and no safer authentication method is provided, so that the risk of being easily cracked and pretending to be registered exists.
[ summary of the invention ]
In order to overcome the technical problem, the invention provides a method for authentication between PON equipment based on MD5 algorithm.
The invention provides a method for authenticating PON equipment based on MD5 algorithm, which comprises the following steps:
step S1: connecting OLT equipment with ONU equipment;
step S2: the OLT equipment authenticates the ONU equipment;
step S3: if the authentication in the step S2 is passed, the next step is carried out, otherwise, the step S2 is returned;
step S4: the ONU equipment authenticates the OLT equipment;
step S5: and if the authentication in the step S4 is passed, the authentication is completed, the OLT equipment and the ONU equipment enter a normal interaction state, otherwise, the step S2 is returned.
Preferably, the step 2 comprises the steps of:
step S21: the OLT equipment sends a get request message to the ONU equipment through a fixed OMCI private entity;
step S22: after receiving the get request, the ONU equipment calculates a first MD5 and returns the result serving as message content to the OLT equipment;
step S23: the OLT equipment calculates the first MD5 and compares the calculation result with the result returned by the ONU equipment.
Preferably, the step S3 includes the steps of:
step S31: if the result of the first MD5 calculated by the OLT device is consistent with the result returned by the ONU device, the authentication is considered to be passed, and the process proceeds to step S4;
and step S31, if the result of the first MD5 calculated by the OLT equipment is inconsistent with the result returned by the ONU equipment, the authentication is not passed, and the step S2 is returned.
Preferably, the step S4 further includes the steps of:
step S41: the ONU equipment triggers an authentication timer to limit authentication time;
step S42: the OLT equipment issues a set operation message containing a calculation result of the second MD5 through a fixed OMCI private entity;
step 43: the ONU device calculates the second MD5 and compares the result with the result in the set operation message.
Preferably, the step S5 further includes the steps of:
step S51, if the result of the ONU equipment calculating the second MD5 is consistent with the result of the OLT equipment calculating the second MD5, the certification is passed, the authentication timer is closed, and the OLT equipment and the ONU equipment enter a normal interaction state;
step S52: the result of the ONU device calculating the second MD5 is inconsistent with the result of the OLT device calculating the second MD5, and if the authentication is not completed within the authentication time, the authentication is considered not to pass, the authentication timer is turned off, and the process returns to step S2.
Compared with the prior art, the method for authentication between PON equipment based on the MD5 algorithm has the following advantages:
the method for authentication among PON equipment based on the MD5 algorithm is relatively low in cost and universal in applicability, solves the problem of insufficient authentication safety among the PON equipment, and avoids the risks of being easy to crack and pretending to be registered.
[ description of the drawings ]
Fig. 1 is a schematic view of a specific flow structure of the method for authentication between PON devices based on MD5 algorithm in the present invention.
Fig. 2 is a schematic structural flow diagram of step S2 of the method for authenticating PON devices based on MD5 algorithm according to the present invention.
Fig. 3 is a schematic structural flow diagram of step S3 of the method for authenticating PON devices based on MD5 algorithm according to the present invention.
Fig. 4 is a schematic structural flow diagram of step S4 of the method for authenticating PON devices based on MD5 algorithm according to the present invention.
Fig. 5 is a schematic structural flow diagram of step S5 of the method for authenticating PON devices based on MD5 algorithm according to the present invention.
[ detailed description ] embodiments
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The plaintext content of the MD5 authentication information is first defined as follows:
ONU UID+OLT/ONU Key
wherein:
ONU UID: and 5, unifying capitalization. The EPON takes the MAC reported by the ONU as a unique identifier, such as: AA, BB, CC, DD, EE, FF, and the field is AABBCCDDEEFF; the GPON takes the GPON SN reported by the ONU as a unique identifier, such as: GPON-12345678, then this field is GPON 12345678.
OLT/ONU Key: defined by the manufacturer, the OLT and the ONUs use different fields and the content is fixed. Such as: OLTKey, ONUKey.
Referring to fig. 1, the present invention provides a method for authentication between PON devices based on MD5 algorithm, including the following steps:
step S1: and connecting the OLT equipment with the ONU equipment.
Specifically, the OLT device and the ONU device are connected by an optical fiber.
Step S2: and the OLT equipment authenticates the ONU equipment.
Specifically, step S2 includes the steps of:
step S21: the OLT equipment sends a get request message to the ONU equipment through a fixed OMCI private entity;
step S22: after receiving the get request, the ONU equipment calculates a first MD5 and returns the result serving as message content to the OLT equipment;
step S23: the OLT equipment calculates the first MD5 and compares the calculation result with the result returned by the ONU equipment.
Specifically, the plaintext content of the first MD5 is ONU SN + ONU KEY, and the OLT device and the ONU device respectively calculate and compare the results for subsequent authentication.
Step S3: the authentication in step S2 is passed and the next step is proceeded to, otherwise, the process returns to step S2.
Specifically, step S3 further includes the steps of:
step S31: if the result of the first MD5 calculated by the OLT device is consistent with the result returned by the ONU device, the authentication is considered to be passed, and the process proceeds to step S4;
and step S31, if the result of the first MD5 calculated by the OLT equipment is inconsistent with the result returned by the ONU equipment, the authentication is not passed, and the step S2 is returned.
Step S4: and the ONU equipment authenticates the OLT equipment.
Specifically, step S4 further includes the steps of:
step S41: the ONU equipment triggers an authentication timer to limit authentication time;
step S42: the OLT equipment issues a set operation message containing a calculation result of the second MD5 through a fixed OMCI private entity;
step 43: the ONU device calculates the second MD5 and compares the result with the result in the set operation message.
Specifically, the plaintext content of the second MD5 is ONU SN + OLT KEY, and the OLT device and the ONU device respectively calculate and compare the results for subsequent authentication.
Step S5: and if the authentication in the step S4 is passed, the authentication is completed, the OLT equipment and the ONU equipment enter a normal interaction state, otherwise, the step S2 is returned.
Specifically, step S5 further includes the steps of:
step S51, if the result of the ONU equipment calculating the second MD5 is consistent with the result of the OLT equipment calculating the second MD5, the certification is passed, the authentication timer is closed, and the OLT equipment and the ONU equipment enter a normal interaction state;
step S52: the result of the ONU device calculating the second MD5 is inconsistent with the result of the OLT device calculating the second MD5, and if the authentication is not completed within the authentication time, the authentication is considered not to pass, the authentication timer is turned off, and the process returns to step S2.
The MD5 algorithm can calculate an input string with a certain length to obtain a fixed length and output the fixed length, and the algorithm is irreversible, so that a system administrator cannot reversely deduce a plaintext through a decryption algorithm even if the encrypted ciphertext is obtained, the password information for confirming the identity is kept secret and is not easy to crack, and the security of authentication is improved.
It can be understood that the present invention uses a GPON system as a specific embodiment, including but not limited to this, the method is also suitable for an EPON system, only the plaintext content of MD5 needs to be changed to ONU MAC + OLT/ONU KEY, and the authentication information is exchanged through OAM messages.
Compared with the prior art, the method for authentication between PON equipment based on the MD5 algorithm has the following advantages:
the method for authentication among PON equipment based on the MD5 algorithm is relatively low in cost and universal in applicability, solves the problem of insufficient authentication safety among the PON equipment, and avoids the risks of being easy to crack and pretending to be registered.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and any modifications, equivalents, improvements, etc. made within the spirit of the present invention should be included in the scope of the present invention.

