电信科学 ›› 2020, Vol. 36 ›› Issue (1): 11-20.doi: 10.11959/j.issn.1000-0801.2020011

所属专题: 物联网与6G

• 专题:5G组网与6G展望 • 上一篇    下一篇

6G内生安全:体系结构与关键技术

刘杨,彭木根   

  1. 北京邮电大学,北京 100876
  • 修回日期:2020-01-07 出版日期:2020-01-20 发布日期:2020-02-13
  • 作者简介:刘杨(1984- ),男,北京邮电大学网络技术研究院副教授、硕士生导师,主要研究方向为后5G内生安全等|彭木根(1978- ),男,IEEE Fellow,教育部“长江学者”特聘教授,国家杰出青年科学基金获得者,入选“万人计划”科技创新领军人才、科睿唯安2019年度 ESI 全球高被引科学家和2019年首都科技盛典十大科技人物,网络与交换技术国家重点实验室副主任,中国通信学会青年工作委员会主任,北京市科技人才研究会副理事长。长期从事移动通信智能组网理论及关键技术研究工作。累计发表IEEE 期刊论文100余篇,其中ESI高被引用论文累计19篇,谷歌学术引用近万次。获得IEEE通信学会海因里希·赫兹奖、IEEE通信学会亚太区杰出青年学者奖等。受邀担任 IEEE IoT-J、IEEE Com-munications Magazine等国际期刊指导委员会委员或编委等。以第一完成人身份获得国家技术发明奖二等奖(2018年)、北京市科学技术奖一等奖(2017年)、中国通信学会科学技术奖一等奖(2015年)、求是杰出青年成果转化奖(2018年)等

6G endogenous security:architecture and key technologies

Yang LIU,Mugen PENG   

  1. Beijing University of Posts and Telecommunications,Beijing 100876,China
  • Revised:2020-01-07 Online:2020-01-20 Published:2020-02-13

摘要:

传统移动通信系统在设计之初把安全作为一种独立的技术,依靠“补丁式”“外挂式”,实现无线通信的安全防护。第六代(6G)移动通信系统将基于软件定义切片平台,注重边缘计算,采用人工智能和大数据挖掘等适配不同的应用场景和性能目标,传统的外挂式网络安全机理难以确保6G自身对安全内嵌的需求。提出6G内生安全机理,阐述了6G内生安全的体系结构和关键技术,并且针对6G将采用的新技术中的安全威胁,给出了这些威胁的解决方案,探讨了6G内生安全的挑战和未来研究方向。

关键词: 6G, 内生安全, 体系结构, 关键技术

Abstract:

At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.

Key words: 6G, endogenous security, architecture, key technology

中图分类号: 

No Suggested Reading articles found!