CN113079163A - 5G smart city safety framework - Google Patents
5G smart city safety framework Download PDFInfo
- Publication number
- CN113079163A CN113079163A CN202110359714.1A CN202110359714A CN113079163A CN 113079163 A CN113079163 A CN 113079163A CN 202110359714 A CN202110359714 A CN 202110359714A CN 113079163 A CN113079163 A CN 113079163A
- Authority
- CN
- China
- Prior art keywords
- security
- layer
- unit
- network
- safety
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a 5G smart city security architecture, which is a five-layer architecture; the five-layer architecture comprises: the system comprises an application security layer, an industry platform/technology middle platform security layer, a network security layer, an edge computing security layer and a terminal security layer. The application security layer is used for guaranteeing the security of the application account and the application software; the industry platform/technology middle platform safety layer is used for guaranteeing safe and stable operation of the industry platform and the technology middle platform; the network security layer is used for protecting the security of the network; the edge computing security layer is used for preventing intrusion and damage of an external network to an edge computing network; and the terminal security layer is used for guaranteeing the communication security. By adopting the 5G smart city security architecture provided by the invention, the security problem of a 5G smart city system can be reduced, and the data security and privacy of users and enterprises can be effectively protected.
Description
Technical Field
The invention relates to the field of smart city security, in particular to a 5G smart city security architecture.
Background
According to the definition of ISO (International organization for standardization), the smart city effectively integrates a physical system, a digital system and a human system in an established environment, thereby providing a sustainable, prosperous and inclusive comprehensive environment system for citizens.
The smart city utilizes the information technology, promotes the fusion of information space, physical space and social space in the city, accelerates the economic development and transformation of the city through rich application systems, improves the efficiency of governments and public services, facilitates the working and living of citizens, effectively protects and utilizes the environment, and realizes the harmonious development of the economy, the society and the environment.
However, 5G brings new safety risks while injecting new power to smart city development. For example, in different layers of a 5G smart city, security problems exist in a terminal layer, an edge computing layer, a network layer, a platform layer, an application layer and the like. For a terminal layer of a 5G smart city, safety requirements mainly include that the terminal per se is well reinforced and protected in terms of software and hardware, and damage or information stealing caused by external invasion to the terminal is avoided; for a 5G smart city edge computing layer, the damage to equipment systems in an edge computing site caused by intrusion from an external network needs to be prevented; for a 5G smart city network layer, security requirements mainly include RAN base station air interface, bearer network, 5GC and 5G slice security; for a 5G smart city platform layer, the intrusion of channels such as a network or API (application programming interface) interface call and the like into an application platform and a technical middle platform system needs to be prevented; for the 5G smart city application layer, data security and application system security are concerned. Therefore, how to construct a security architecture of a 5G smart city becomes an urgent problem to be solved.
Disclosure of Invention
The invention aims to provide a 5G smart city safety architecture to solve the safety problem of a 5G smart city.
In order to achieve the purpose, the invention provides the following scheme:
A5G smart city security architecture, the 5G smart city security architecture is a five-layer architecture; the five-layer architecture comprises: the system comprises an application security layer, an industry platform/technology middle platform security layer, a network security layer, an edge computing security layer and a terminal security layer.
The application security layer is used for guaranteeing the security of the application account and the application software; after the safety of the account and the software is determined, the terminal safety layer is used for guaranteeing the communication safety and sending the bottom data to the edge computing safety layer safely; the edge computing security layer is used for preventing intrusion and damage of an external network to an edge computing network, carrying out secure storage and computation on received data and then sending the data to the industry platform/technology middle platform security layer; the industry platform/technology middle platform safety layer is used for guaranteeing safe and stable operation of the industry platform and the technology middle platform; the network security layer is used for protecting the security of the 5G network.
Further, the application security layer includes:
the identity management unit is used for identity management of each user;
the access control unit is used for managing the authentication mode and the access authority of each user;
the data security unit is used for protecting confidentiality, integrity and usability of sensitive data of industries and users;
a service security unit for preventing malicious misuse of the service itself;
and the application reinforcement unit is used for regularly and safely reinforcing the application software system.
Further, the industry platform/technology middleware security layer comprises:
the API interface safety unit is used for ensuring the safety of various API calls, information acquisition and transmission and operation instruction transmission among network elements;
the platform infrastructure safety unit is used for ensuring the safety of the bottom layer of the platform infrastructure;
and the disaster recovery backup unit is used for backing up the data of the key industry platform and the key technology platform.
Further, the network security layer includes: the system comprises a base station air interface side safety unit, a bearer network safety unit, a 5GC core network safety unit and a 5G slice safety unit.
