Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (1): 28-45.doi: 10.11959/j.issn.2096-109x.2021004
Special Issue: 6G
• Topic Ⅰ: Security Architecture Applications of Novel Network • Previous Articles Next Articles
Chenglei ZHANG, Yulong FU, Hui LI, Jin CAO
Revised:
2020-12-12
Online:
2021-02-15
Published:
2021-02-01
Supported by:
CLC Number:
Chenglei ZHANG, Yulong FU, Hui LI, Jin CAO. Research on security scenarios and security models for 6G networking[J]. Chinese Journal of Network and Information Security, 2021, 7(1): 28-45.
"
参考文献 | 6G网络架构 | 潜在技术方法 | 主要贡献 |
[ | 大型自治 6G网络架构 | 太赫兹通信、SM-MIMO、大型智能反射面、全息波束成形、OAM多路复用、可见光通信、激光通信、基于区块链的频谱共享、量子通信、分子通信 | 提出6G愿景,讨论6G的指标和潜在技术 |
[ | 舒适、安全、智能的一体化网络架构 | 超高频段、深度学习、智能反射面 | 比较5G、B5G和6G的主要业务,从多方面分析潜在的技术方法 |
[ | 绿色 6G 网络架构 | 太赫兹通信、可见光通信、分子通信、量子通信、分布式安全区块链、柔性智能材料、能量收集与管理 | 提出绿色6G愿景的概念,讨论潜在关键技术 |
[ | 未讨论 | 未讨论 | 介绍6G的驱动力、新场景和指标等,并提出有待解决的问题和挑战,为研究者奠定研究方向 |
[ | 智能化网络架构 | 6G大数据分析、AI闭环优化、智能无线通信 | 从智能化的角度分析6G的愿景,介绍AI对6G的赋能 |
[ | 未讨论 | 微小蜂窝、集成频段收发器、大型智能反射面、边缘人工智能、地面-空中-卫星综合网络、能量转移与收集、第六感网络、极限网络、全息无线电和光电二极管耦合天线阵列、基于AI和光子学的认知无线电 | 介绍6G的愿景,讨论6G具有的新指标和潜在关键技术,并提出6G在发展中所面临的问题 |
[ | 未讨论 | 太赫兹通信、可见光通信、稀疏理论-压缩感知、全新信道编码、超大规模天线技术、灵活频谱技术、基于 AI 的无线通信技术、空天地海一体化通信、无线触觉网络 | 比较全面、清晰地概述了6G的愿景、使能以及潜在关键技术 |
"
移动通信系统 | 应用场景 | 应用 | 特点 | 最高速率 | 用户体验速率 | 时延 | 数据区域流量 | 设备密度 | 可支持移动性 |
5G | ● eMBB | ● VR/AR/全景视频 | 云化、软件化、虚拟化、切片 | 20 Gbit/s | 0.1 Gbit/s | 1 ms | 10 Mbit/(s.m2) | 106台/千米 2 | 500 km/h |
● URLLC | ● 超高清视频 | ||||||||
● mMTC | ● 车联网 | ||||||||
● 物联网 | |||||||||
● 智慧城市/工厂/家庭 | |||||||||
● 远程医疗 | |||||||||
● 可穿戴设备 | |||||||||
6G | ● FeMBB | ● 触觉互联网 | 智能化、云化、软件化、虚拟化、切片 | ≥1 Tbit/s | 1 Gbit/s | 10~100 μs | 1 Gbit/(s.m2) | 107台/千米 2 | ≥1 000 km/h |
● ERLLC | ● 全感官数字传输 | ||||||||
● umMTC | ● 全自动驾驶 | ||||||||
● LDHMC | ● 工业互联网 | ||||||||
● ELPC | ● 太空旅行、深海观光 | ||||||||
● 生物纳米物联网 |
[1] | ZHANG Z , XIAO Y , MA Z ,et al. 6G Wireless networks:vision,requirements,architecture,and key technologies[J]. IEEE Vehicular Technology Magazine, 2019,14(3): 28-41. |
[2] | GUI G , LIU M , TANG F ,et al. 6G:opening new horizons for integration of comfort,security and intelligence[J]. IEEE Wireless Communications, 2020: 1-7. |
[3] | HUANG T , YANG W , WU J ,et al. A survey on green 6G network:architecture and technologies[J]. IEEE Access, 2019,7: 175758-175768. |
[4] | LATVA-AHO M , LEPP?NEN K . Key drivers and research challenges for 6G ubiquitous wireless intelligence[M]. White Paper.University of Oulu. 2019. |
[5] | LETAIEF K B , CHEN W , SHI Y ,et al. The roadmap to 6G:AI empowered wireless networks[J]. IEEE Communications Magazine, 2019,57(8): 84-90. |
[6] | SAAD W , BENNIS M , CHEN M . A vision of 6G wireless systems:applications,trends,technologies,and open research problems[J]. IEEE Network, 2020,34(3): 134-142. |
[7] | VISWANATHAN H , MOGENSEN P E J I A . Communications in the 6G era[J]. IEEE Access, 2020,8: 57063-57074. |
[8] | YANG P , XIAO Y , XIAO M ,et al. 6G wireless communications:vision and potential techniques[J]. IEEE Network, 2019,33(4): 70-75. |
[9] | ZONG B , FAN C , WANG X ,et al. 6G technologies:key drivers,core requirements,system architectures,and enabling technologies[J]. IEEE Vehicular Technology Magazine, 2019,14(3): 18-27. |
[10] | 赵亚军, 郁光辉, 徐汉清 . 6G移动通信网络:愿景、挑战与关键技术[J]. 中国科学:信息科学, 2019,49(8): 963-987. |
ZHAO Y J , YU G H , XU H Q . 6G mobile communication networks:vision,challenges,and key technologies[J]. Sci Sin Inform, 2019,49(8): 963-987. | |
[11] | YAMPOLSKIY R V , SPELLCHECKER M J A P A . Artificial intelligence safety and cybersecurity:a timeline of AI failures[J]. arXiv Preprint arViv:1610.07997, 2016. |
[12] | PORAMBAGE P , KUMAR T , LIYANAGE M ,et al. Sec-Edge AI:AI for edge security VS security for edge AI[C]// The 1st 6G wireless summit. 2019. |
