网络与信息安全学报 ›› 2021, Vol. 7 ›› Issue (6): 56-67.doi: 10.11959/j.issn.2096-109x.2021106
• 专栏Ⅰ:新型网络技术及安全 • 上一篇
邱洁1, 韩瑞2, 魏志丰2, 王志洋1
修回日期:
2021-07-08
出版日期:
2021-12-01
发布日期:
2021-12-01
作者简介:
邱洁(1986− ),女,江西吉安人,中国互联网络信息中心高级工程师,主要研究方向为智慧城市、物联网标识应用及安全、信息基础设施管理基金资助:
Jie QIU1, Rui HAN2, Zhifeng WEI2, Zhiyang WANG1
Revised:
2021-07-08
Online:
2021-12-01
Published:
2021-12-01
Supported by:
摘要:
以物理空间与网络空间的映射关系为研究思路,面向网络空间的对象、资源、活动等关键要素,综合考虑了网络空间设备、系统、数据及环境等方面的发展需求,构建了一种科学的网络空间公共基础设施体系,并从管理认证和应用认证的双重认证角度出发,针对用户/设备认证和访问控制等方面给出了一些相应的安全策略和实施建议。
中图分类号:
邱洁, 韩瑞, 魏志丰, 王志洋. 网络空间公共基础设施体系及安全策略研究[J]. 网络与信息安全学报, 2021, 7(6): 56-67.
Jie QIU, Rui HAN, Zhifeng WEI, Zhiyang WANG. Research of public infrastructure system and security policy in cyberspace[J]. Chinese Journal of Network and Information Security, 2021, 7(6): 56-67.
[1] | CNNIC. Statistical report on internet development in China[R]. 2021. |
[2] | ANBAR M , ABDULLAH R , AL-TAMIMI B N , ,et al. A machine learning approach to detect router advertisement flooding attacks in next-generation IPv6 networks[J]. Cognitive Computation, 2018,10(2): 201-214. |
[3] | China Mobile Internet Development Report (2020)[R]. 2020. |
[4] | TERRI MOON CRONK. White house releases first national cyber strategy in 15 years[R]. 2018. |
[5] | Economic Research Office. Overview of the 2019 White Paper on Information and Communications in Japan[R]. 2019. |
[6] | THOMAS B . Towards a common 5G strategy:the case for UK-Germany collaboration[R]. 2020. |
[7] | POTO?NIK J . Recover today,lead for 2030:a future-fit industrial strategy for Europe[R]. 2021. |
[8] | The Ministry of Finance. Government Standard No.5-Public Infrastructure[S]. 2017. |
[9] | GEORGE K . IoT analytics[EB]. 2018. |
[10] | GU Y , REN F J , JI Y S ,et al. The evolution of sink mobility management in wireless sensor networks:a survey[J]. IEEE Communications Surveys & Tutorials, 2016,18(1): 507-524. |
[11] | 陈宗章 . 网络空间:概念、特征及其空间归属[J]. 重庆邮电大学学报(社会科学版), 2019,31(2): 63-71. |
CHEN Z Z . Cyberspace:conception,characteristics and its attribu-tion[J]. Journal of Chongqing University of Posts and Telecommu-nications (Social Science Edition), 2019,31(2): 63-71. | |
[12] | 韩传峰 . 城市公共服务设施的一类价值评估计算模型[J]. 同济大学学报(自然科学版), 2004,32(9): 1239-1251. |
HAN C F . Computing model in evaluation on city public service Establishment[J]. Journal of Tongji University (Natural Science). 2004,32(9): 1239-1251. | |
[13] | 徐翀崎, 李锋, 韩宝龙 . 城市生态基础设施管理研究进展[J]. 生态学报, 2016,36(11): 3146-3155. |
XU C Q , LI F , HAN B L . Progress in research on urban ecological infrastructure management[J]. Acta Ecologica Sinica, 2016,36(11): 3146-3155. | |
[14] | 王坤岩 . 城市公共基础设施效益三维度评价研究[M]. 北京: 企业管理出版社, 2017. |
WANG K Y . Study on three-dimensional evaluation of urban public infrastructure benefit[M]. Beijing: Enterprise Management Pub-lishing House. | |
