Communication Networks
Open PONAlyzer: A Software-Defined Analysis and Testing Solution for Enhanced Security and Resilience in Passive Optical Networks | |
| Key: | SAN+25 |
| Author: | Fridolin Siegmund, Stefano Acquaviti, Bjoern Nagel, Maik Rüder, Matthias Hollick, Ralf Kundel |
| Date: | November 2025 |
| Kind: | In proceedings |
| Book title: | Proceedings of IEEE Conference on Network Function Virtualization and Software Defined Networks 2025 |
| Abstract: | The increasing demand for high-bandwidth, low-latency Internet access is driving the widespread adoption of cost-efficient Passive Optical Networks (PONs). However, the passive nature of PONs necessitate complex subscriber device management protocols, and their shared fiber architecture presents potential disruptions from device failures, misconfigurations, or malicious attacks. To maintain service quality and customer satisfaction, network operators require effective PON monitoring solutions. Yet, existing commercial hardware-based analyzers are prohibitively expensive, challenging to deploy in live networks, and unsuitable for nationwide deployments. This paper introduces PONAlyzer, a novel, open-source software-based PON analyzer and security dashboard, which we make available to the community. By leveraging existing Software Defined Neworking (SDN) interfaces of in-field PON-hardware, i.e. eliminating the need for additional analyzer equipment, PONAlyzer enables the capture and analysis of ONU Management and Control Interface (OMCI) messages, and supports OMCI message injection for advanced security testing and troubleshooting. |
| View Full paper (PDF) | Download Full paper (PDF) | |
The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, not withstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.