浏览全部资源
扫码关注微信
[ "刘杨(1984- ),男,北京邮电大学网络技术研究院副教授、硕士生导师,主要研究方向为后5G内生安全等" ]
[ "彭木根(1978- ),男,IEEE Fellow,教育部“长江学者”特聘教授,国家杰出青年科学基金获得者,入选“万人计划”科技创新领军人才、科睿唯安2019年度 ESI 全球高被引科学家和2019年首都科技盛典十大科技人物,网络与交换技术国家重点实验室副主任,中国通信学会青年工作委员会主任,北京市科技人才研究会副理事长。长期从事移动通信智能组网理论及关键技术研究工作。累计发表IEEE 期刊论文100余篇,其中ESI高被引用论文累计19篇,谷歌学术引用近万次。获得IEEE通信学会海因里希·赫兹奖、IEEE通信学会亚太区杰出青年学者奖等。受邀担任 IEEE IoT-J、IEEE Com-munications Magazine等国际期刊指导委员会委员或编委等。以第一完成人身份获得国家技术发明奖二等奖(2018年)、北京市科学技术奖一等奖(2017年)、中国通信学会科学技术奖一等奖(2015年)、求是杰出青年成果转化奖(2018年)等" ]
网络出版日期:2020-01,
纸质出版日期:2020-01-20
移动端阅览
刘杨, 彭木根. 6G内生安全:体系结构与关键技术[J]. 电信科学, 2020,36(1):11-20.
Yang LIU, Mugen PENG. 6G endogenous security:architecture and key technologies[J]. Telecommunications science, 2020, 36(1): 11-20.
刘杨, 彭木根. 6G内生安全:体系结构与关键技术[J]. 电信科学, 2020,36(1):11-20. DOI: 10.11959/j.issn.1000-0801.2020011.
Yang LIU, Mugen PENG. 6G endogenous security:architecture and key technologies[J]. Telecommunications science, 2020, 36(1): 11-20. DOI: 10.11959/j.issn.1000-0801.2020011.
传统移动通信系统在设计之初把安全作为一种独立的技术,依靠“补丁式”“外挂式”,实现无线通信的安全防护。第六代(6G)移动通信系统将基于软件定义切片平台,注重边缘计算,采用人工智能和大数据挖掘等适配不同的应用场景和性能目标,传统的外挂式网络安全机理难以确保6G自身对安全内嵌的需求。提出6G内生安全机理,阐述了6G内生安全的体系结构和关键技术,并且针对6G将采用的新技术中的安全威胁,给出了这些威胁的解决方案,探讨了6G内生安全的挑战和未来研究方向。
At the beginning of design for the traditional mobile communication systems
security is considered as an independent technology
relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform
edge computing
artificial intelligence and big data mining to adapt to different application scenarios and performance objectives
making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed
the architecture and key technologies of 6G endogenous security were described
the security threats in the new technologies were discussed which 6G would adopt
and the chal-lenges and future research directions of 6G endogenous security were provided.
彭木根 . 5G 无线接入网络:雾计算和云计算 [J ] . 电信科学 , 2018 , 34 ( 4 ):
PENG M G . 5G wireless access network:fog computing and cloud computing [J ] . Telecommunications Science , 2018 , 34 ( 4 ):196.
彭木根 , 艾元 . 异构云无线接入网络:原理、架构、技术和挑战 [J ] . 电信科学 , 2015 , 31 ( 5 ): 47 - 51 .
PENG M G , AI Y . Heterogeneous cloud radio access network:principle,architecture,techniques and challenges [J ] . Tele-communications Science , 2015 , 31 ( 5 ): 47 - 51 .
项弘禹 , 肖扬文 , 张贤 , 等 . 5G边缘计算和网络切片技术 [J ] . 电信科学 , 2017 , 33 ( 6 ): 54 - 63 .
XIANG H Y , XIAO Y W , ZHANG X , et al . Edge computing and network slicing technology in 5G [J ] . Telecommunications Science , 2017 , 33 ( 6 ): 54 - 63 .
刘江 , 黄韬 , 张晨 , 等 . SDN 试验床网络虚拟化切片机制综述 [J ] . 通信学报 , 2016 , 37 ( 4 ): 159 - 171 .
