Overview of 5G security technology

The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Science China. Information sciences 2018-08, Vol.61 (8), p.081301, Article 081301
Hauptverfasser: Ji, Xinsheng, Huang, Kaizhi, Jin, Liang, Tang, Hongbo, Liu, Caixia, Zhong, Zhou, You, Wei, Xu, Xiaoming, Zhao, Hua, Wu, Jiangxing, Yi, Ming
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 8
container_start_page 081301
container_title Science China. Information sciences
container_volume 61
creator Ji, Xinsheng
Huang, Kaizhi
Jin, Liang
Tang, Hongbo
Liu, Caixia
Zhong, Zhou
You, Wei
Xu, Xiaoming
Zhao, Hua
Wu, Jiangxing
Yi, Ming
description The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5G business applications, network architecture, the air interface, and user privacy. The development trends of 5G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5G security development. Several incremental 5G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5G.
doi_str_mv 10.1007/s11432-017-9426-4
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918655397</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2918655397</sourcerecordid><originalsourceid>FETCH-LOGICAL-c359t-886ed58d314999dffa20f05041ed538060d4b869252b977f9b2cd18037e6ad503</originalsourceid><addsrcrecordid>eNp1kE1LAzEQhoMoWGp_gLdFz9GZfGySoxStQqEXBW9hP5K6pe7WZLey_96UFTw5lxmG952Ph5BrhDsEUPcRUXBGARU1guVUnJEZ6txQNGjOU50rQRXn75dkEeMOUnAOTOkZudkcXTg27jvrfCZXWXTVEJp-zHpXfbTdvtuOV-TCF_voFr95Tt6eHl-Xz3S9Wb0sH9a04tL0VOvc1VLXHIUxpva-YOBBgsDU5hpyqEWZjmKSlUYpb0pW1aiBK5cXtQQ-J7fT3EPovgYXe7vrhtCmlZaZ9I6U3KikwklVhS7G4Lw9hOazCKNFsCcadqJhEw17omFF8rDJE5O23brwN_l_0w-9XF84</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918655397</pqid></control><display><type>article</type><title>Overview of 5G security technology</title><source>SpringerLink (Online service)</source><source>Alma/SFX Local Collection</source><source>ProQuest Central</source><creator>Ji, Xinsheng ; Huang, Kaizhi ; Jin, Liang ; Tang, Hongbo ; Liu, Caixia ; Zhong, Zhou ; You, Wei ; Xu, Xiaoming ; Zhao, Hua ; Wu, Jiangxing ; Yi, Ming</creator><creatorcontrib>Ji, Xinsheng ; Huang, Kaizhi ; Jin, Liang ; Tang, Hongbo ; Liu, Caixia ; Zhong, Zhou ; You, Wei ; Xu, Xiaoming ; Zhao, Hua ; Wu, Jiangxing ; Yi, Ming</creatorcontrib><description>The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5G business applications, network architecture, the air interface, and user privacy. The development trends of 5G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5G security development. Several incremental 5G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5G.</description><identifier>ISSN: 1674-733X</identifier><identifier>EISSN: 1869-1919</identifier><identifier>DOI: 10.1007/s11432-017-9426-4</identifier><language>eng</language><publisher>Beijing: Science China Press</publisher><subject>5G mobile communication ; Access control ; Communications systems ; Computer Science ; Cryptography ; Digital switching ; Information Systems and Communication Service ; International organizations ; Internet ; Mobile communication systems ; Mobile communications networks ; Network security ; Privacy ; Review ; Security ; Software ; Standardization ; Technology ; Trends</subject><ispartof>Science China. Information sciences, 2018-08, Vol.61 (8), p.081301, Article 081301</ispartof><rights>Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2018</rights><rights>Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2018.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c359t-886ed58d314999dffa20f05041ed538060d4b869252b977f9b2cd18037e6ad503</citedby><cites>FETCH-LOGICAL-c359t-886ed58d314999dffa20f05041ed538060d4b869252b977f9b2cd18037e6ad503</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11432-017-9426-4$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918655397?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21367,27901,27902,33721,41464,42533,43781,51294</link.rule.ids></links><search><creatorcontrib>Ji, Xinsheng</creatorcontrib><creatorcontrib>Huang, Kaizhi</creatorcontrib><creatorcontrib>Jin, Liang</creatorcontrib><creatorcontrib>Tang, Hongbo</creatorcontrib><creatorcontrib>Liu, Caixia</creatorcontrib><creatorcontrib>Zhong, Zhou</creatorcontrib><creatorcontrib>You, Wei</creatorcontrib><creatorcontrib>Xu, Xiaoming</creatorcontrib><creatorcontrib>Zhao, Hua</creatorcontrib><creatorcontrib>Wu, Jiangxing</creatorcontrib><creatorcontrib>Yi, Ming</creatorcontrib><title>Overview of 5G security technology</title><title>Science China. Information sciences</title><addtitle>Sci. China Inf. Sci</addtitle><description>The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5G business applications, network architecture, the air interface, and user privacy. The development trends of 5G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5G security development. Several incremental 5G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5G.