Overview of 5G security technology
The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5...
Gespeichert in:
Veröffentlicht in: | Science China. Information sciences 2018-08, Vol.61 (8), p.081301, Article 081301 |
---|---|
Hauptverfasser: | , , , , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 8 |
container_start_page | 081301 |
container_title | Science China. Information sciences |
container_volume | 61 |
creator | Ji, Xinsheng Huang, Kaizhi Jin, Liang Tang, Hongbo Liu, Caixia Zhong, Zhou You, Wei Xu, Xiaoming Zhao, Hua Wu, Jiangxing Yi, Ming |
description | The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5G business applications, network architecture, the air interface, and user privacy. The development trends of 5G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5G security development. Several incremental 5G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5G. |
doi_str_mv | 10.1007/s11432-017-9426-4 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918655397</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2918655397</sourcerecordid><originalsourceid>FETCH-LOGICAL-c359t-886ed58d314999dffa20f05041ed538060d4b869252b977f9b2cd18037e6ad503</originalsourceid><addsrcrecordid>eNp1kE1LAzEQhoMoWGp_gLdFz9GZfGySoxStQqEXBW9hP5K6pe7WZLey_96UFTw5lxmG952Ph5BrhDsEUPcRUXBGARU1guVUnJEZ6txQNGjOU50rQRXn75dkEeMOUnAOTOkZudkcXTg27jvrfCZXWXTVEJp-zHpXfbTdvtuOV-TCF_voFr95Tt6eHl-Xz3S9Wb0sH9a04tL0VOvc1VLXHIUxpva-YOBBgsDU5hpyqEWZjmKSlUYpb0pW1aiBK5cXtQQ-J7fT3EPovgYXe7vrhtCmlZaZ9I6U3KikwklVhS7G4Lw9hOazCKNFsCcadqJhEw17omFF8rDJE5O23brwN_l_0w-9XF84</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918655397</pqid></control><display><type>article</type><title>Overview of 5G security technology</title><source>SpringerLink (Online service)</source><source>Alma/SFX Local Collection</source><source>ProQuest Central</source><creator>Ji, Xinsheng ; Huang, Kaizhi ; Jin, Liang ; Tang, Hongbo ; Liu, Caixia ; Zhong, Zhou ; You, Wei ; Xu, Xiaoming ; Zhao, Hua ; Wu, Jiangxing ; Yi, Ming</creator><creatorcontrib>Ji, Xinsheng ; Huang, Kaizhi ; Jin, Liang ; Tang, Hongbo ; Liu, Caixia ; Zhong, Zhou ; You, Wei ; Xu, Xiaoming ; Zhao, Hua ; Wu, Jiangxing ; Yi, Ming</creatorcontrib><description>The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5G business applications, network architecture, the air interface, and user privacy. The development trends of 5G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5G security development. Several incremental 5G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5G.</description><identifier>ISSN: 1674-733X</identifier><identifier>EISSN: 1869-1919</identifier><identifier>DOI: 10.1007/s11432-017-9426-4</identifier><language>eng</language><publisher>Beijing: Science China Press</publisher><subject>5G mobile communication ; Access control ; Communications systems ; Computer Science ; Cryptography ; Digital switching ; Information Systems and Communication Service ; International organizations ; Internet ; Mobile communication systems ; Mobile communications networks ; Network security ; Privacy ; Review ; Security ; Software ; Standardization ; Technology ; Trends</subject><ispartof>Science China. Information sciences, 2018-08, Vol.61 (8), p.081301, Article 081301</ispartof><rights>Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2018</rights><rights>Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2018.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c359t-886ed58d314999dffa20f05041ed538060d4b869252b977f9b2cd18037e6ad503</citedby><cites>FETCH-LOGICAL-c359t-886ed58d314999dffa20f05041ed538060d4b869252b977f9b2cd18037e6ad503</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11432-017-9426-4$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918655397?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21367,27901,27902,33721,41464,42533,43781,51294</link.rule.ids></links><search><creatorcontrib>Ji, Xinsheng</creatorcontrib><creatorcontrib>Huang, Kaizhi</creatorcontrib><creatorcontrib>Jin, Liang</creatorcontrib><creatorcontrib>Tang, Hongbo</creatorcontrib><creatorcontrib>Liu, Caixia</creatorcontrib><creatorcontrib>Zhong, Zhou</creatorcontrib><creatorcontrib>You, Wei</creatorcontrib><creatorcontrib>Xu, Xiaoming</creatorcontrib><creatorcontrib>Zhao, Hua</creatorcontrib><creatorcontrib>Wu, Jiangxing</creatorcontrib><creatorcontrib>Yi, Ming</creatorcontrib><title>Overview of 5G security technology</title><title>Science China. Information sciences</title><addtitle>Sci. China Inf. Sci</addtitle><description>The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5G business applications, network architecture, the air interface, and user privacy. The development trends of 5G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5G security development. Several incremental 5G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5G.