[15] | KITCHIN R M . Towards geographies of cyberspace[J]. Progress in Human Geography, 1998,22(3): 385-406. |
[16] | 郭莉, 曹亚男, 苏马婧 ,等. 网络空间资源测绘:概念与技术[J]. 信息安全学报, 2018,3(4): 1-14. |
GUO L , CAO Y N , SU M J ,et al. Cyberspace resources surveying and mapping:the concepts and technologies[J]. Journal of Cyber Security, 2018,3(4): 1-14. | |
[17] | 张江, 孙治, 徐锐 ,等. 一种网络空间资源的测度方法研究[J]. 信息技术与网络安全, 2019,38(5): 7-11. |
ZHANG J , SUN Z , XU R ,et al. A research on measure method of cyberspace resource[J]. Information Technology and Network Se-curity, 2019,38(5): 7-11. | |
[18] | CHEN Z Z . Cyberspace:conception,characteristics and its attribution[J]. Journal of Chongqing University of Posts and Telecommunications (Social Science Edition), 2019,31(2): 63-71. |
[19] | 方滨兴 . 定义网络空间安全[J]. 网络与信息安全学报, 2018,4(1): 1-5. |
FANG B X . Define cyberspace security[J]. Chinese Journal of Network and Information Security, 2018,4(1): 1-5. | |
[20] | OLIVEIRA L B , DAHAB R , LOPEZ J ,et al. Identity-based encryption for sensor networks[C]// Proceedings of Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07). 2007: 290-294. |
[21] | ROHBANIAN M R , KHARAZMI M R , KESHAVARZ-HADDAD A , ,et al. Watchdog- LEACH:a new method based on LEACH protocol to secure clustered wireless sensor networks[J]. Advances in Computer Science An International Journal, 2013,2(3): 105-117. |
[22] | 邹凯, 侯岚, 蒋知义 ,等. 智慧城市信息安全风险影响因素的三维结构框架与识别研究[J]. 现代情报, 2019,39(10): 15-23. |
ZOU K , HOU L , JIANG Z Y ,et al. Research on 3-D structure and recognition of influencing factors of information security risk in smart city[J]. Journal of Modern Information, 2019,39(10): 15-23. | |
[23] | ISO/IEC 29115-2013. Information technology-security techniquesentity authentication assurance framework[S]. 2013 |
[24] | ISO/IEC TS 29003:2018. Information technology-security techniques -Identity proofing[S]. 2018 |
[25] | 董发志, 丁洪伟, 杨志军 ,等. 基于遗传算法和模糊C均值聚类的WSN分簇路由算法[J]. 计算机应用, 2019,39(8): 2359-2365. |
DONG F Z , DING H W , YANG Z J ,et al. WSN clustering routing algorithm based on genetic algorithm and fuzzy C-means cluster-ing[J]. Journal of Computer Applications, 2019,39(8): 2359-2365. | |
[26] | 危蓉, 赵德正 . 基于身份的无线传感器网络层簇式密钥管理方案[J]. 武汉大学学报(工学版), 2015,48(4): 580-583,590. |
WEI R , ZHAO D Z . Key-management scheme based on identity and cluster layer for wireless sensor network[J]. Engineering Jour-nal of Wuhan University, 2015,48(4): 580-583,590. | |
[27] | 田野, 张玉军, 张瀚文 ,等. 移动 IPv6 网络基于身份的层次化接入认证机制[J]. 计算机学报, 2007,30(6): 905-915. |
TIAN Y , ZHANG Y J , ZHANG H W ,et al. Identity-based hierar-chical access authentication in mobile IPv6 network[J]. Chinese Journal of Computers, 2007,30(6): 905-915. | |
[28] | 张彬, 广晖, 陈熹 . 基于智能合约的无线Mesh网络安全架构[J]. 计算机工程, 2019,45(11): 16-23,31. |
ZHANG B , GUANG H , CHEN X . Smart contract-based security architecture for wireless mesh network[J]. Computer Engineering, 2019,45(11): 16-23,31. | |
