物联网学报 ›› 2020, Vol. 4 ›› Issue (1): 131-138.doi: 10.11959/j.issn.2096-3750.2020.00159
所属专题: 6G
• 专题:物联网与6G • 上一篇
修回日期:
2020-03-08
出版日期:
2020-03-30
发布日期:
2020-03-28
作者简介:
夏仕达(1993- ),男,北京邮电大学博士生,主要研究方向为基于物理层安全的终端身份安全接入和异常用户检测。|徐瑨(1981- ),女,博士,北京邮电大学副教授,主要研究方向为宽带移动通信、无线网络安全等。|陶小峰(1970- ),男,博士,北京邮电大学教授、博士生导师,主要研究方向为无线通信、移动通信安全等。
基金资助:
Shida XIA,Jin XU,Xiaofeng TAO()
Revised:
2020-03-08
Online:
2020-03-30
Published:
2020-03-28
Supported by:
摘要:
智能终端将极大地拓展6G的应用,也使6G面临更大的安全威胁,实现可靠的终端身份鉴别是保证6G网络安全的前提。针对 6G 网络架构与终端特点,归纳了身份鉴别技术在面向 6G 智能终端时的挑战与需求;进一步分析了面向 6G 智能终端身份鉴别的发展趋势;最后,探索了物理层认证在 6G 网络智能终端身份鉴别中的可能实现机制。
中图分类号:
夏仕达,徐瑨,陶小峰. 面向6G智能终端身份鉴别技术[J]. 物联网学报, 2020, 4(1): 131-138.
Shida XIA,Jin XU,Xiaofeng TAO. Intelligent terminal identification technology toward 6G[J]. Chinese Journal on Internet of Things, 2020, 4(1): 131-138.
[1] | ZHANG Z , XIAO Y , MA Z ,et al. 6G wireless networks:vision,requirements,architecture,and key technologies[J]. IEEE Vehicular Technology Magazine, 2019,14(3): 28-41. |
[2] | STRINATI E C , BARBAROSSA S , GONZALEZ-JIMENEZ J L ,et al. 6G:the next frontier from holographic messaging to artificial intelligence using sub terahertz and visible light communication[J]. IEEE Vehicular Technology Magazine, 2019,14(3): 42-50. |
[3] | LETAIEF K B , CHEN W , SHI Y ,et al. The roadmap to 6G:AI empowered wireless networks[J]. IEEE Communications Magazine, 2019,57(8): 84-90. |
[4] | YANG P , XIAO Y , XIAO M ,et al. 6G wireless communications:vision and potential techniques[J]. IEEE Network, 2019,33(4): 70-75. |
[5] | ZONG B , FAN C , WANG X ,et al. 6G technologies:key drivers,core requirements,system architectures,and enabling technologies[J]. IEEE Vehicular Technology Magazine, 2019,14(3): 18-27. |
[6] | CHEN C M , XIANG B , LIU Y ,et al. A secure authentication protocol for Internet of vehicles[J]. IEEE Access, 2019,7: 12047-12057. |
[7] | NARMADHA R . Heterogeneous network security management[J]. International Journal of Intelligent Enterprise, 2019,6(1): 32-52. |
[8] | DENNING D E . Is quantum computing a cybersecurity threat?[J]. American Scientist, 2019,107(2): 83-85. |
[9] | CHENG X , ZHANG Z , CHEN F ,et al. Secure identity authentication of community medical Internet of things[J]. IEEE Access, 2019,7: 115966-115977. |
[10] | ZHOU L , LI X , YEH K H ,et al. Lightweight IoT-based authentication scheme in cloud computing circumstance[J]. Future Generation Computer Systems, 2019,91: 244-251. |
[11] | CHEN Y , SHEN Q , SUN P ,et al. Reliable migration module in trusted cloud based on security level-design and implementation[C]// 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PHD Forum. IEEE, 2012: 2230-2236. |
[12] | LI X , HAN Y , GAO J ,et al. Secure hierarchical authentication protocol in VANET[J]. IET Information Security, 2019,14(1): 99-110. |
[13] | 牛静媛 . 移动通信系统安全性分析[D]. 北京:北京邮电大学, 2008. |
NIU J Y . Analysis of the security mechanism in mobile communication system[D]. Beijing:Beijing University of Posts and Telecommunications, 2008. | |
[14] | 张磊 . GSM/UMTS 混合网络安全若干关键技术研究[D]. 北京:北京邮电大学, 2011. |
ZHANG L . Key technology research on GSM/UMTS hybrid network security[D]. Beijing:Beijing University of Posts and Telecommunications, 2011. | |
[15] | CHANG C C , LEE J S , CHANG Y F . Efficient authentication protocols of GSM[J]. Computer Communications, 2005,28(8): 921-928. |