LIU J , HUANG T , ZHANG C , et al . Research on network vir-tualization slicing mechanism in SDN-based testbeds [J ] . Journal on Communications , 2016 , 37 ( 4 ): 159 - 171 .
王志宏 , 杨震 . 人工智能技术研究及未来智能化信息服务体系的思考 [J ] . 电信科学 , 2017 , 33 ( 5 ): 1 - 11 .
WANG Z H , YANG Z . Research on artificial intelligence tech-nology and the future intelligent information service architec-ture [J ] . Telecommunications Science , 2017 , 33 ( 5 ): 1 - 11 .
魏凯敏 , 翁健 , 任奎 . 大数据安全保护技术综述 [J ] . 网络与信息安全学报 , 2016 , 2 ( 4 ): 1 - 11 .
WEI K M , WENG J , REN K . Data security and protection techniques in big data:a survey [J ] . Chinese Journal of Network and Information Security , 2016 , 2 ( 4 ): 1 - 11 .
PENG M G , SUN Y H , LI X L , et al . Recent advances in cloud radio access networks:system architectures,key techniques,and open issues [J ] . IEEE Communications Surveys & Tutorials , 2016 , 18 ( 3 ): 2282 - 2308 .
PENG M G , ZHANG K C , JIANG J M , et al . Energy-efficient resource assignment and power allocation in heterogeneous cloud radio access networks [J ] . IEEE Transactions on Vehicular Technology , 2015 , 64 ( 11 ): 5275 - 5287 .
PENG M G , YAN S , ZHANG K C , et al . Fog-computing-based radio access networks:issues and challenges [J ] . IEEE Network , 2016 , 30 ( 4 ): 46 - 53 .
PENG M G , WANG C G , LAU V , et al . Fronthaul-constrained cloud radio access networks:insights and challenges [J ] . IEEE Wireless Communications , 2015 , 22 ( 2 ): 252 - 160 .
PENG M G , LI Y , ZHAO Z Y , et al . System architecture and key technologies for 5G heterogeneous cloud radio access net-works [J ] . IEEE Network , 2015 , 29 ( 2 ): 6 - 14 .
PENG M G , LI Y , JIANG J M , et al . Heterogeneous cloud radio access networks:a new perspective for enhancing spectral and energy efficiencies [J ] . IEEE Wireless Communications , 2014 , 21 ( 6 ): 126 - 135 .
LIU Y , WANG H S , PENG M G , et al . DeePGA:a priva-cy-preserving data aggregation game in crowd sensing via deep reinforcement learning [Z ] . 2019 .
赵亚军 , 郁光辉 , 徐汉青 . 6G移动通信网络:愿景、挑战与关键技术 [J ] . 中国科学:信息科学 , 2019 ( 49 ): 963 - 987 .
ZHAO Y J , YU G H , XU H Q . 6G mobile communication net-works:vision,challenges and key technologies [J ] . Scientia Si-nica (Informationis) , 2019 ( 49 ): 963 - 987 .
江伟玉 , 刘冰洋 , 王闯 . 内生安全网络架构 [J ] . 电信科学 , 2019 , 35 ( 9 ): 20 - 28 .
JIANG W Y , LIU B Y , WANG C . Network architecture with intrinsic security [J ] . Telecommunications Science , 2019 , 35 ( 9 ): 20 - 28 .
AL-ERYANI Y , HOSSAIN E . The D-OMA method for massive multiple access in 6G:performance,security,and challenges [J ] . IEEE Vehicular Technology Magazine , 2019 , 14 ( 3 ): 92 - 99 .
KALBANDE D , KHAN Z , HAJI S , et al . 6G-next gen mobile wireless communication approach [C ] // 3rd International Confe-rence on Electronics,Communication and Aerospace Technol-ogy (ICECA),June 12-14,2019,Coimbatore,India.[S.l.:s.n . ] , 2019 : 1 - 6 .
赖俊森 , 吴冰冰 , 汤瑞 , 等 . 量子保密通信标准化现状与发展分析 [J ] . 电信科学 , 2018 , 34 ( 1 ): 1 - 7 .
LAI J S , WU B B , TANG R , et al . Analysis on the status and development of quantum secure communication standardiza-tion [J ] . Telecommunications Science , 2018 , 34 ( 1 ): 1 - 7 .
0
浏览量
1776
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构