[13] | YLIANTTILA M , KANTOLA R , GURTOV A ,et al. 6G white paper:research challenges for trust,security and privacy[J]. arXiv Preprint arXiv:2004.11665, 2020. |
[14] | CHEN M , CHALLITA U , SAAD W ,et al. Artificial neural networks-based machine learning for wireless networks:a tutorial[J]. IEEE Communications Surveys & Tutorials, 2019,21(4): 3039-3071. |
[15] | NI J , LIN X , SHEN X S J I N . Toward edge-assisted Internet of things:from security and efficiency perspectives[J]. IEEE Network, 2019,33(2): 50-57. |
[16] | SODERI S , . Enhancing Security in 6G visible light communications[C]// 2020 2nd 6G Wireless Summit (6G SUMMIT), 2020: 1-5. |
[17] | ARAFA A , PANAYIRCI E , POOR H V J I T O C . Relay-aided secure broadcasting for visible light communications[J]. IEEE Transactions on Communications, 2019,67(6): 4227-4239. |
[18] | PANAYIRCI E , YESILKAYA A , COGALAN T ,et al. Physical-layer security with optical generalized space shift keying[J]. IEEE Transactions on Communications, 2020,68(5): 3042-3056. |
[19] | YIN L , HAAS H J I J O S A I C . Physical-layer security in multiuser visible light communication networks[J]. IEEE Journal on Selected Areas in Communication, 2017,36(1): 162-174. |
[20] | AHMAD I , SHAHABUDDIN S , KUMAR T ,et al. Security for 5G and beyond[J]. IEEE Communications Surveys & Tutorials, 2019,21(4): 3682-3722. |
[21] | BERNSTEIN D J , LANGE T J N . Post-quantum cryptography[J]. Nature, 2017,549(7671): 188-194. |
[22] | GYONGYOSI L , IMRE S J C S R . A survey on quantum computing technology[J]. Computer Science Review, 2019,31: 51-71. |
[23] | AMAN M N , TANEJA S , SIKDAR B ,et al. Token-based security for the Internet of things with dynamic energy-quality tradeoff[J]. IEEE Internet of Things Journal, 2018,6(2): 2843-2859. |
[24] | AMAN M N , BASHEER M H , SIKDAR B J I I O T J . Data provenance for IoT with light weight authentication and privacy preservation[J]. IEEE Internet of Things Journal, 2019,6(6): 10441-10457. |
[25] | MAO B , KAWAMOTO Y , KATO N . AI-based joint optimization of QoS and security for 6G energy harvesting internet of things[J]. IEEE Internet of Things Journal, 2020,7(8): 7032-7042. |
[26] | ZYSKIND G , NATHAN O . Decentralizing privacy:using blockchain to protect personal data[C]// 2015 IEEE Security and Privacy Workshops. 2015: 180-184. |
[27] | WANG Q , CHEN D , ZHANG N ,et al. PCP:a privacy-preserving content-based publish-subscribe scheme with differential privacy in fog computing[J]. IEEE Access, 2017,5: 17962-17974. |
[28] | MC-MAHAN B , MOORE E , RAMAGE D ,et al. Communication-efficient learning of deep networks from decentralized data[C]// Artificial Intelligence and Statistics, 2017: 1273-1282. |
[29] | YANG K , JIANG T , SHI Y ,et al. Federated learning via over-the-air computation[J]. IEEE Transactions on Wireless Communications, 2020,19(3): 2022-2035. |
[30] | CHEN M , YANG Z , SAAD W ,et al. A joint learning and communications framework for federated learning over wireless networks[J]. IEEE Transactions on Wireless Communications, 2019. |
[31] | SAMARAKOON S , BENNIS M , SAAD W ,et al. Distributed federated learning for ultra-reliable low-latency vehicular communications[J]. IEEE Transactions on Communications, 2019,68(2): 1146-1159. |
[32] | HUSáK M , KOMáRKOVá J , BOU-HARB E ,et al. Survey of attack projection,prediction,and forecasting in cyber security[J]. IEEE Communications Surveys & Tutorials, 2018,21(1): 640-660. |
[33] | HENGSTLER M , ENKEL E , DUELLI S J T F ,et al. Applied artificial intelligence and trust—the case of autonomous vehicles and medical assistance devices[J]. Technological Forecasting and Social Change, 2016,105: 105-120. |