</description><subject>5G mobile communication</subject><subject>Access control</subject><subject>Communications systems</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Digital switching</subject><subject>Information Systems and Communication Service</subject><subject>International organizations</subject><subject>Internet</subject><subject>Mobile communication systems</subject><subject>Mobile communications networks</subject><subject>Network security</subject><subject>Privacy</subject><subject>Review</subject><subject>Security</subject><subject>Software</subject><subject>Standardization</subject><subject>Technology</subject><subject>Trends</subject><issn>1674-733X</issn><issn>1869-1919</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp1kE1LAzEQhoMoWGp_gLdFz9GZfGySoxStQqEXBW9hP5K6pe7WZLey_96UFTw5lxmG952Ph5BrhDsEUPcRUXBGARU1guVUnJEZ6txQNGjOU50rQRXn75dkEeMOUnAOTOkZudkcXTg27jvrfCZXWXTVEJp-zHpXfbTdvtuOV-TCF_voFr95Tt6eHl-Xz3S9Wb0sH9a04tL0VOvc1VLXHIUxpva-YOBBgsDU5hpyqEWZjmKSlUYpb0pW1aiBK5cXtQQ-J7fT3EPovgYXe7vrhtCmlZaZ9I6U3KikwklVhS7G4Lw9hOazCKNFsCcadqJhEw17omFF8rDJE5O23brwN_l_0w-9XF84</recordid><startdate>20180801</startdate><enddate>20180801</enddate><creator>Ji, Xinsheng</creator><creator>Huang, Kaizhi</creator><creator>Jin, Liang</creator><creator>Tang, Hongbo</creator><creator>Liu, Caixia</creator><creator>Zhong, Zhou</creator><creator>You, Wei</creator><creator>Xu, Xiaoming</creator><creator>Zhao, Hua</creator><creator>Wu, Jiangxing</creator><creator>Yi, Ming</creator><general>Science China Press</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20180801</creationdate><title>Overview of 5G security technology</title><author>Ji, Xinsheng ; Huang, Kaizhi ; Jin, Liang ; Tang, Hongbo ; Liu, Caixia ; Zhong, Zhou ; You, Wei ; Xu, Xiaoming ; Zhao, Hua ; Wu, Jiangxing ; Yi, Ming</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c359t-886ed58d314999dffa20f05041ed538060d4b869252b977f9b2cd18037e6ad503</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>5G mobile communication</topic><topic>Access control</topic><topic>Communications systems</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Digital switching</topic><topic>Information Systems and Communication Service</topic><topic>International organizations</topic><topic>Internet</topic><topic>Mobile communication systems</topic><topic>Mobile communications networks</topic><topic>Network security</topic><topic>Privacy</topic><topic>Review</topic><topic>Security</topic><topic>Software</topic><topic>Standardization</topic><topic>Technology</topic><topic>Trends</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ji, Xinsheng</creatorcontrib><creatorcontrib>Huang, Kaizhi</creatorcontrib><creatorcontrib>Jin, Liang</creatorcontrib><creatorcontrib>Tang, Hongbo</creatorcontrib><creatorcontrib>Liu, Caixia</creatorcontrib><creatorcontrib>Zhong, Zhou</creatorcontrib><creatorcontrib>You, Wei</creatorcontrib><creatorcontrib>Xu, Xiaoming</creatorcontrib><creatorcontrib>Zhao, Hua</creatorcontrib><creatorcontrib>Wu, Jiangxing</creatorcontrib><creatorcontrib>Yi, Ming</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Database‎ (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Science China. Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ji, Xinsheng</au><au>Huang, Kaizhi</au><au>Jin, Liang</au><au>Tang, Hongbo</au><au>Liu, Caixia</au><au>Zhong, Zhou</au><au>You, Wei</au><au>Xu, Xiaoming</au><au>Zhao, Hua</au><au>Wu, Jiangxing</au><au>Yi, Ming</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Overview of 5G security technology</atitle><jtitle>Science China. Information sciences</jtitle><stitle>Sci. China Inf. Sci</stitle><date>2018-08-01</date><risdate>2018</risdate><volume>61</volume><issue>8</issue><spage>081301</spage><pages>081301-</pages><artnum>081301</artnum><issn>1674-733X</issn><eissn>1869-1919</eissn><abstract>The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5G business applications, network architecture, the air interface, and user privacy. The development trends of 5G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5G security development. Several incremental 5G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5G.</abstract><cop>Beijing</cop><pub>Science China Press</pub><doi>10.1007/s11432-017-9426-4</doi></addata></record>
fulltext fulltext
identifier ISSN: 1674-733X
ispartof Science China. Information sciences, 2018-08, Vol.61 (8), p.081301, Article 081301
issn 1674-733X
1869-1919
language eng
recordid cdi_proquest_journals_2918655397
source SpringerLink (Online service); Alma/SFX Local Collection; ProQuest Central
subjects 5G mobile communication
Access control
Communications systems
Computer Science
Cryptography
Digital switching
Information Systems and Communication Service
International organizations
Internet
Mobile communication systems
Mobile communications networks
Network security
Privacy
Review
Security
Software
Standardization
Technology
Trends
title Overview of 5G security technology
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T06%3A50%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Overview%20of%205G%20security%20technology&rft.jtitle=Science%20China.%20Information%20sciences&rft.au=Ji,%20Xinsheng&rft.date=2018-08-01&rft.volume=61&rft.issue=8&rft.spage=081301&rft.pages=081301-&rft.artnum=081301&rft.issn=1674-733X&rft.eissn=1869-1919&rft_id=info:doi/10.1007/s11432-017-9426-4&rft_dat=%3Cproquest_cross%3E2918655397%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918655397&rft_id=info:pmid/&rfr_iscdi=true