Furthermore, the base station air interface side security unit solves the problem of user data eavesdropping and tampering of the air interface by starting the SUCI encryption and the encryption function of the air interface PDCP layer data packet; by deploying a DDOS detection defense system, when DDOS large-flow attack occurs, the base station performs some current-limiting control to solve the problem of air interface DDOS attack from UE; the problem of malicious interference of other attack sources to an air interface is solved by deploying a unified pseudo base station detection system and a spectrum interference detection system in the whole network.
Furthermore, the bearer network security unit solves the confidentiality and integrity problems of the network data message by deploying IPSEC security encryption; the BGP routing hijacking attack problem is solved by configuring MD5 authentication or SSL encryption security measures.
Furthermore, the 5GC core network security unit defends various possible security threats from the outside of the data center by intensively deploying security measures such as a firewall, a sandbox, a WAF and an IPS at the exit boundary of the 5GC telecommunication cloud data center; the safety of the I-layer cloud infrastructure of the telecommunication cloud is guaranteed through measures in aspects of VDC and VPC resource isolation, Hypervisor safety monitoring, vulnerability scanning of an operating system database and the like; the safety problem of the 5GC network element is solved by installing a safety component which runs internally on the network element system, monitoring the running condition of the network element and other measures.
Furthermore, the 5G slice security unit can access the corresponding network slice only through the double authentication and authorization of the slice user (government agency, industrial and mining enterprise) and the 5G network operator, thereby ensuring the legal access of the slice and the legal use of slice resources and realizing the security guarantee of the 5G network slice.
Further, the edge computing security layer includes:
the boundary protection unit is used for deploying a firewall at an external interface of the UPF equipment to realize boundary isolation protection;
the edge computing cloud infrastructure security unit is used for ensuring the bottom layer security of the edge computing network;
for the safety of edge computing, firstly, the intrusion and the damage of an edge computing network from an external network are avoided through the boundary protection unit; and then, the safety of the edge computing cloud infrastructure is ensured through the edge computing cloud infrastructure safety unit, so that the safety of the edge computing network is realized.
Further, the terminal security layer includes:
the communication security unit is used for encrypting the communication data end to end; the APP safety unit is used for carrying out vulnerability scanning and safety reinforcement on the APP software of the terminal;
firstly, the APP security unit scans software to avoid the intrusion damage of a terminal caused by the vulnerability of the application software, and then the communication security unit encrypts the terminal of communication data to prevent the communication data of the terminal from being intercepted or tampered.
The invention has the beneficial effects that: the invention provides a 5G smart city security architecture, which realizes that the terminal of a 5G smart city is not easy to be invaded and invaded by hackers through a terminal security layer; by the edge computing security layer, physical attack in a 5G smart city system and cross-network penetration and cross infection of network attack are avoided; the safety of the 5G network is protected through the network safety layer; the industrial confidential data and the data privacy of the user are guaranteed through an industrial platform/technical middle platform security layer; through the application of the security layer, unauthorized access caused by illegal access is avoided, and the security of an application system is guaranteed. According to the invention, the safety risk of the 5G smart city system is reduced by applying the safety layer, the industry platform/technology middle platform safety layer, the network safety layer, the edge calculation safety layer and the terminal safety layer.
Drawings
FIG. 1 is a diagram of a 5G smart city security hierarchy according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments. The embodiments of the present invention have been presented for purposes of illustration and description, and are not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Example 1
Fig. 1 is a 5G smart city security architecture diagram provided in the present invention, as shown in fig. 1, a 5G smart city security architecture, wherein the 5G smart city security architecture is a five-layer architecture; the five-layer architecture comprises: the system comprises an application security layer 1, an industry platform/technology middle platform security layer 2, a network security layer 3, an edge calculation security layer 4 and a terminal security layer 5.
The application security layer 1 is used for ensuring the security of the application account and the application software; after the safety of the account and the software is determined, the terminal safety layer 5 is used for guaranteeing the communication safety and sending the bottom data to the edge computing safety layer 4 safely; the edge computing security layer 4 is used for preventing intrusion and damage of an external network to an edge computing network, performing secure storage and computation on received data, and then sending the data to the industry platform/technology middle platform security layer 2; the industry platform/technology middle platform safety layer 2 is used for guaranteeing safe and stable operation of the industry platform and the technology middle platform; the network security layer 3 is used to secure the 5G network itself.
Example 2
In a 5G smart city system, each application system is usually configured with a plurality of user accounts of different categories and different authority levels. Especially for some applications of 5G smart cities, services are provided for the industry and the public in the vast society, so that the guarantee of the safety of an application layer is very important.
