期刊文献+

5G移动通信网络的安全研究 被引量:15

Research on Security of 5G Mobile Communication Network
下载PDF
导出
摘要 随着移动通信和智能设备的迅速发展,第五代移动通信系统(5G)的商用落地,为用户提供更好体验、更为快捷流畅、稳定的通信服务.针对5G移动通信网络的安全,分别从新业务、新网络体系结构、新型空中接口技术和用户隐私的更高要求这4个方面来介绍5G移动通信网络的安全要求,并提出5G UE接入和切换方法、物联网的轻量级安全机制、网络切片安全隔离策略、用户隐私保护和区块链技术这5方面的保护应对策略. With the rapid development of mobile communications and smart devices,the commercial implementation of the fifth generation mobile communication system(5G)provides users with a better experience,faster,smoother,and stable communication services.Aiming at the security of 5G mobile communication network,The security of 5G mobile communication network is introduced from four aspects of new services,new network architecture,new air interface technology and higher user privacy requirements,and proposed five aspects of protection and response strategies,which contain 5G UE access and switching methods,lightweight security mechanism of the Internet of things,network slice security isolation strategy,user privacy protection and blockchain technology.
作者 林嘉涛 李玉 陈海萍 Lin Jiatao;Li Yu;Chen Haiping(China Telecom Xiamen Branch,Xiamen,Fujian 361001)
出处 《信息安全研究》 2020年第8期699-704,共6页 Journal of Information Security Research
关键词 5G移动通信网络 安全要求 网络切片 区块链 保护应对策略 5G mobile communication network security requirements network slicing blockchain protection countermeasures
  • 相关文献

参考文献3

二级参考文献19

  • 1Li X H, Hwu J, Ratazzi E P. Using antenna array redundancy and channel diversity for secure wireless transmissions. J Commun, 2007, 2: 24-32.
  • 2Sayeed A, Perrig A. Secure wireless communications: Secret keys through multipath. In: Proceedings of IEEE Inter?national Conference on Acoustics, Speech, and Signal Processing (ICASSP'08), 2008. 3013-3016.
  • 3Wallace J, Sharma R K. Automatic secret keys from reciprocal MIMO wireless channels: measurement and analysis. IEEE Trans Inform Forens Secur, 2010, 5: 381-391.
  • 4Wallace J. Secure physical layer key generation schemes: performance and information theoretic limits. In: Proceedings of IEEE ICC, Dresden, 2009. 1-5.
  • 5Aono T, Higuchi K, Ohira T, et al. Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels. IEEE Trans Anten Propag, 2005, 53: 3776-3784.
  • 6Czylwik, A. Downlink beamforming for mobile radio systems with frequency division duplex. In: Proceedings of IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2000. 72-76.
  • 7Steinbauer M, Molisch A F, Bonek E. The double-directional radio channel. IEEE Anten Propag, 2001, 43: 51-63.
  • 8Liang Y C, Chin F, Kot A. Downlink channel covariance matrix (DCCM) estimation for FDD SDMA. In: Proceedings of IEEE Vehicular Technology Conference, 2002. 2382-2386.
  • 9Goldreich 0, Ron D, Sudan M. Chinese Remaindering with Errors. IEEE Trans Inform Theory, 2000, 46: 1330-1338.
  • 10Mandelbaum D M. On a class of arithmetic codes and a decoding algorithm. IEEE Trans Inform Theory, 1976, 1: 85-88.

共引文献38

同被引文献55

引证文献15

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部