检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:徐瑨[1] 吴慧慈 陶小峰[1] XU Jin;WU Huici;TAO Xiaofeng(National Engineering Laboratory for Mobile Network Technologies,Beijing University of Posts and Telecommunications,Beijing 100876,China)
机构地区:[1]北京邮电大学移动互联网安全技术国家工程实验室,北京100876
出 处:《电子与信息学报》2020年第10期2319-2329,共11页Journal of Electronics & Information Technology
基 金:国家自然科学基金(61932005,61901051,61501057);中央高校基础科研费专项资金(2019RC55)。
摘 要:随着移动通信技术的快速发展和第5代移动通信(5G)网络的商用,网络空间安全问题日益凸显。该文针对5G网络空间安全中对抗博弈问题进行探讨,从静态博弈、动态博弈、基于演化和图论的博弈等基础模型以及窃听与窃听对抗、干扰与干扰对抗等典型对抗种类方面,对当前国内外网络空间安全对抗博弈的研究进行分析和归纳,并进一步阐述5G网络空间安全对抗博弈研究中潜在的基础理论和对抗规律研究方向,分析5G环境下安全对抗博弈研究的必要性及面临的挑战,为5G网络空间安全攻防对抗研究提供新视角。With the rapid development of mobile communication technologies and the commercial use of 5G,cybersecurity issues are increasingly prominent.For revealing the essence of operation in 5G cybersecurity,current researches on cybersecurity confrontation and game are analyzed from the aspects of basic models including static game,dynamic game,evolutionary game,and graph-based game,as well as the typical confrontation issues including eavesdropping and anti-eavesdropping and jamming and anti-jamming.Furthermore,some potential research directions are also set forth in establishing 5G cybersecurity confrontation theory and general law.Finally,the necessity and challenges of security and game research in 5G networks are discussed,so as to provide new sights for the research of confrontation in 5G cyberspace.
分 类 号:TN918[电子电信—通信与信息系统] TN929.5[电子电信—信息与通信工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.3