网络与信息安全学报 ›› 2021, Vol. 7 ›› Issue (1): 28-45.doi: 10.11959/j.issn.2096-109x.2021004
所属专题: 6G
张成磊, 付玉龙, 李晖, 曹进
修回日期:
2020-12-12
出版日期:
2021-02-15
发布日期:
2021-02-01
作者简介:
张成磊(1998- ),男,湖北武汉人,西安电子科技大学硕士生,主要研究方向为移动通信安全、LTE攻防。基金资助:
Chenglei ZHANG, Yulong FU, Hui LI, Jin CAO
Revised:
2020-12-12
Online:
2021-02-15
Published:
2021-02-01
Supported by:
摘要:
6G网络的概念已经被提出并引起了学术界的广泛关注。整体而言,6G网络将对5G网络的性能进行优化,并拓展 5G技术难以实现的业务场景。然而,这些新场景、新技术的引入势必带来新的安全隐患和威胁。首先,针对6G网络的关键技术、实现手段等展开研究,重点围绕国际上5G/6G的主要研究机构、公司和企业的研究进展进行详细调研。然后,汇总 6G 网络的愿景和核心技术,并在此基础上提出 6G 网络可能存在的安全问题和挑战。最后,根据现有的技术情况,总结针对这些安全问题的解决方案,并探讨面向6G网络的安全模型。
中图分类号:
张成磊, 付玉龙, 李晖, 曹进. 6G网络安全场景分析及安全模型研究[J]. 网络与信息安全学报, 2021, 7(1): 28-45.
Chenglei ZHANG, Yulong FU, Hui LI, Jin CAO. Research on security scenarios and security models for 6G networking[J]. Chinese Journal of Network and Information Security, 2021, 7(1): 28-45.
表1
6G关键性能技术指标研究进展现状Table 1 Current status of research on 6G key performance technical indicators"
参考文献 | 6G网络架构 | 潜在技术方法 | 主要贡献 |
[ | 大型自治 6G网络架构 | 太赫兹通信、SM-MIMO、大型智能反射面、全息波束成形、OAM多路复用、可见光通信、激光通信、基于区块链的频谱共享、量子通信、分子通信 | 提出6G愿景,讨论6G的指标和潜在技术 |
[ | 舒适、安全、智能的一体化网络架构 | 超高频段、深度学习、智能反射面 | 比较5G、B5G和6G的主要业务,从多方面分析潜在的技术方法 |
[ | 绿色 6G 网络架构 | 太赫兹通信、可见光通信、分子通信、量子通信、分布式安全区块链、柔性智能材料、能量收集与管理 | 提出绿色6G愿景的概念,讨论潜在关键技术 |
[ | 未讨论 | 未讨论 | 介绍6G的驱动力、新场景和指标等,并提出有待解决的问题和挑战,为研究者奠定研究方向 |
[ | 智能化网络架构 | 6G大数据分析、AI闭环优化、智能无线通信 | 从智能化的角度分析6G的愿景,介绍AI对6G的赋能 |
[ | 未讨论 | 微小蜂窝、集成频段收发器、大型智能反射面、边缘人工智能、地面-空中-卫星综合网络、能量转移与收集、第六感网络、极限网络、全息无线电和光电二极管耦合天线阵列、基于AI和光子学的认知无线电 | 介绍6G的愿景,讨论6G具有的新指标和潜在关键技术,并提出6G在发展中所面临的问题 |
[ | 未讨论 | 太赫兹通信、可见光通信、稀疏理论-压缩感知、全新信道编码、超大规模天线技术、灵活频谱技术、基于 AI 的无线通信技术、空天地海一体化通信、无线触觉网络 | 比较全面、清晰地概述了6G的愿景、使能以及潜在关键技术 |
表2
5G与6G应用场景与关键指标对比Table 2 Comparison of 5G and 6G application scenarios and key indicators"
移动通信系统 | 应用场景 | 应用 | 特点 | 最高速率 | 用户体验速率 | 时延 | 数据区域流量 | 设备密度 | 可支持移动性 |
5G | ● eMBB | ● VR/AR/全景视频 | 云化、软件化、虚拟化、切片 | 20 Gbit/s | 0.1 Gbit/s | 1 ms | 10 Mbit/(s.m2) | 106台/千米 2 | 500 km/h |
● URLLC | ● 超高清视频 | ||||||||
● mMTC | ● 车联网 | ||||||||
● 物联网 | |||||||||
● 智慧城市/工厂/家庭 | |||||||||
● 远程医疗 | |||||||||
● 可穿戴设备 | |||||||||
6G | ● FeMBB | ● 触觉互联网 | 智能化、云化、软件化、虚拟化、切片 | ≥1 Tbit/s | 1 Gbit/s | 10~100 μs | 1 Gbit/(s.m2) | 107台/千米 2 | ≥1 000 km/h |
● ERLLC | ● 全感官数字传输 | ||||||||
● umMTC | ● 全自动驾驶 | ||||||||
● LDHMC | ● 工业互联网 | ||||||||
● ELPC | ● 太空旅行、深海观光 | ||||||||
● 生物纳米物联网 |
[1] | ZHANG Z , XIAO Y , MA Z ,et al. 6G Wireless networks:vision,requirements,architecture,and key technologies[J]. IEEE Vehicular Technology Magazine, 2019,14(3): 28-41. |
