Table of Contents - G Suppl. 81 (07/2024) - Practical aspects of PON security

1	Scope
2 References
3 Definitions
4 Abbreviations and acronyms
5 Introduction: PON security in perspective
6 Use cases and expectations
6.1 Use case 1: Transmission security in industrial PON
7 Review of security technologies for PON technologies
7.1 General PON threat model
7.2 Unicast data encryption key exchange
7.3 Duplicate-ONU-SN
7.4 Security enhancement Recommendations in OMCI-based authentication