Claims (5)

1. A method for authentication between PON equipment based on MD5 algorithm is characterized in that: the method for authentication among PON equipment based on the MD5 algorithm comprises the following steps:
step S1: connecting OLT equipment with ONU equipment;
step S2: the OLT equipment authenticates the ONU equipment;
step S3: if the authentication in the step S2 is passed, the next step is carried out, otherwise, the step S2 is returned;
step S4: the ONU equipment authenticates the OLT equipment;
step S5: and if the authentication in the step S4 is passed, the authentication is completed, the OLT equipment and the ONU equipment enter a normal interaction state, otherwise, the step S2 is returned.
2. The method for inter-PON-device authentication based on the MD5 algorithm of claim 1, wherein: the step 2 comprises the following steps:
step S21: the OLT equipment sends a get request message to the ONU equipment through a fixed OMCI private entity;
step S22: after receiving the get request, the ONU equipment calculates a first MD5 and returns the result serving as message content to the OLT equipment;
step S23: the OLT equipment calculates the first MD5 and compares the calculation result with the result returned by the ONU equipment.
3. The method of inter-PON-device authentication based on the MD5 algorithm of claim 2, wherein: the step S3 includes the following steps:
step S31: if the result of the first MD5 calculated by the OLT device is consistent with the result returned by the ONU device, the authentication is considered to be passed, and the process proceeds to step S4;
and step S31, if the result of the first MD5 calculated by the OLT equipment is inconsistent with the result returned by the ONU equipment, the authentication is not passed, and the step S2 is returned.
4. The method for inter-PON-device authentication based on the MD5 algorithm of claim 1, wherein: the step S4 further includes the steps of:
step S41: the ONU equipment triggers an authentication timer to limit authentication time;
step S42: the OLT equipment issues a set operation message containing a calculation result of the second MD5 through a fixed OMCI private entity;
step 43: the ONU device calculates the second MD5 and compares the result with the result in the set operation message.
5. The method of inter-PON-device authentication based on the MD5 algorithm of claim 4, wherein: the step S5 further includes the steps of:
step S51, if the result of the ONU equipment calculating the second MD5 is consistent with the result of the OLT equipment calculating the second MD5, the certification is passed, the authentication timer is closed, and the OLT equipment and the ONU equipment enter a normal interaction state;
step S52: the result of the ONU device calculating the second MD5 is inconsistent with the result of the OLT device calculating the second MD5, and if the authentication is not completed within the authentication time, the authentication is considered not to pass, the authentication timer is turned off, and the process returns to step S2.
CN202110083179.1A 2021-01-21 2021-01-21 Method for authentication between PON (Passive optical network) equipment based on MD5 algorithm Pending CN112787801A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110083179.1A CN112787801A (en) 2021-01-21 2021-01-21 Method for authentication between PON (Passive optical network) equipment based on MD5 algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110083179.1A CN112787801A (en) 2021-01-21 2021-01-21 Method for authentication between PON (Passive optical network) equipment based on MD5 algorithm

