“…), will require specific telecommunication architectures based on new forms of optical transport. 3 In current passive optical network (PON) implementations, authentication and encryption are optional, where encryption is only used for downstream communication from the OLT to the ONU, using only plain text keys exchanged during initialization, and possible security threats; 4 mainly eavesdropping, DoS, spoofing attacks and degradation attacks. 5 After years of development, the concept and connotation of trusted computing have also been greatly enriched, such as the Trusted Platform Module 2.0 standard specification implemented by the Trusted Computing Group, 6 the Trusted Cryptography Module(TCM)1.0/2.0, Trusted Platform Control Module(TPCM) architecture, 7 etc.…”