Table of Contents - G Suppl. 81 (07/2024) - Practical aspects of PON security
1 Scope 2 References 3 Definitions 4 Abbreviations and acronyms 5 Introduction: PON security in perspective 6 Use cases and expectations 6.1 Use case 1: Transmission security in industrial PON 7 Review of security technologies for PON technologies 7.1 General PON threat model 7.2 Unicast data encryption key exchange 7.3 Duplicate-ONU-SN 7.4 Security enhancement Recommendations in OMCI-based authentication
|