期刊文献+

5G安全架构分析 被引量:12

Analysis of 5G Security Architecture
下载PDF
导出
摘要 5G移动通信系统新应用场景和新技术带来新的安全需求和挑战,因此,在对3GPP和IMT-2020发布的5G安全架构研究的基础上,分析了现有安全框架可能存在的安全风险,从安全系统、安全功能、安全服务等多维度提出了5G移动通信系统的安全框架,梳理了5G无线接入、网络、业务以及特殊行业等方面的安全机制要求和解决思路,可为5G安全技术的发展提供总体指导和规范约束。 The new applications and technologies of 5G bring new security requirements and challenges.So,according to the research on the security architecture of 5G released by 3GPP and IMT-2020,this paper analyzes the possible security risks of the existing security architecture,puts forward the security architecture of 5G from the aspects of security system,security function and security service,and summarizes the security mechanism requirements and solutions of 5G wireless access,network,business and special industries,so as to provide an overall development of 5G security technology guidance and normative constraints.
作者 赵文 田永春 曾浩洋 ZHAO Wen;TIAN Yongchun;ZENG Haoyang(The 30th Institute of China Electronics Technology Group Corporation,Chengdu 610041,China)
出处 《电讯技术》 北大核心 2020年第8期876-882,共7页 Telecommunication Engineering
关键词 5G移动通信 网络安全 总体架构 5G mobile network network security overall architecture
  • 相关文献

参考文献8

二级参考文献71

  • 1LIU J,DAI H,and CHEN W.Delay optimal scheduling for energy harvesting based communications[J].IEEE Journal on Selected Areas in Communications,2015,33(3):452-466.doi:10.1109/JSAC.2015.2391972.
  • 2CHEN W,DAI L,LETAIEF K B,et al.A unified cross-layer framework for resource allocation in cooperative networks[J].IEEE Transactions on Wireless Communications,2008,7(8):3000-3012.doi:10.1109/TWC.2008.060831.
  • 3LI J,PETROPULU A P,and WEBER S.On cooperative relaying schemes for wireless physical layer security[J].IEEE Transaction on Signal Processing,2011,59(10):4985-4996.doi:10.1109/TSP.2011.2159598.
  • 4DEHGHAN M,GOECKEL D L,GHADERI M,et al.Energy efficiency of cooperative jamming strategies in secure wireless networks[J].IEEE Transactions on Wireless Communications,2012,11(9):3025-3029.doi:10.1109/ TWC.2012.070912.110789.
  • 5EL-HALABI M,LIU T,and GEORGHIADES C N.Secrecy capacity per unit cost[J].IEEE Journal on Selected Areas in Communications,2013,31(9):1909-1920.doi:10.1109/ JSAC.2013.130922.
  • 6NG D W K,LO E S,and SCHOBER R.Energy-efficient resource allocation for secure OFDMA systems[J].IEEE Transactions on Vehicular Technology,2012,61(6):2572-2585.doi:10.1109/TVT.2012.2199145.
  • 7COMANICIU C,POOR H V,and ZHANG R.An information theoretic framework for energy efficient secrecy [C].IEEE International Conference on Acoustics,Speech and Signal Processing,Vancouver,British Columbia,Canada,2013:2906-2910.
  • 8CHEN W.CAO-SIR:Channel aware ordered successive relaying[J].IEEE Transactions on Wireless Communications,2014,13(12):6513-6527.doi:10.1109/TWC.2014.2363453.
  • 9LIU J,CHEN W,ZHANG Y,et al.A utility maximization framework for fair and efficient multicasting in multicarrier wireless cellular networks[J].IEEE/ACM Transactions on Networking,2013,21(1):110-120.doi:10.1109/TNET.2012.2192747.
  • 10EKREM E and ULUKUS S.Capacity-equivocation region of the Gaussian MIMO wiretap channel[J].IEEE Transactions on Information Theory,2012,58(9):5699-5710.doi:10.1109/ TIT.2012.2204534.

共引文献166

同被引文献58

引证文献12

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部