电信科学 ›› 2020, Vol. 36 ›› Issue (1): 21-27.doi: 10.11959/j.issn.1000-0801.2020004

所属专题: 区块链 6G

• 专题:5G组网与6G展望 • 上一篇    下一篇

6G内生安全:区块链技术

聂凯君1,2,曹傧1,彭木根1   

  1. 1 北京邮电大学网络与交换技术国家重点实验室,北京 100876
    2 北京邮电大学信息与通信工程学院,北京 100876
  • 修回日期:2020-01-02 出版日期:2020-01-20 发布日期:2020-02-13
  • 作者简介:聂凯君(1996- ),男,北京邮电大学硕士生,主要研究方向为区块链技术|曹傧(1983- ),男,博士,北京邮电大学网络技术研究院副研究员,主要研究方向为区块链系统、物联网和移动边缘计算|彭木根(1978- ),男,IEEE Fellow,教育部“长江学者”特聘教授,国家杰出青年科学基金获得者,入选“万人计划”科技创新领军人才、科睿唯安2019年度ESI全球高被引科学家和2019年首都科技盛典十大科技人物,网络与交换技术国家重点实验室副主任,中国通信学会青年工作委员会主任,北京市科技人才研究会副理事长。长期从事移动通信智能组网理论及关键技术研究工作。累计发表IEEE期刊论文100余篇,其中ESI高被引用论文累计19篇,谷歌学术引用近万次。获得IEEE通信学会海因里希·赫兹奖、IEEE 通信学会亚太区杰出青年学者奖等。受邀担任IEEE IoT-J、IEEE Communications Magazine等国际期刊指导委员会委员或编委等。以第一完成人身份获得国家技术发明奖二等奖(2018年)、北京市科学技术奖一等奖(2017年)、中国通信学会科学技术奖一等奖(2015年)、求是杰出青年成果转化奖(2018年)等

6G endogenous security:blockchain technology

Kaijun NIE1,2,Bin CAO1,Mugen PENG1   

  1. 1 State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China
    2 School of Information and Communication Engineering,Beijing University of Posts and Telecommunications,Beijing 100876,China
  • Revised:2020-01-02 Online:2020-01-20 Published:2020-02-13

摘要:

随着移动通信技术逐渐朝着边缘化、分布式结构的发展,传统外挂式边界防护的网络安全保障方法将受到越来越多的挑战,现实中不断涌现的网络安全事故也表明,需要从信息化系统内不断生长出自适应、自主和自成长的安全能力,即内生安全。区块链作为一种去中心化的共享账本和数据库,具有去中心化、几乎不可篡改、全程留痕、可以追溯、集体维护、公开透明等特点,可以极大地满足内生安全设计需求。首先描述了内生安全的必要性和需求,然后介绍了作为内生安全重要实现手段的区块链技术,分析了区块链的主要研究进展和面临的困难与挑战,提出了未来的研究方向和机遇。

关键词: 分布式, 内生安全, 区块链

Abstract:

With the development of mobile communication technology towards marginalization and distributed structure,the traditional network security method of external border protection will be faced with more and more challenges.The emerging network security accidents also show that it is necessary to grow self-adaptive,independent and self-growing security capabilities from the information system,that is,endogenous security.Blockchain,as a de-centralized shared ledger and database,has the characteristics of decentralization,immutability,leaving traces throughout,traceability,collective maintenance,openness and transparency,etc.,which can greatly meet the needs of endogenous security design.Therefore,the necessity and demand of endogenous security was described,then the blockchain technology as an important means to realize endogenous security was introduced,the main research progress,difficulties and challenges faced by blockchain were analyzed,and the future research direction and oppor-tunities were put forward.

Key words: distributed, endogenous security, blockchain

中图分类号: 

No Suggested Reading articles found!