Table of Contents - G Suppl. 81 (10/2025) - Practical aspects of PON security - Revision 1
1 Scope 2 References 3 Definitions 4 Abbreviations and acronyms 5 Introduction: PON security in perspective 6 Use cases and expectations 6.1 Use case 1: Transmission security in industrial PON 7 Security methods and techniques for PON systems 7.1 General PON threat model 7.2 Unicast data encryption key exchange 7.3 ONU Serial Number duplication 7.4 Security enhancement Recommendations in OMCI-based authentication
|