[2] | GUI G , LIU M , TANG F ,et al. 6G:opening new horizons for integration of comfort,security and intelligence[J]. IEEE Wireless Communications, 2020: 1-7. |
[3] | HUANG T , YANG W , WU J ,et al. A survey on green 6G network:architecture and technologies[J]. IEEE Access, 2019,7: 175758-175768. |
[4] | LATVA-AHO M , LEPP?NEN K . Key drivers and research challenges for 6G ubiquitous wireless intelligence[M]. White Paper.University of Oulu. 2019. |
[5] | LETAIEF K B , CHEN W , SHI Y ,et al. The roadmap to 6G:AI empowered wireless networks[J]. IEEE Communications Magazine, 2019,57(8): 84-90. |
[6] | SAAD W , BENNIS M , CHEN M . A vision of 6G wireless systems:applications,trends,technologies,and open research problems[J]. IEEE Network, 2020,34(3): 134-142. |
[7] | VISWANATHAN H , MOGENSEN P E J I A . Communications in the 6G era[J]. IEEE Access, 2020,8: 57063-57074. |
[8] | YANG P , XIAO Y , XIAO M ,et al. 6G wireless communications:vision and potential techniques[J]. IEEE Network, 2019,33(4): 70-75. |
[9] | ZONG B , FAN C , WANG X ,et al. 6G technologies:key drivers,core requirements,system architectures,and enabling technologies[J]. IEEE Vehicular Technology Magazine, 2019,14(3): 18-27. |
[10] | 赵亚军, 郁光辉, 徐汉清 . 6G移动通信网络:愿景、挑战与关键技术[J]. 中国科学:信息科学, 2019,49(8): 963-987. |
ZHAO Y J , YU G H , XU H Q . 6G mobile communication networks:vision,challenges,and key technologies[J]. Sci Sin Inform, 2019,49(8): 963-987. | |
[11] | YAMPOLSKIY R V , SPELLCHECKER M J A P A . Artificial intelligence safety and cybersecurity:a timeline of AI failures[J]. arXiv Preprint arViv:1610.07997, 2016. |
[12] | PORAMBAGE P , KUMAR T , LIYANAGE M ,et al. Sec-Edge AI:AI for edge security VS security for edge AI[C]// The 1st 6G wireless summit. 2019. |
[13] | YLIANTTILA M , KANTOLA R , GURTOV A ,et al. 6G white paper:research challenges for trust,security and privacy[J]. arXiv Preprint arXiv:2004.11665, 2020. |
[14] | CHEN M , CHALLITA U , SAAD W ,et al. Artificial neural networks-based machine learning for wireless networks:a tutorial[J]. IEEE Communications Surveys & Tutorials, 2019,21(4): 3039-3071. |
[15] | NI J , LIN X , SHEN X S J I N . Toward edge-assisted Internet of things:from security and efficiency perspectives[J]. IEEE Network, 2019,33(2): 50-57. |
[16] | SODERI S , . Enhancing Security in 6G visible light communications[C]// 2020 2nd 6G Wireless Summit (6G SUMMIT), 2020: 1-5. |