</description><subject>5G mobile communication</subject><subject>Access control</subject><subject>Communications systems</subject><subject>Computer Science</subject><subject>Cryptography</subject><subject>Digital switching</subject><subject>Information Systems and Communication Service</subject><subject>International organizations</subject><subject>Internet</subject><subject>Mobile communication systems</subject><subject>Mobile communications networks</subject><subject>Network security</subject><subject>Privacy</subject><subject>Review</subject><subject>Security</subject><subject>Software</subject><subject>Standardization</subject><subject>Technology</subject><subject>Trends</subject><issn>1674-733X</issn><issn>1869-1919</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp1kE1LAzEQhoMoWGp_gLdFz9GZfGySoxStQqEXBW9hP5K6pe7WZLey_96UFTw5lxmG952Ph5BrhDsEUPcRUXBGARU1guVUnJEZ6txQNGjOU50rQRXn75dkEeMOUnAOTOkZudkcXTg27jvrfCZXWXTVEJp-zHpXfbTdvtuOV-TCF_voFr95Tt6eHl-Xz3S9Wb0sH9a04tL0VOvc1VLXHIUxpva-YOBBgsDU5hpyqEWZjmKSlUYpb0pW1aiBK5cXtQQ-J7fT3EPovgYXe7vrhtCmlZaZ9I6U3KikwklVhS7G4Lw9hOazCKNFsCcadqJhEw17omFF8rDJE5O23brwN_l_0w-9XF84</recordid><startdate>20180801</startdate><enddate>20180801</enddate><creator>Ji, Xinsheng</creator><creator>Huang, Kaizhi</creator><creator>Jin, Liang</creator><creator>Tang, Hongbo</creator><creator>Liu, Caixia</creator><creator>Zhong, Zhou</creator><creator>You, Wei</creator><creator>Xu, Xiaoming</creator><creator>Zhao, Hua</creator><creator>Wu, Jiangxing</creator><creator>Yi, Ming</creator><general>Science China Press</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20180801</creationdate><title>Overview of 5G security technology</title><author>Ji, Xinsheng ; Huang, Kaizhi ; Jin, Liang ; Tang, Hongbo ; Liu, Caixia ; Zhong, Zhou ; You, Wei ; Xu, Xiaoming ; Zhao, Hua ; Wu, Jiangxing ; Yi, Ming</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c359t-886ed58d314999dffa20f05041ed538060d4b869252b977f9b2cd18037e6ad503</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>5G mobile communication</topic><topic>Access control</topic><topic>Communications systems</topic><topic>Computer Science</topic><topic>Cryptography</topic><topic>Digital switching</topic><topic>Information Systems and Communication Service</topic><topic>International organizations</topic><topic>Internet</topic><topic>Mobile communication systems</topic><topic>Mobile communications networks</topic><topic>Network security</topic><topic>Privacy</topic><topic>Review</topic><topic>Security</topic><topic>Software</topic><topic>Standardization</topic><topic>Technology</topic><topic>Trends</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ji, Xinsheng</creatorcontrib><creatorcontrib>Huang, Kaizhi</creatorcontrib><creatorcontrib>Jin, Liang</creatorcontrib><creatorcontrib>Tang, Hongbo</creatorcontrib><creatorcontrib>Liu, Caixia</creatorcontrib><creatorcontrib>Zhong, Zhou</creatorcontrib><creatorcontrib>You, Wei</creatorcontrib><creatorcontrib>Xu, Xiaoming</creatorcontrib><creatorcontrib>Zhao, Hua</creatorcontrib><creatorcontrib>Wu, Jiangxing</creatorcontrib><creatorcontrib>Yi, Ming</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Database (1962 - current)</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Science China. Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ji, Xinsheng</au><au>Huang, Kaizhi</au><au>Jin, Liang</au><au>Tang, Hongbo</au><au>Liu, Caixia</au><au>Zhong, Zhou</au><au>You, Wei</au><au>Xu, Xiaoming</au><au>Zhao, Hua</au><au>Wu, Jiangxing</au><au>Yi, Ming</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Overview of 5G security technology</atitle><jtitle>Science China. Information sciences</jtitle><stitle>Sci. China Inf. Sci</stitle><date>2018-08-01</date><risdate>2018</risdate><volume>61</volume><issue>8</issue><spage>081301</spage><pages>081301-</pages><artnum>081301</artnum><issn>1674-733X</issn><eissn>1869-1919</eissn><abstract>The 5th-generation mobile communication system (5G) has higher security requirements than previous systems. Accordingly, international standard organizations, operators, and equipment manufacturers are focusing extensively on 5G security technology. This paper analyzes the security requirements of 5G business applications, network architecture, the air interface, and user privacy. The development trends of 5G security architecture are summarized, with a focus on endogenous defense architecture, which represents a new trend in 5G security development. Several incremental 5G security technologies are reviewed, including physical layer security, lightweight encryption, network slice security, user privacy protection, and block chain technology applied to 5G.</abstract><cop>Beijing</cop><pub>Science China Press</pub><doi>10.1007/s11432-017-9426-4</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1674-733X |
ispartof | Science China. Information sciences, 2018-08, Vol.61 (8), p.081301, Article 081301 |
issn | 1674-733X 1869-1919 |
language | eng |
recordid | cdi_proquest_journals_2918655397 |
source | SpringerLink (Online service); Alma/SFX Local Collection; ProQuest Central |
subjects | 5G mobile communication Access control Communications systems Computer Science Cryptography Digital switching Information Systems and Communication Service International organizations Internet Mobile communication systems Mobile communications networks Network security Privacy Review Security Software Standardization Technology Trends |
title | Overview of 5G security technology |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T06%3A50%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Overview%20of%205G%20security%20technology&rft.jtitle=Science%20China.%20Information%20sciences&rft.au=Ji,%20Xinsheng&rft.date=2018-08-01&rft.volume=61&rft.issue=8&rft.spage=081301&rft.pages=081301-&rft.artnum=081301&rft.issn=1674-733X&rft.eissn=1869-1919&rft_id=info:doi/10.1007/s11432-017-9426-4&rft_dat=%3Cproquest_cross%3E2918655397%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918655397&rft_id=info:pmid/&rfr_iscdi=true |