Publications (1)

Publication Number Publication Date
CN112787801A true CN112787801A (en) 2021-05-11

Family

ID=75758263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110083179.1A Pending CN112787801A (en) 2021-01-21 2021-01-21 Method for authentication between PON (Passive optical network) equipment based on MD5 algorithm

Country Status (1)

Country Link
CN (1) CN112787801A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113825135A (en) * 2021-09-18 2021-12-21 江苏亨鑫众联通信技术有限公司 Micro base station architecture construction authentication method, FPGA and unit product

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060129814A1 (en) * 2004-12-10 2006-06-15 Eun Jee S Authentication method for link protection in Ethernet Passive Optical Network
CN102239654A (en) * 2009-08-14 2011-11-09 华为技术有限公司 Authentication method and apparatus for passive optical network device
CN103200161A (en) * 2012-01-10 2013-07-10 上海贝尔股份有限公司 Optical network unit (ONU) identity authentication method in gigabit passive optical network (GPON)
CN111526107A (en) * 2019-02-01 2020-08-11 中国移动通信有限公司研究院 Network equipment authentication method, device and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060129814A1 (en) * 2004-12-10 2006-06-15 Eun Jee S Authentication method for link protection in Ethernet Passive Optical Network
CN102239654A (en) * 2009-08-14 2011-11-09 华为技术有限公司 Authentication method and apparatus for passive optical network device
CN103200161A (en) * 2012-01-10 2013-07-10 上海贝尔股份有限公司 Optical network unit (ONU) identity authentication method in gigabit passive optical network (GPON)
WO2013104987A1 (en) * 2012-01-10 2013-07-18 Alcatel Lucent Method for authenticating identity of onu in gpon network
CN111526107A (en) * 2019-02-01 2020-08-11 中国移动通信有限公司研究院 Network equipment authentication method, device and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113825135A (en) * 2021-09-18 2021-12-21 江苏亨鑫众联通信技术有限公司 Micro base station architecture construction authentication method, FPGA and unit product

Similar Documents

Publication Publication Date Title
EP2449718B1 (en) Optical network terminal management control interface-based passive optical network security enhancement
EP2007063A1 (en) A user authentication method, apparatus and system for passive optical network
JP3844762B2 (en) Authentication method and authentication apparatus in EPON
WO2013104987A1 (en) Method for authenticating identity of onu in gpon network
CN110460371B (en) Optical resource checking method and system
CN103210606A (en) Method for authentication of a wireless backup system for an optical network unit
WO2016191942A1 (en) Optical network unit authentication method, optical line terminal and optical network unit
WO2010031269A1 (en) Method, system and device for realizing the user side terminal obtains a password
CN102571353B (en) The method of verifying legitimacy of home gateway in passive optical network
JP4905935B2 (en) Authentication method in network system, authentication device, and device to be authenticated
CN102170421A (en) Method and system for realizing mixed authentication
CN112787801A (en) Method for authentication between PON (Passive optical network) equipment based on MD5 algorithm
CN111526107B (en) Network equipment authentication method, device and storage medium
WO2017076146A1 (en) Network access authentication method and system
WO2014101084A1 (en) Authentication method, device and system
CN116208421A (en) Security authentication management and control method, device, medium and server
CN109495481A (en) OLT device and ONU equipment inter-authentication method and control terminal
WO2008138188A1 (en) A method for detecting the key of the gigabit passive optical network
US20230231728A1 (en) Secure communication method and apparatus in passive optical network
CN117459527A (en) External network terminal and cloud desktop secure connection system and method based on gateway access
CN114143091A (en) Method for authenticating CPE (customer premises equipment) and ACS (auto-configuration server) based on MD5 algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210511

RJ01 Rejection of invention patent application after publication