In this embodiment, the application security layer 1 includes:
an identity management unit 6 for identity management of each user;
an access control unit 7 for managing an authentication method and access authority of each user;
the data security unit 8 is used for protecting the confidentiality, integrity and availability of sensitive data of industries and users;
a service security unit 9 for preventing malicious misuse of the service itself;
the application reinforcement unit 10 is used for regularly and safely reinforcing the application software system;
firstly, performing behavior analysis and flow analysis on the smart city service implementation through the service security unit 9; the role of each user (e.g. system administrator, ordinary external user) is then clearly defined by said identity management unit 6 and said access control unit 7; then, the data security unit 8 encrypts and stores the data and processes the data anonymization; finally, the reinforcement unit 10 is applied to perform periodic vulnerability scanning and security reinforcement on the system.
Example 3
In the 5G smart city system, in order to avoid data leakage and tampering of an industry application platform and an IT middle desk and guarantee confidentiality, integrity and availability of the data, some measures in data security can be deployed, such as data encryption storage, data anonymization processing, data security deletion, regular backup of the data and the like.
In this embodiment, the industry platform/technology midplatform security layer 2 includes:
the API interface safety unit 11 is used for ensuring the safety of various API calls, information acquisition and transmission and operation instruction transmission among network elements;
a platform infrastructure security unit 12 for securing a bottom layer of the platform infrastructure;
the disaster recovery backup unit 13 is used for backing up data of key industry platforms and technical platforms;
firstly, the platform infrastructure security unit 12 reinforces and guarantees the security of the cloud infrastructure base through resource isolation and security scanning of an operating system database, and then for the security of a communication interface, an attacker is prevented from invading and stealing sensitive data through the communication interface between machines and machines by adopting interface authentication and other modes through the API interface security unit 11.
Example 4
In this embodiment, the network security layer 3 includes: a base station air interface side security unit 14, a bearer network security unit 15, a 5GC core network security unit 16 and a 5G slice security unit 17.
Specifically, for an air interface between a 5G UE terminal and a base station, the security threats faced by the air interface mainly include user data eavesdropping and tampering of the air interface, an air interface DDOS attack from the UE, and malicious interference of a pseudo base station or other attack sources on the air interface.
Aiming at the safety problem, the base station air interface side safety 14 solves the problem of user data eavesdropping and tampering of the air interface by starting the SUCI encryption and the encryption function of the air interface PDCP layer data packet; by deploying a DDOS detection defense system, when DDOS large-flow attack occurs, the base station performs some current-limiting control to solve the problem of air interface DDOS attack from UE; the problem of malicious interference of other attack sources to an air interface is solved by deploying a unified pseudo base station detection system and a spectrum interference detection system in the whole network.
Specifically, for the security of the bearer network, the confidentiality and integrity problems of the network data packet and the BGP route hijacking attack problem are faced.
Aiming at the safety problem, the bearer network safety unit 15 solves the confidentiality and integrity problems of the network data message by deploying IPSEC safety encryption; the BGP routing hijacking attack problem is solved by configuring MD5 authentication or SSL encryption security measures.
Specifically, for the security of a 5GC core network, the security problems mainly face to the border security of a 5GC telecommunication cloud data center, the security of a telecommunication cloud I-layer cloud infrastructure, and the security of a 5GC network element itself.
Aiming at the security problem, the 5GC core network security unit 16 centrally deploys security measures such as a firewall, a sandbox, a WAF and an IPS at the exit boundary of the 5GC telecommunication cloud data center to defend various possible security threats coming from the outside of the data center; the safety of the I-layer cloud infrastructure of the telecommunication cloud is guaranteed through measures in aspects of VDC and VPC resource isolation, Hypervisor safety monitoring, vulnerability scanning of an operating system database and the like; the safety problem of the 5GC network element is solved by installing a safety component which runs internally on the network element system, monitoring the running condition of the network element and other measures.
Specifically, for 5G slice security, the 5G slice security unit 17 can access the corresponding network slice only through double authentication and authorization of the slice user (government agency, industrial and mining enterprise) and the 5G network operator, so as to ensure legal access of the slice and legal use of slice resources, thereby ensuring 5G network slice security.
Example 5
In the 5G era, due to popularization and application of delay sensitive services such as industrial manufacturing, AR/VR, automatic driving and the like, a large number of mobile edge computing clouds are deployed. In order to avoid cross-network penetration and cross-infection of physical attacks and network attacks, attention needs to be paid to security management and control of the mobile edge computing cloud and isolation between the enterprise network and the operator 5G network.
