Overview of 5G security technology

被引:72
作者
Ji, Xinsheng [1 ]
Huang, Kaizhi [1 ]
Jin, Liang [1 ]
Tang, Hongbo [1 ]
Liu, Caixia [1 ]
Zhong, Zhou [1 ]
You, Wei [1 ]
Xu, Xiaoming [1 ]
Zhao, Hua [1 ]
Wu, Jiangxing [1 ]
Yi, Ming [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol R&D Ct, Zhengzhou 450002, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
5G security; endogenous defense; mimic defense; physical layer security; lightweight encryption; network slice security; user privacy preservation; block chain; PHYSICAL LAYER SECURITY; KEY GENERATION; MASSIVE MIMO; WIRELESS; AUTHENTICATION; COMMUNICATION; AGREEMENT; NETWORKS; PRIVACY; ACCESS;
D O I
10.1007/s11432-017-9426-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5G business applications, network architecture, the air interface, and user privacy. The development trends of 5G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5G security development. Several incremental 5G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5G.
引用
收藏
页数:25
相关论文
共 112 条
[1]  
3GPP, 2017, 3 GEN PARTN PROJ TEC
[2]  
3GPP SA, 3 GEN PARTN PROJ SER
[3]  
5GPP, 2017, 5G PPP PHAS1 SEC LAN
[4]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[5]   A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges [J].
Akpakwu, Godfrey Anuga ;
Silva, Bruno J. ;
Hancke, Gerhard P. ;
Abu-MAhfouz, Adnan M. .
IEEE ACCESS, 2018, 6 :3619-3647
[6]  
Albrecht MR, 2014, LECT NOTES COMPUT SC, V8616, P57, DOI 10.1007/978-3-662-44371-2_4
[7]  
[Anonymous], 5G SEC SCEN SOL
[8]  
[Anonymous], 2013, NETW FUNCT VIRT ARCH
[9]  
[Anonymous], Ngmn 5g white paper
[10]  
[Anonymous], 2017, ARXIV170608215