检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:唐明环 彭浩楠 王伟忠 查奇文 王聪 Tang Minghuan;Peng Haonan;Wang Weizhong;Zha Qi wen;Wang Cong(China Academy of Industrial Internet,Beijing 100102)
出 处:《信息安全研究》2023年第4期331-337,共7页Journal of Information Security Research
摘 要:5G作为新一代移动通信网络基础设施,应用场景贯穿工业互联网、能源、交通、医疗、教育等生产生活的方方面面.终端大量接入、大规模网络部署、海量数据汇聚等特点为5G网络带来前所未有的安全风险,5G安全关系到社会发展、经济运行乃至国家安全,逐渐成为近年来国内外研究的热点.密码是保障网络与信息安全的核心技术和基础支撑,我国拥有自主知识产权的商用密码算法ZUC,SM4,SM3,SM2等经过十几年的发展,逐步在维护我国网络空间安全中发挥着越来越重要的作用.从5G网络架构及接口切入,分析了5G网络面临的安全风险,并提出了相应的商用密码应用方案,为5G网络商用密码应用实践提供参考.As a new generation of mobile communication network infrastructure,5G application scenarios run through all aspects of production and life,such as industrial Internet,energy industry,transportation,medical industry and education.However,unprecedented security risks have been brought to 5G networks,including massive terminal access,large-scale network deployment,and massive data aggregation.5G security has gradually become a worldwide research trend in recent years since it is crucial to social development,economic operation,and even national security.Cryptography is the core technology and basic support to assure network and information security.After more than ten years of development,national commercial cryptographic algorithms ZUC,SM4,SM3,SM2,whose independent intellectual property rights are available,have gradually exerted more indispensable effects in maintaining the security of national cyberspace.Starting from the 5G network architecture and interfaces,this paper analyzes the underlying security risks faced by the 5G networks and proposes a corresponding solution as an example in terms of the commercial cryptography application practices of the 5G network・.
关 键 词:5G 网络架构 网络接口 安全风险 商用密码应用
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7