Telecommunications Science ›› 2022, Vol. 38 ›› Issue (10): 173-179.doi: 10.11959/j.issn.1000-0801.2022276

• Engineering and Application • Previous Articles     Next Articles

Research and application of 5G cloud-network-edge-end integrated in-depth security protection system

Guoxin ZHANG   

  1. Guangdong Branch of China Telecommunications Co., Ltd., Guangzhou 510081, China
  • Revised:2022-10-14 Online:2022-10-20 Published:2022-10-01

Abstract:

A 5G cloud-network-edge-end integrated in-depth security protection implementation scheme was innovatively proposed, the network security protection system of 5G customized network was explored, and the basic architecture, characteristics, implementation scheme and application effect of the system were introduced.In the implementation plan, two key points were emphasized.Firstly, by deploying the security system of the four aspects of the 5G cloud network, the edge and the end, the multi-level and multi-dimensional security protection capability was formed.Secondly, the operation process of the adaptation system, including one-key reinforcement, security defense, situational awareness and one-key emergency response was established.Finally, the practical application effect of the 5G cloud-network-edge-end integrated in-depth security protection system was given.

Key words: 5G, cloud-network-edge-end, integration, trusted terminal, end-to-end

CLC Number: 

No Suggested Reading articles found!