[34] | PHAN T V , PARK M J I A . Efficient distributed denial-of-service attack defense in SDN-based cloud[J]. IEEE Access, 2019,7: 18701-18714. |
[35] | GRZONKA D , JAKOBIK A , KO?ODZIEJ J ,et al. Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security[J]. Future Generation Computer Systems, 2018,86: 1106-1117. |
[36] | TANG F , KAWAMOTO Y , KATO N ,et al. Future intelligent and secure vehicular network toward 6G:machine-learning approaches[J]. Proceedings of the IEEE, 2020,108(2): 292-307. |
[37] | SHARMA P , LIU H , WANG H ,et al. Securing wireless communications of connected vehicles with artificial intelligence[C]// 2017 IEEE International Symposium on Technologies for Homeland Security (HST), 2017: 1-7. |
[1] | Heli WANG, Qiao YAN. Selfish mining detection scheme based on the characters of transactions [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114. |
[2] | Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU. Network security of the National Natural Science Foundation of China: today and prospects [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 92-101. |
[3] | Fukang XING, Zheng ZHANG, Ran SUI, Sheng QU, Xinsheng JI. Qualitative modeling and analysis of attack surface for process multi-variant execution software system [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 121-128. |
[4] | Zenan WANG, Jiahao LI, Chaohong TAN, Dechang PI. Design and analysis of intelligent service chain system for network security resource pool [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 175-181. |
[5] | Xinya WANG, Guang HUA, Hao JIANG, Haijian ZHANG. Survey on intellectual property protection for deep learning model [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 1-14. |
[6] | Yang WANG, Guangming TANG, Shuo WANG, Jiang CHU. Defense mechanism of SDN application layer against DDoS attack based on API call management [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 73-87. |
[7] | Tao WANG, Hongchang CHEN. Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 72-84. |
[8] | QIN Yuhai,LIU Luyuan,GAO Haohang,LIU Shengqiao,DONG Han. Innovative professional skills competition to create a police practice talents [J]. Chinese Journal of Network and Information Security, 2019, 5(3): 75-80. |
[9] | Hao HU, Yuling LIU, Yuchen ZHANG, Hongqi ZHANG. Survey of attack graph based network security metric [J]. Chinese Journal of Network and Information Security, 2018, 4(9): 1-16. |
[10] | Juntai HU,Zhenyu WU,Xiao FU,Yichao WANG. Game model based security strategy of heterogeneous controllers in the cloud [J]. Chinese Journal of Network and Information Security, 2018, 4(9): 52-59. |
[11] | Binghao YAN,Guodong HAN. Combinatorial intrusion detection model based on deep recurrent neural network and improved SMOTE algorithm [J]. Chinese Journal of Network and Information Security, 2018, 4(7): 48-59. |
[12] | Wenyan LIU,Shumin HUO,Qing TONG,Miao ZHANG,Chao QI. Research on models of network security evaluation and analysis [J]. Chinese Journal of Network and Information Security, 2018, 4(4): 1-11. |
[13] | Haocheng ZHANG,Xiaojie WU,Xiang TANG,Runxuan SHU,Tianchen DING,Xiaoju DONG. System detecting network anomaly with visualization techniques [J]. Chinese Journal of Network and Information Security, 2018, 4(2): 40-54. |
[14] | Jialin WANG, Jiqiang LIU, Di ZHAO, Yingdi WANG, Yingxiao XIANG, Tong CHEN, Endong TONG, Wenjia NIU. Intrusion detection model based on non-symmetric convolution auto-encode and support vector machine [J]. Chinese Journal of Network and Information Security, 2018, 4(11): 57-68. |
[15] | Yuquan JIN, Bin XIE, Yi ZHU. Method of botnet network nodes detection base on communication similarity [J]. Chinese Journal of Network and Information Security, 2018, 4(10): 31-38. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|