通信学报 ›› 2022, Vol. 43 ›› Issue (9): 70-79.doi: 10.11959/j.issn.1000-436x.2022176

• 学术论文 • 上一篇    下一篇

移动通信网的内生安全共性问题及破解之道

刘彩霞1,2, 季新生1, 邬江兴1   

  1. 1 国家数字交换系统工程技术研究中心,河南 郑州 450002
    2 军事科学院系统工程研究院,北京 100091
  • 修回日期:2022-08-19 出版日期:2022-09-25 发布日期:2022-09-01
  • 作者简介:刘彩霞(1974- ),女,山东烟台人,国家数字交换系统工程技术研究中心研究员、博士生导师,主要研究方向为移动通信网络新技术、网络与信息安全
    季新生(1968- ),男,河南驻马店人,国家数字交换系统工程技术研究中心教授、博士生导师,主要研究方向为移动通信网络新技术、网络与信息安全
    邬江兴(1953- ),男,安徽金寨人,中国工程院院士,国家数字交换系统工程技术研究中心教授,主要研究方向为网络新技术、网络空间内生安全
  • 基金资助:
    国家自然科学基金创新群体基金资助项目(61521003)

Endogenous security common problems and solutions of the mobile communication networks

Caixia LIU1,2, Xinsheng JI1, Jiangxing WU1   

  1. 1 National Digital Switching System Engineering & Technological R&D Center, Zhengzhou 450002, China
    2 Academy of Military Sciences, Institute of System Engineering, Beijing 100091, China
  • Revised:2022-08-19 Online:2022-09-25 Published:2022-09-01
  • Supported by:
    The National Natural Science Foundation Innovation Group Project(61521003)

摘要:

基于对移动通信本质特征及移动通信网固有特性的认识,从一个全新的视角剖析了移动通信网固有机制尤其是移动性管理机制存在的基因缺陷,这些基因缺陷不会随着移动通信网的代际发展而消失,因而,又被称为移动通信网的内生安全缺陷或者内生安全共性问题。给出了“信息真实性默认”“数据泛在可见”等安全缺陷可能引入的内生安全威胁,并在网络空间内生安全理论的指导下,提出用“零信任”打破“默认的信任”、以“变隐映射”实现用户数据的“限定可见”等化解移动通信网内生安全共性问题的思路和方法。

关键词: 移动通信网, 5G, 内生安全问题, 内生安全构造, 变隐映射

Abstract:

Based on the understanding of the mobile communication essential characteristics and the mobile communication network inherent characteristics, from a new perspective, the genetic defects existing in the mobile communication network inherent mechanism, especially in the mobility management mechanism were analyzed.These genetic defects would not disappear with the intergenerational development of mobile communication network, therefore, they were also known as endogenous security defects or endogenous security common problems of mobile communication networks.The endogenous security threats that may be introduced by security defects such as “acquiescence in information authenticity” and “ubiquitous data visibility” were pointed out.Under the guidance of the cyberspace endogenous security theory, the ideas and methods to solve the endogenous security common problems in mobile communication networks were proposed, such as breaking the “default trust” with “zero trust” and realizing the “user data limited visibility” with“variable implicit mapping”.

Key words: mobile communication network, 5G, endogenous security problem, endogenous security structure, variable implicit mapping

中图分类号: 

No Suggested Reading articles found!