5G移动通信网络安全研究
作者:
作者简介:

冯登国(1965-),男,陕西靖边人,博士,研究员,博士生导师,主要研究领域为网络与信息安全,可信计算与信息保障;徐静(1972-),女,博士,研究员,博士生导师,主要研究领域为应用密码学,安全协议;兰晓(1990-),女,博士,主要研究领域为安全协议.

通讯作者:

冯登国,E-mail:feng@tca.iscas.ac.cn;徐静,E-mail:xujing@tca.iscas.ac.cn

基金项目:

国家自然科学基金(U1636216,U163620049,61572485);国家重点基础研究发展计划(973)(2013CB338003)


Study on 5G Mobile Communication Network Security
Author:
Fund Project:

National Natural Science Foundation of China (U1636216, U163620049, 61572485); National Grand FundamentalResearch (973) Program of China (2013CB338003)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [59]
  • |
  • 相似文献
  • | | |
  • 文章评论
    摘要:

    第五代(fifth gneration,简称5G)移动通信网络(简称5G网络或5G),是为构建网络型社会并实现万物互联的宏伟目标而提出的下一代移动网络.随着LTE等第四代移动通信网络进入规模化商用阶段,5G网络的研究已成为世界各国的关注焦点.5G网络的实现,需要依赖于系统架构和核心技术的变革与创新.目前,5G网络还处于技术和标准的初级研究阶段.5G网络的新架构、新业务、新技术对安全提出了新的挑战.简述了5G的性能指标、关键技术、应用场景及标准制定的进展,分析了5G网络的安全需求及其所面临的技术挑战.基于目前已有的研究工作和标准研制情况,提炼了5G安全框架,归纳并阐述了若干安全关键问题及其解决方案,展望了5G网络安全的未来研究方向.

    Abstract:

    The fifth generation mobile communication network, abbreviated 5G network or 5G, is also called the next generation of mobile communication network, which aims at constructing a networked society and realizing the goal of "everything-connecting". With 4G mobile communication network entering the commercial stage, the research on 5G has gained wider attention all over the world. The realization of the vision for 5G needs the revolution and innovation of system structure and core techniques, and until now the corresponding techniques and standards are in the primary stage. The new architectures, new business, and new technology bring new challenges to 5G security. This paper briefly summarizes performance, key technology, application scenario, and standardization progress of 5G, analyzes the security requirements and challenges of 5G, introduces 5G security framework, and investigates some key issues and the corresponding solutions based on the research efforts, white paper and related standards. Furthermore, the paper discusses the current research trends in industries and academia in the context of 5G security.