[17] | ARAFA A , PANAYIRCI E , POOR H V J I T O C . Relay-aided secure broadcasting for visible light communications[J]. IEEE Transactions on Communications, 2019,67(6): 4227-4239. |
[18] | PANAYIRCI E , YESILKAYA A , COGALAN T ,et al. Physical-layer security with optical generalized space shift keying[J]. IEEE Transactions on Communications, 2020,68(5): 3042-3056. |
[19] | YIN L , HAAS H J I J O S A I C . Physical-layer security in multiuser visible light communication networks[J]. IEEE Journal on Selected Areas in Communication, 2017,36(1): 162-174. |
[20] | AHMAD I , SHAHABUDDIN S , KUMAR T ,et al. Security for 5G and beyond[J]. IEEE Communications Surveys & Tutorials, 2019,21(4): 3682-3722. |
[21] | BERNSTEIN D J , LANGE T J N . Post-quantum cryptography[J]. Nature, 2017,549(7671): 188-194. |
[22] | GYONGYOSI L , IMRE S J C S R . A survey on quantum computing technology[J]. Computer Science Review, 2019,31: 51-71. |
[23] | AMAN M N , TANEJA S , SIKDAR B ,et al. Token-based security for the Internet of things with dynamic energy-quality tradeoff[J]. IEEE Internet of Things Journal, 2018,6(2): 2843-2859. |
[24] | AMAN M N , BASHEER M H , SIKDAR B J I I O T J . Data provenance for IoT with light weight authentication and privacy preservation[J]. IEEE Internet of Things Journal, 2019,6(6): 10441-10457. |
[25] | MAO B , KAWAMOTO Y , KATO N . AI-based joint optimization of QoS and security for 6G energy harvesting internet of things[J]. IEEE Internet of Things Journal, 2020,7(8): 7032-7042. |
[26] | ZYSKIND G , NATHAN O . Decentralizing privacy:using blockchain to protect personal data[C]// 2015 IEEE Security and Privacy Workshops. 2015: 180-184. |
[27] | WANG Q , CHEN D , ZHANG N ,et al. PCP:a privacy-preserving content-based publish-subscribe scheme with differential privacy in fog computing[J]. IEEE Access, 2017,5: 17962-17974. |
[28] | MC-MAHAN B , MOORE E , RAMAGE D ,et al. Communication-efficient learning of deep networks from decentralized data[C]// Artificial Intelligence and Statistics, 2017: 1273-1282. |
[29] | YANG K , JIANG T , SHI Y ,et al. Federated learning via over-the-air computation[J]. IEEE Transactions on Wireless Communications, 2020,19(3): 2022-2035. |
[30] | CHEN M , YANG Z , SAAD W ,et al. A joint learning and communications framework for federated learning over wireless networks[J]. IEEE Transactions on Wireless Communications, 2019. |
[31] | SAMARAKOON S , BENNIS M , SAAD W ,et al. Distributed federated learning for ultra-reliable low-latency vehicular communications[J]. IEEE Transactions on Communications, 2019,68(2): 1146-1159. |
