期刊文献+

5G安全威胁及防护技术研究 被引量:20

Study on the Security Threat and Protection Technologies of 5G
在线阅读 下载PDF
导出
摘要 第五代移动通信系统(5G)以更快的速度、更大的容量、更低的成本为用户提供更丰富的业务和更好的用户体验,同时也带来了更多安全挑战,面临的安全威胁更加广泛而复杂。首先分析了现有的安全体系架构和网络安全模型,给出了5G网络的安全需求,并基于此给出了可能的安全防护技术研究方向。 The 5G mobile communication system can provide users with higher data rate, greater capacity, cheaper cost, as wel as better user experience. But the security chal enges also become more complex to handle. It firstly analyzes the existing security archi-tecture and network security model, puts forward the security requirements of 5G. Based on these requirements, it gives the potential research orientations of the security protection technologies.
出处 《邮电设计技术》 2015年第6期8-12,共5页 Designing Techniques of Posts and Telecommunications
基金 国家自然科学基金(61379006) 863计划重点项目(SS2015AA011306)
关键词 第五代移动通信系统 安全防护 物理层安全 5G mobile communication system Security protection Physical layer security
  • 相关文献

参考文献10

二级参考文献42

  • 1SHIN M,MA J,MISHRA A,et al.Wireless network security and interworking[J].Proceedings of the IEEE,2006,94(2):455-466.
  • 2PATHAN A S K,LEE H W,HONG C S.Security in wireless sensor networks:issues and challenges[C] //Proceedings of the 8th International Conference on Advanced Communication Technology.Piscataway,NJ,USA:IEEE,2006:1043-1048.
  • 3AONO K,HIGUCHI T,OHIRA B,et al.Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels[J].IEEE Transactions on Antennas and Propagation,2005,53(11):3776-3784.
  • 4WILSON R,TSE D,SCHOLTZ R A.Channel identification:Secret sharing using reciprocity in UWB channels[J].IEEE Transactions on Information Forensics and Security,2007,2(3):364-375.
  • 5LI Xiaohua,HWU J,RATAZZI E P.Array redundancy and diversity for wireless transmissions with low probability of interception[C] //Proceedings of the 2006 IEEE International Conference on Acoustics,Speech and Signal Processing.Piscataway,NJ,USA:IEEE,2006:525-528.
  • 6LI Xiaohua,HWU J,RATAZZI E P.Using antenna array redundancy and channel diversity for secure wireless transmissions[J].Journal of Communications,2007,2(3):24-32.
  • 7GODARD D N.Self-recovering equalization and carrier tracking in two-dimensional data communication systems[J].IEEE Transactions on Communications,1980,28(11):1867-1875.
  • 8HAYKIN S.Unsupervised adaptive filtering,Ⅱ:blind deconvolution[M].New York,USA:Wiley,2000.
  • 9LI Xiaohua.Blind channel estimation and equalization in wireless sensor networks based on correlations among sensors[J].IEEE Transactions on Signal Processing,2005,53(4):1511-1519.
  • 10JOHNSON D H,DUDGEON D E.Array signal processing,concepts and techniques[M].Upper Saddle River,NJ,USA:Prentice Hall,1993.

共引文献65

同被引文献119

引证文献20

二级引证文献121

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部