[16] | NTANTOGIAN C , XENAKIS C . One-pass EAP-AKA authentication in 3G-WLAN integrated networks[J]. Wireless personal communications, 2009,48(4): 569-584. |
[17] | MUN H , HAN K , KIM K . 3G-WLAN interworking:security analysis and new authentication and key agreement based on EAP-AKA[C]// 2009 Wireless Telecommunications Symposium. IEEE, 2009: 1-8. |
[18] | 向东南, 毛文俊 . LTE系统EPS-AKA过程安全性研究与改进[J]. 无线电通信技术, 2016,42(5): 60-63. |
XIANG D N , MAO W J . Research and improvement of LTE EPS-AKA procedure security[J]. Radio Communication Technology, 2016,42(5): 60-63. | |
[19] | FERRAG M A , MAGLARAS L , ARGYRIOU A ,et al. Security for 4G and 5G cellular networks:a survey of existing authentication and privacy-preserving schemes[J]. Journal of Network and Computer Applications, 2018,101: 55-82. |
[20] | 胡鑫鑫, 刘彩霞, 刘树新 ,等. 移动通信网鉴权认证综述[J]. 网络与信息安全学报, 2018,4(12): 5-19. |
HU X X , LIU C X , LIU S X ,et al. Overview of mobile communication network authentication[J]. Chinese Journal of Network and Information Security, 2018,4(12): 5-19. | |
[21] | PRASAD A R , ARUMUGAM S , SHEEBA B ,et al. 3GPP 5G security[J]. Journal of ICT Standardization, 2018,6(1): 137-158. |
[22] | BASIN D , DREIER J , HIRSCHI L ,et al. A formal analysis of 5G authentication[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2018: 1383-1396. |
[23] | 黄开枝, 金梁, 钟州 . 5G物理层安全技术——以通信促安全[J]. 中兴通讯技术, 2019,25(4): 43-49. |
HUANG K Z , JIN L , ZHONG Z . 5G physical layer security technology:enhancing security by communication[J]. ZTE Technology Journal, 2019,25(4): 43-49. | |
[24] | PAUL L Y , BARAS J S , SADLER B M . Physical-layer authentication[J]. IEEE Transactions on Information Forensics and Security, 2008,3(1): 38-51. |
[25] | WANG X , HAO P , HANZO L . Physical-layer authentication for wireless security enhancement:current challenges and future developments[J]. IEEE Communications Magazine, 2016,54(6): 152-158. |
[26] | 杨惠杰, 周天祺, 桂梓原 . 区块链技术在物联网中的身份认证研究[J]. 中兴通讯技术, 2018,24(6): 39-44. |
YANG H J , ZHOU T Q , GUI Z Y . Blockchain technology for identityauthentication in Internet of things[J]. ZTE Technology Journal, 2018,24(6): 39-44. | |
[27] | HAMMI M T , HAMMI B , BELLOT P ,et al. Bubbles of trust:a decentralized blockchain-based authentication system for IoT[J]. Computers & Security, 2018,78: 126-142. |
[28] | LIN C , HE D , HUANG X ,et al. BSeIn:a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0[J]. Journal of Network and Computer Applications, 2018,116: 42-52. |
[29] | ZENG K . Physical layer key generation in wireless networks:challenges and opportunities[J]. IEEE Communications Magazine, 2015,53(6): 33-39. |
[30] | ZHANG J , RAJENDRAN S , SUN Z ,et al. Physical layer security for the Internet of things:authentication and key generation[J]. IEEE Wireless Communications, 2019,26(5): 92-98. |
[31] | ZENG K , GOVINDAN K , MOHAPATRA P . Non-cryptographic authentication and identification in wireless networks[security and privacy in emerging wireless networks][J]. IEEE Wireless Communications, 2010,17(5): 56-62. |
[32] | GAO N , NI Q , FENG D ,et al. Physical layer authentication under intelligent spoofing in wireless sensor networks[J]. Signal Processing, 2020,166:107272. |
[33] | ZHAO C , HUANG M , HUANG L ,et al. A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks[J]. Computer networks, 2017,128: 164-171. |
[34] | WANG N , JIANG T , LYU S ,et al. Physical-layer authentication based on extreme learning machine[J]. IEEE Communications Letters, 2017,21(7): 1557-1560. |
