Cloud-Network-End Collaborative Security for Wireless Networks: Architecture, Mechanisms, and Applications

被引:2
作者
Wang, Xiangyu [1 ]
Ma, Jianfeng [1 ]
机构
[1] Xidian Univ, Sch Telecommun Engn, State Key Lab Integrated Serv Networks ISN, Xian 710071, Peoples R China
来源
TSINGHUA SCIENCE AND TECHNOLOGY | 2025年 / 30卷 / 01期
基金
中国国家自然科学基金;
关键词
Security; Collaboration; Information services; Cloud computing; Semantics; Data communication; Wireless networks; wireless network security; information services security; secure semantic communication model; cloud-network-end collaborative security architecture; heterogeneous network secure convergence; AUTHENTICATION SCHEME; ANONYMITY; PROTOCOL; ALGORITHMS; DATABASE;
D O I
10.26599/TST.2023.9010158
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The core goal of network security is to protect the security of data sharing. Traditional wireless network security technology is committed to guaranteeing end-to-end data transmission security. However, with the advancement of mobile networks, cloud computing, and Internet of Things, communication-computing integration and cloud-network integration have been important technical routes. As a result, the main application requirements of wireless networks have changed from data transmission to cloud-based information services. Traditional data transmission security technology cannot overcome the security requirements of cloud-network-end collaborative services in the new era, and secure semantic communication has become an important model. To address this issue, we propose a cloud-network-end collaborative security architecture. Firstly, we clarify security mechanisms for end system security, network connection security, and cloud services security, respectively. Next, based on the above three aspects, we elaborate on the connotation of cloud-network-end collaborative security. By giving example applications, including heterogeneous network secure convergence framework, unmanned system collaborative operations security framework, and space-air-ground integrated network security framework, we demonstrate the universality of the proposed architecture. Finally, we review the current research on end system security, network connection security, and cloud services security, respectively.
引用
收藏
页码:18 / 33
页数:16
相关论文
共 92 条
[1]   DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems [J].
Abera, Tigist ;
Bahmani, Raad ;
Brasser, Ferdinand ;
Ibrahim, Ahmad ;
Sadeghi, Ahmad-Reza ;
Schunter, Matthias .
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
[2]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[3]   A survey on wireless mesh networks [J].
Akyildiz, IF ;
Wang, XD .
IEEE COMMUNICATIONS MAGAZINE, 2005, 43 (09) :S23-S30
[4]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[5]   Azure SQL Database Always Encrypted [J].
Antonopoulos, Panagiotis ;
Arasu, Arvind ;
Singh, Kunal D. ;
Eguro, Ken ;
Gupta, Nitish ;
Jain, Rajat ;
Kaushik, Raghav ;
Kodavalla, Hanuma ;
Kossmann, Donald ;
Ogg, Nikolas ;
Ramamurthy, Ravi ;
Szymaszek, Jakub ;
Trimmer, Jeffrey ;
Vaswani, Kapil ;
Venkatesan, Ramarathnam ;
Zwilling, Mike .
SIGMOD'20: PROCEEDINGS OF THE 2020 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2020, :1511-1525
[6]   A Survey of Authentication Schemes in Telecare Medicine Information Systems [J].
Aslam, Muhammad Umair ;
Derhab, Abdelouahid ;
Saleem, Kashif ;
Abbas, Haider ;
Orgun, Mehmet ;
Iqbal, Waseem ;
Aslam, Baber .
JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (01)
[7]  
Berger S, 2006, USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, P305
[8]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[9]   Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145
[10]  
Cash D, 2013, LECT NOTES COMPUT SC, V8042, P353, DOI 10.1007/978-3-642-40041-4_20