Table of Contents - G Suppl. 81 (10/2025) - Practical aspects of PON security - Revision 1

1	Scope
2 References
3 Definitions
4 Abbreviations and acronyms
5 Introduction: PON security in perspective
6 Use cases and expectations
6.1 Use case 1: Transmission security in industrial PON
7 Security methods and techniques for PON systems
7.1 General PON threat model
7.2 Unicast data encryption key exchange
7.3 ONU Serial Number duplication
7.4 Security enhancement Recommendations in OMCI-based authentication