[29] | CAO J W , YANG M B . Energy Internet:towards smart grid 2.0[C]// Proceedings of 2013 Fourth International Conference on Networking and Distributed Computing. Piscataway:IEEE Press, 2013: 105-110. |
[30] | XU G Q , CAO Y , REN Y Y ,et al. Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things[J]. IEEE Access, 2017,5: 21046-21056. |
[31] | H?NISCH T , ROGGE S . IT-Sicherheit in der Industrie 4.0[M]. Wiesbaden,Germany: Springer, 2017. |
[32] | European Commission EU cyber security strategy[R]. 2018. |
[33] | 董亚南, 赵改侠, 谢宗晓 . 关键信息基础设施保护及其实践探讨[J]. 网络空间安全, 2018,9(8): 84-89. |
DONG Y N , ZHAO G X , XIE Z X . The practice of critical infor-mation infrastructure protection analysis[J]. Cyberspace Security, 2018,9(8): 84-89. | |
[34] | 郭朝先, 刘艳红 . 中国信息基础设施建设:成就、差距与对策[J]. 企业经济, 2020,39(9): 143-151. |
GUO C X , LIU Y H . The construction,achievements,gaps and countermeasures of information infrastructure in China[J]. Enter-prise Economy, 2020,39(9): 143-151. | |
[35] | SANI A S , YUAN D , JIN J ,et al. Cyber security framework for Internet of Things-based Energy Internet[J]. Future Generation Computer Systems, 2019,93: 849-859. |
[36] | TECHNOLOGY N I O S A . Framework for improving critical infrastructure cybersecurity:version 1.0[EB]. 2014. |
[37] | STINE K , BARRETT M . Portuguese translation of the framework for improving critical infrastructure cybersecurity version 1.1 (cybersecurity framework)[R]. National Institute of Standards and Technology, 2021. |
[38] | European Network and Information Security Agency. EU network and information security directive[R]. 2019. |
[1] | 王硕, 柏军, 王佰玲, 张旭, 刘红日. 基于时间压缩的流量加速回放方法[J]. 网络与信息安全学报, 2021, 7(5): 178-188. |
[2] | 宋永成, 黄欣沂, 伍玮, 陈海霞. 基于编码的数字签名综述[J]. 网络与信息安全学报, 2021, 7(4): 1-17. |
[3] | 赵昊, 舒辉, 康绯, 邢颖. 基于智能合约的高对抗性僵尸网络研究[J]. 网络与信息安全学报, 2021, 7(4): 30-41. |
[4] | 刘建伟, 李大伟, 高莹, 孙钰, 郭华. 面向网络空间安全人才培养的PRIDE教学模式探索与实践[J]. 网络与信息安全学报, 2021, 7(4): 183-189. |
[5] | 王涛, 陈鸿昶. 考虑拜占庭属性的SDN安全控制器多目标优化部署方案[J]. 网络与信息安全学报, 2021, 7(3): 72-84. |
[6] | 叶岳洋, 张兴兰. Fabric中的匿名身份认证技术研究[J]. 网络与信息安全学报, 2021, 7(3): 134-140. |
[7] | 肖甫, 黄海平, 胡素君, 孙力娟. 双一流视域下网络安全人才培养研究——以江苏省为例[J]. 网络与信息安全学报, 2021, 7(2): 1-9. |
[8] | 张成磊, 付玉龙, 李晖, 曹进. 6G网络安全场景分析及安全模型研究[J]. 网络与信息安全学报, 2021, 7(1): 28-45. |
[9] | 杨路辉,白惠文,刘光杰,戴跃伟. 基于可分离卷积的轻量级恶意域名检测模型[J]. 网络与信息安全学报, 2020, 6(6): 112-120. |
[10] | 张效林,谷大武,张驰. 移动平台典型应用的身份认证问题研究[J]. 网络与信息安全学报, 2020, 6(6): 137-151. |
[11] | 王昊,吴天昊,朱孔林,张琳. 交叉口场景下基于区块链技术的匿名车辆身份认证方案[J]. 网络与信息安全学报, 2020, 6(5): 27-35. |
[12] | 谢博,申国伟,郭春,周燕,于淼. 基于残差空洞卷积神经网络的网络安全实体识别方法[J]. 网络与信息安全学报, 2020, 6(5): 126-138. |
[13] | 张勖,马欣. 基于区块链的轻量化移动自组网认证方案[J]. 网络与信息安全学报, 2020, 6(4): 14-22. |
[14] | 钱思杰,陈立全,王诗卉. 基于改进PBFT算法的PKI跨域认证方案[J]. 网络与信息安全学报, 2020, 6(4): 37-44. |
[15] | 鲁迁迁,朱友文,蒋炎. 无须重注册的单向通信动态口令认证[J]. 网络与信息安全学报, 2020, 6(3): 99-107. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|