[35] | LIAO R F , WEN H , WU J ,et al. Deep-learning-based physical layer authentication for industrial wireless sensor networks[J]. Sensors, 2019,19(11):2440. |
[36] | BALDINI G , GIULIANI R , DIMC F . Physical layer authentication of Internet of things wireless devices using convolutional neural networks and recurrence plots[J]. Internet Technology Letters, 2019,2(2):e81. |
[37] | XIAO L , LI Y , HAN G ,et al. PHY-layer spoofing detection with reinforcement learning in wireless networks[J]. IEEE Transactions on Vehicular Technology, 2016,65(12): 10037-10047. |
[38] | XIAO L , WAN X , HAN Z . PHY-layer authentication with multiple landmarks with reduced overhead[J]. IEEE Transactions on Wireless Communications, 2017,17(3): 1676-1687. |
[39] | QIU X , JIANG T , WU S ,et al. Physical layer authentication enhancement using a Gaussian mixture model[J]. IEEE Access, 2018,6: 53583-53592. |
[40] | FANG H , WANG X , HANZO L . Learning-aided physical layer authentication as an intelligent process[J]. IEEE Transactions on Communications, 2018,67(3): 2260-2273. |
[41] | YANG J , CHEN Y , TRAPPE W ,et al. Detection and localization of multiple spoofing attackers in wireless networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,24(1): 44-58. |
[42] | XIA S , LI N , TAO X F ,et al. Multiple attributes based spoofing detection using an improved clustering algorithm in mobile edge network[C]// 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN). IEEE, 2018: 242-243. |
[43] | CHEN Y , WEN H , WU J ,et al. Clustering based physical-layer authentication in edge computing systems with asymmetric resources[J]. Sensors, 2019,19(8):1926. |
[44] | LIU J , WANG X . Physical layer authentication enhancement using two-dimensional channel quantization[J]. IEEE Transactions on Wireless Communications, 2016,15(6): 4171-4182. |
[45] | FANG H , WANG X , HANZO L . Adaptive trust management for soft authentication and progressive authorization relying on physical layer attributes[J]. IEEE Transactions on Communications, 2020 |
[46] | XIAO L , YAN Q , LOU W ,et al. Proximity-based security techniques for mobile users in wireless networks[J]. IEEE Transactions on Information Forensics and Security, 2013,8(12): 2089-2100. |
[1] | 耿光磊, 高博, 熊轲, 樊平毅, 陆杨, 王煜炜. 联邦学习赋能6G网络综述[J]. 物联网学报, 2023, 7(2): 50-66. |
[2] | 李庆洋, 李雪婷, 朱晓荣. 6G多回程链路选择与功率分配联合优化方法[J]. 物联网学报, 2023, 7(2): 67-75. |
[3] | 严学强, 程冠杰, 邓水光, 吴建军, 陆璐, 赵明宇, 习燕, 刘超, 李唯源, 丰雷, 张童. 6G移动通信网络数据服务与数据面[J]. 物联网学报, 2023, 7(1): 60-72. |
[4] | 栾宁, 熊轲, 张煜, 何睿斯, 屈钢, 艾渤. 6G:典型应用、关键技术与面临挑战[J]. 物联网学报, 2022, 6(1): 29-43. |
[5] | 于全, 梁丹丹, 张伟. 面向万物智联的云原生网络[J]. 物联网学报, 2021, 5(2): 1-6. |
[6] | 王兆瑞,刘亮,李航,崔曙光. 面向6G物联网的智能反射表面设计[J]. 物联网学报, 2020, 4(2): 84-95. |
[7] | 尤肖虎, 尹浩, 邬贺铨. 6G与广域物联网[J]. 物联网学报, 2020, 4(1): 3-11. |
[8] | 刘东,吴启晖,Tony Q.S.Quek. 面向航空6G的频谱认知智能管控[J]. 物联网学报, 2020, 4(1): 12-18. |
[9] | 王承祥, 黄杰, 王海明, 高西奇, 尤肖虎, 郝阳. 面向6G的无线通信信道特性分析与建模[J]. 物联网学报, 2020, 4(1): 19-32. |
[10] | 伍明江,类先富,李里,唐小虎. 面向6G物联网的主被动互惠传输关键技术[J]. 物联网学报, 2020, 4(1): 45-51. |
[11] | 周洋程,闫实,彭木根. 意图驱动的6G无线接入网络[J]. 物联网学报, 2020, 4(1): 72-79. |
[12] | 熊轲,胡慧敏,艾渤,张煜,裴丽. 6G时代信息新鲜度优先的无线网络设计[J]. 物联网学报, 2020, 4(1): 80-91. |
[13] | 田飞燕,陈晓明,钟财军,张朝阳. 6G蜂窝物联网的大规模接入技术[J]. 物联网学报, 2020, 4(1): 92-103. |
[14] | 白卫岗,盛敏,杜盼盼. 6G卫星物联网移动性管理:挑战与关键技术[J]. 物联网学报, 2020, 4(1): 104-110. |
[15] | 代玥玥,张科,张彦. 区块链赋能6G[J]. 物联网学报, 2020, 4(1): 111-120. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|