[32] | HUSáK M , KOMáRKOVá J , BOU-HARB E ,et al. Survey of attack projection,prediction,and forecasting in cyber security[J]. IEEE Communications Surveys & Tutorials, 2018,21(1): 640-660. |
[33] | HENGSTLER M , ENKEL E , DUELLI S J T F ,et al. Applied artificial intelligence and trust—the case of autonomous vehicles and medical assistance devices[J]. Technological Forecasting and Social Change, 2016,105: 105-120. |
[34] | PHAN T V , PARK M J I A . Efficient distributed denial-of-service attack defense in SDN-based cloud[J]. IEEE Access, 2019,7: 18701-18714. |
[35] | GRZONKA D , JAKOBIK A , KO?ODZIEJ J ,et al. Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security[J]. Future Generation Computer Systems, 2018,86: 1106-1117. |
[36] | TANG F , KAWAMOTO Y , KATO N ,et al. Future intelligent and secure vehicular network toward 6G:machine-learning approaches[J]. Proceedings of the IEEE, 2020,108(2): 292-307. |
[37] | SHARMA P , LIU H , WANG H ,et al. Securing wireless communications of connected vehicles with artificial intelligence[C]// 2017 IEEE International Symposium on Technologies for Homeland Security (HST), 2017: 1-7. |
[1] | 王贺立, 闫巧. 基于交易记录特征的自私挖矿检测方案[J]. 网络与信息安全学报, 2023, 9(2): 104-114. |
[2] | 陈训逊, 李明哲, 吕宁, 黄亮. 内禀安全:网络安全能力体系化构建方法[J]. 网络与信息安全学报, 2023, 9(1): 92-102. |
[3] | 李东, 郝艳妮, 彭升辉, 訾瑞杰, 刘西蒙. 国家自然科学基金委员会网络安全现状与展望[J]. 网络与信息安全学报, 2022, 8(6): 92-101. |
[4] | 邢福康, 张铮, 隋然, 曲晟, 季新生. 面向进程多变体软件系统的攻击面定性建模分析[J]. 网络与信息安全学报, 2022, 8(5): 121-128. |
[5] | 王泽南, 李佳浩, 檀朝红, 皮德常. 面向网络安全资源池的智能服务链系统设计与分析[J]. 网络与信息安全学报, 2022, 8(4): 175-181. |
[6] | 王馨雅, 华光, 江昊, 张海剑. 深度学习模型的版权保护研究综述[J]. 网络与信息安全学报, 2022, 8(2): 1-14. |
[7] | 王洋, 汤光明, 王硕, 楚江. 基于API调用管理的SDN应用层DDoS攻击防御机制[J]. 网络与信息安全学报, 2022, 8(2): 73-87. |
[8] | 邱洁, 韩瑞, 魏志丰, 王志洋. 网络空间公共基础设施体系及安全策略研究[J]. 网络与信息安全学报, 2021, 7(6): 56-67. |
[9] | 王硕, 柏军, 王佰玲, 张旭, 刘红日. 基于时间压缩的流量加速回放方法[J]. 网络与信息安全学报, 2021, 7(5): 178-188. |
[10] | 赵昊, 舒辉, 康绯, 邢颖. 基于智能合约的高对抗性僵尸网络研究[J]. 网络与信息安全学报, 2021, 7(4): 30-41. |
[11] | 王涛, 陈鸿昶. 考虑拜占庭属性的SDN安全控制器多目标优化部署方案[J]. 网络与信息安全学报, 2021, 7(3): 72-84. |
[12] | 杨路辉,白惠文,刘光杰,戴跃伟. 基于可分离卷积的轻量级恶意域名检测模型[J]. 网络与信息安全学报, 2020, 6(6): 112-120. |
[13] | 谢博,申国伟,郭春,周燕,于淼. 基于残差空洞卷积神经网络的网络安全实体识别方法[J]. 网络与信息安全学报, 2020, 6(5): 126-138. |
[14] | 张孟媛,袁钟怡. 美国网络安全审查制度发展、特点及启示[J]. 网络与信息安全学报, 2019, 5(6): 1-9. |
[15] | 贾春福,李瑞琪,田美琦,程晓阳. 信息安全与法学复合型人才培养模式[J]. 网络与信息安全学报, 2019, 5(3): 31-35. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|