    参考文献
    [1] http://www.itu.int/en/ITU-R/information/Pages/default.aspx
    [2] http://www.itu.int/en/ITU-R/study-groups/rsg5/rwp5d/Pages/default.aspx
    [3] 3GPP. 3G security, security architecture. Technical Specification, TS 33.102 v12.1.0, 2014.
    [4] http://www.3gpp.org
    [5] IMT-2020(5G) Promotion Group. 5G wireless technology architecture. White Paper, 2015(in Chinese).
    [6] IMT-2020(5G) Promotion Group. 5G network technology architecture. White Paper, 2015(in Chinese).
    [7] ITU-R. IMT-vision-framework and overall objectives of the future development of IMT for 2020 and beyond. Recommendation, ITU-R M.2083-0. 2015. http://www.itu.int/rec/R-REC-M.2083
    [8] http://www.3gpp.org/release-14
    [9] http://www.3gpp.org/release-15
    [10] https://5g-ppp.eu
    [11] http://www.ngmn.org/home.html
    [12] https://www.gsmaintelligence.com
    [13] 5G PPP. View on 5G architecture. White Paper, v 1.0, 2016.
    [14] NGMN. NGMN 5G white paper. 2015. http://www.ngmn.org/fileadmin/ngmn/content/downloads/Technical/2015/NGMN_5G_White_Paper_V1_0.pdf
    [15] GSMA Intelligence. Understanding 5G:Perspectives on future technological advancements in mobile. 2014.
    [16] IMT-2020(5G) Promotion Group. 5G vision and requirements. White Paper, 2014(in Chinese).
    [17] IMT-2020(5G) Promotion Group. 5G concept. White Paper, 2015(in Chinese).
    [18] IMT-2020(5G) Promotion Group. 5G network architecture design. White Paper, 2016(in Chinese).
    [19] IMT-2020(5G) Promotion Group. 5G network security requirements and architecture. White Paper, 2017(in Chinese).
    [20] Ericsson. 5G system-Enabling the transformation of industry and society. White Paper, 2017. https://www.ericsson.com/assets/local/publications/white-papers/wp-5g-systems.pdf
    [21] Samsung Electronics Co. 5G vision. White Paper, 2015. http://www.samsung.com/global/business-images/insights/2015/Samsung-5G-Vision-2.pdf
    [22] Nokia. Now is the time to prepare for 5G. White Paper, 2013.
    [23] Huawei Technologies Co. 5G opening up new business opportunities. White Paper, 2016.
    [24] 3GPP. Study on the security aspects of the next generation system. Technical Report, TR 33.899 v1.1.0, 2017.
    [25] 5G PPP. 5G PPP phase 1 security landscape. 2017. https://5g-ppp.eu/wp-content/uploads/2014/02/5G-PPP_White-Paper_Phase-1-Security-Landscape_June-2017.pdf
    [26] NGMN. 5G security recommendations (package #1, package #2:networking slicing, package #3:mobile edge computing). White Paper, 2016.
    [27] Ericsson. 5G security-Scenarios and solutions. White Paper, 2017.
    [28] https://www.ericsson.com/assets/local/publications/white-papers/wp-5g-security.pdf
    [29] Nokia. Security challenges and opportunities for 5G mobile networks. White Paper, 2017.
    [30] Huawei Technologies Co. 5G security:Forward thinking. White Paper, 2015. http://www.huawei.com/minisite/5g/img/5G_Security_Whitepaper_en.pdf
    [31] ETSI. Network functions virtualization (NFV); Terminology for main concepts in NFV. Group Specification, NFV 003 v1.1.1. 2013.
    [32] ETSI. Network functions virtualization (NFV); Use cases. Group Specification, NFV 001 v1.1.1. 2013. http://www.etsi.org/deliver/etsi_gs/NFV/001_099/001/01.01.01_60/gs_NFV001v010101p.pdf
    [33] ETSI. Network functions virtualization (NFV); Proof of concepts; Framework. Group Specification, NFV-PER 002 v1.1.2. 2014. http://www.etsi.org/deliver/etsi_gs/NFV-PER/001_099/002/01.01.02_60/gs_NFV-PER002v010102p.pdf
    [34] Evangelos H, Kostas P, Spyros D, Hadi SJ, David M, Odysseas K. Software-Defined networking (SDN):Layers and architecture terminology. IETF RFC 7426. 2015.
    [35] 3GPP. 3GPP system architecture evolution; Security architecture. Technical Specification, TS 33.401 v15.0.0, 2017.
    [36] https://en.wikipedia.org/wiki/Orchestration_%28computing%29
    [37] Gnther H, Peter S. Towards 5G security. In:Proc. of the 14th IEEE Int'l Conf. on Trust, Security and Privacy in Computing and Communications. Helsinki, 2015. 1165-1170.[doi:10.1109/Trustcom.2015.499]
    [38] 3GPP. Study on architecture for next generation system (release 14). Technical Report, TR 23.799 v14.0.0, 2016.
    [39] 5G-Ensure Deliverable D3.5. 5G-PPP security enablers technical roadmap (update). 2016. http://5gensure.eu/sites/default/files/5GENSURE_D3.5%205G-PPP%20security%20enablers%20technical%20roadmap%20%28Update%29.pdf
    [40] 3GPP. Study on subscriber privacy impact in 3GPP. Technical Report, TR 33.849 v14.0.0, 2016.
    [41] 3GPP. Feasibility study on new services and markets technology nnablers-Network operation. Technical Report, TR 22.864 v15.0.0, 2016.
    [42] 3GPP. Study on management and orchestration of network slicing for next generation network. Technical Report, TR 28.801 v1.2.0. 2017.
    [43] NGMN. 5G network and service management including orchestration. White Paper, v2.12.7. 2017.
    [44] 3GPP. Specification of the 3GPP confidentiality and integrity algorithms EEA3 and EIA3, document 4:Design and evaluation reprot. Technical Specification, TR 35.924 v11.0.1, 2012.
    [45] Michel A, Mihir B, Phillip R. DHAES:An encryption scheme based on the Diffie-Hellman problem. IACR Cryptology ePrint Archive. 1999. 7.
    [46] Michel A, Mihir B, Phillip R. The oracle Diffie-Hellman assumptions and an analysis of DHIES. In:Proc. of the Cryptographers' Track at RSA Conf. San Francisco, 2001. 143-158.[doi:10.1007/3-540-45353-9_12]
    [47] Dan B, Matt F. Identity-Based encryption from the Weil pairing. In:Proc. of the 21st Annual Int'l Cryptology Conf. Santa Barbara, 2001. 213-229.[doi:10.1007/3-540-44647-8_13]
    [48] Amit S, Brent W. Fuzzy identity based encryption. IACR Cryptology ePrint Archive. 2004. 86.
    [49] Bernard A, Larry BJ, John VR, James C, Henrik L. Extensible authentication protocol (EAP). IETF RFC 3748, 2004.
    [50] Rosario G, Christian G, Markus A, Simon H. A secure group-based AKA protocol for machine-type communications. In:Proc. of the 19th Annual Int'l Conf. on Information Security and Cryptology. Seoul, 2016. 3-27.[doi:10.1007/978-3-319-53177-9_1]
    [51] ETSI. Mobile edge computing-A key technology towards 5G. White Paper, ISBN No. 979-10-92620-08-5. 2015. http://www.etsi.org/images/files/ETSIWhitePapers/etsi_wp11_mec_a_key_technology_towards_5g.pdf
    [52] https://en.wikipedia.org/wiki/Deep_packet_inspection
    附中文参考文献:
    [5] IMT-2020(5G)推进组.5G无线技术架构.白皮书,2015.
    [6] IMT-2020(5G)推进组.5G网络技术架构.白皮书,2015.
    [16] IMT-2020(5G)推进组.5G愿景与需求.白皮书,2014.
    [17] IMT-2020(5G)推进组.5G概念.白皮书,2015.
    [18] IMT-2020(5G)推进组.5G网络架构设计.白皮书,2016.
    [19] IMT-2020(5G)推进组.5G网络安全需求与架构.白皮书,2017.
    相似文献
    引证文献
引用本文

冯登国,徐静,兰晓.5G移动通信网络安全研究.软件学报,2018,29(6):1813-1825

复制
分享
文章指标
  • 点击次数:6347
  • 下载次数: 18015
  • HTML阅读次数: 4462
  • 引用次数: 0
历史
  • 收稿日期:2017-08-09
  • 最后修改日期:2017-12-28
  • 在线发布日期: 2018-02-08
文章二维码
您是第位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号