引用本文
  • 李宏佳,王利明,徐震,杨畅.5G安全:通信与计算融合演进中的需求分析与架构设计[J].信息安全学报,2018,3(5):1-14    [点击复制]
  • LI Hongjia,WANG Liming,XU Zhen,YANG Chang.5G Security: Requirements Analysis and Architecture Design Towards CT and IT Convergent Evolution[J].Journal of Cyber Security,2018,3(5):1-14   [点击复制]
【打印本页】 【下载PDF全文】 查看/发表评论下载PDF阅读器关闭

←前一篇|后一篇→

过刊浏览    高级检索

本文已被:浏览 6904次   下载 7394 本文二维码信息
码上扫一扫!
5G安全:通信与计算融合演进中的需求分析与架构设计
李宏佳, 王利明, 徐震, 杨畅
0
(中国科学院信息工程研究所 信息安全国家重点实验室 北京 中国 100093)
摘要:
5G是未来网络空间的核心基础设施,因而5G安全是网络空间安全的重要组成部分。5G安全技术应打破以往移动通信系统成型后“打补丁式”的升级演进模式,与5G移动通信技术同步演进,实现系统安全内生与安全威胁“标本兼治”的目标。为了“有的放矢”的推动安全技术同步演进,应首先解决两个基本问题:5G安全需求是什么和5G安全体系架构是什么。针对这两个问题,本文首先从业务、网络、无线接入、用户与终端、系统五个视角梳理了5G通信与计算融合演进的技术特点,并基于这些特点系统的分析了5G安全需求;然后,面向5G安全需求,设计了5G安全总体架构;最后,总结归纳出了5G安全技术的三个发展趋势,即,“面向服务的安全”“安全虚拟化”与“增强用户隐私与数据保护”。本文希望为5G安全技术的同步演进提供有益的参考。
关键词:  5G  安全  融合演进  总体安全架构  安全需求
DOI:10.19363/J.cnki.cn10-1380/tn.2018.09.01
投稿时间:2017-01-05修订日期:2017-04-26
基金项目:本课题得到国家自然科学基金(No.61302108)资助。
5G Security: Requirements Analysis and Architecture Design Towards CT and IT Convergent Evolution
LI Hongjia, WANG Liming, XU Zhen, YANG Chang
(State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China)
Abstract:
The fifth generation (5G) mobile communication system is the core infrastructure of future cyberspace; this makes the 5G security indispensable to the cyberspace security. In order to amalgamate the security with 5G standardization, security technology should get rid of the patching evolution mode happened in 3G and 4G, where it is developed as patches to the already found security threats. Thus, it is vital to clarify the guidelines of how 5G security technology synchronously evolves with the 5G communication technology. To this end, we delve into two fundamental problems:what are 5G security requirements and how should the corresponding security architecture be designed? Correspondingly, we first dissect the convergent evolution features and systematically analyze security requirements from five perspectives, namely, the user/terminal, the network, the radio access, the application and service, and the system. Then, following the requirements, we design a new 5G security architecture. Finally, three development trends of the 5G security technology, namely, service-oriented security, security virtualization and enhanced protection for privacy and data, are highlighted to give a glimpse of the evolution roadmap of 5G security techniques.
Key words:  5G  security  convergent evolution  security architecture  security requirements