摘要: |
5G是未来网络空间的核心基础设施,因而5G安全是网络空间安全的重要组成部分。5G安全技术应打破以往移动通信系统成型后“打补丁式”的升级演进模式,与5G移动通信技术同步演进,实现系统安全内生与安全威胁“标本兼治”的目标。为了“有的放矢”的推动安全技术同步演进,应首先解决两个基本问题:5G安全需求是什么和5G安全体系架构是什么。针对这两个问题,本文首先从业务、网络、无线接入、用户与终端、系统五个视角梳理了5G通信与计算融合演进的技术特点,并基于这些特点系统的分析了5G安全需求;然后,面向5G安全需求,设计了5G安全总体架构;最后,总结归纳出了5G安全技术的三个发展趋势,即,“面向服务的安全”“安全虚拟化”与“增强用户隐私与数据保护”。本文希望为5G安全技术的同步演进提供有益的参考。 |
关键词: 5G 安全 融合演进 总体安全架构 安全需求 |
DOI:10.19363/J.cnki.cn10-1380/tn.2018.09.01 |
Received:January 05, 2017Revised:April 26, 2017 |
基金项目:本课题得到国家自然科学基金(No.61302108)资助。 |
|
5G Security: Requirements Analysis and Architecture Design Towards CT and IT Convergent Evolution |
LI Hongjia,WANG Liming,XU Zhen,YANG Chang |
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China |
Abstract: |
The fifth generation (5G) mobile communication system is the core infrastructure of future cyberspace; this makes the 5G security indispensable to the cyberspace security. In order to amalgamate the security with 5G standardization, security technology should get rid of the patching evolution mode happened in 3G and 4G, where it is developed as patches to the already found security threats. Thus, it is vital to clarify the guidelines of how 5G security technology synchronously evolves with the 5G communication technology. To this end, we delve into two fundamental problems:what are 5G security requirements and how should the corresponding security architecture be designed? Correspondingly, we first dissect the convergent evolution features and systematically analyze security requirements from five perspectives, namely, the user/terminal, the network, the radio access, the application and service, and the system. Then, following the requirements, we design a new 5G security architecture. Finally, three development trends of the 5G security technology, namely, service-oriented security, security virtualization and enhanced protection for privacy and data, are highlighted to give a glimpse of the evolution roadmap of 5G security techniques. |
Key words: 5G security convergent evolution security architecture security requirements |