In this embodiment, the edge calculation security layer 4 includes:
the boundary protection unit 18 is used for deploying a firewall at an external interface of the UPF equipment to realize boundary isolation protection;
the edge computing cloud infrastructure security unit 19 is used for ensuring the bottom layer security of the edge computing network;
for the security of edge computing, firstly, the edge computing network is prevented from being invaded and damaged by an external network through the boundary protection unit 18; and then, the security of the edge computing cloud infrastructure is ensured by the edge computing cloud infrastructure security unit 19, so that the security of the edge computing network is realized.
Example 6
The number of terminals of the 5G smart city is large, the distribution range is wide, the software is relatively uncontrollable, and the intelligent city is easy to invade and trap by hackers.
In this embodiment, the terminal security layer 5 includes:
a communication security unit 20 for performing end-to-end encryption on communication data;
and the APP safety unit 21 is used for implementing vulnerability scanning and safety reinforcement on the APP software of the terminal.
In order to guarantee the security of the terminal communication service, the APP security unit 21 is used for periodically scanning software to prevent the terminal from being damaged by intrusion due to the vulnerability of the application software, and then the communication security unit 20 is used for encrypting the terminal of the communication data to prevent the communication data of the terminal from being intercepted or tampered.
It is to be understood that the described embodiments are merely a few embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by one of ordinary skill in the art and related arts based on the embodiments of the present invention without any creative effort, shall fall within the protection scope of the present invention. It is to be understood that the described embodiments are merely a few embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by one of ordinary skill in the art and related arts based on the embodiments of the present invention without any creative effort, shall fall within the protection scope of the present invention.
Claims (6)
1. A5G smart city security architecture, comprising: the system comprises an application security layer (1), an industry platform/technology middle platform security layer (2), a network security layer (3), an edge calculation security layer (4) and a terminal security layer (5);
the application security layer (1) is used for ensuring the security of the application account and the application software; after the safety of the account and the software is determined, the terminal safety layer (5) is used for guaranteeing the communication safety and sending bottom data to the edge computing safety layer (4) safely; the edge computing security layer (4) is used for preventing intrusion and damage of an external network to the edge computing network, carrying out secure storage and computation on received data and then sending the data to the industry platform/technology middle platform security layer (2); the industry platform/technology middle platform safety layer (2) is used for guaranteeing safe and stable operation of the industry platform and the technology middle platform; the network security layer (3) is used for protecting the security of the 5G network.
2. The 5G smart city security architecture as claimed in claim 1, wherein the application security layer (1) comprises:
an identity management unit (6) for identity management of each user;
an access control unit (7) for managing an authentication method and access authority of each user;
a data security unit (8) for protecting confidentiality, integrity and availability of industry and user sensitive data;
a service security unit (9) for preventing malicious misuse of the service itself;
the application reinforcement unit (10) is used for regularly and safely reinforcing the application software system;
firstly, performing behavior analysis and flow analysis on the smart city service implementation through the service security unit (9); the role of each user is then clearly defined by the identity management unit (6) and the access control unit (7); then, the data is encrypted and stored and processed in an anonymization way through a data security unit (8); and finally, applying a reinforcing unit (10) to carry out periodical vulnerability scanning and security reinforcing on the system.
3. The 5G smart city security architecture as claimed in claim 1, wherein the industry platform/technology middleware security layer (2) comprises:
the API interface safety unit (11) is used for ensuring the safety of various API calls, information acquisition and transmission and operation instruction transmission among network elements;
a platform infrastructure security unit (12) for securing a bottom layer of the platform infrastructure;
and the disaster recovery backup unit (13) is used for backing up the data of the key industry platform and the key technology platform.
The platform infrastructure security unit (12) guarantees the security of the cloud infrastructure base, and then an attacker is prevented from invading and stealing sensitive data through the communication interface between the machine and the machine through the API interface security unit (11).
4. The 5G smart city security architecture as claimed in claim 1, wherein the network security layer (3) comprises: a base station air interface side security unit (14), a bearer network security unit (15), a 5GC core network security unit (16) and a 5G slice security unit (17).
5. The 5G smart city security architecture as claimed in claim 1, wherein the edge computing security layer (4) comprises:
the boundary protection unit (18) is used for deploying a firewall at an external interface of the UPF equipment to realize boundary isolation protection;
an edge computing cloud infrastructure security unit (19) for securing the bottom layer security of the edge computing network;
firstly, the boundary protection unit (18) is used for avoiding the invasion and damage of an edge computing network from an external network; and then the safety of the edge computing cloud infrastructure is ensured through the edge computing cloud infrastructure safety unit (19), so that the safety of the edge computing network is realized.
6. The 5G smart city security architecture as claimed in claim 1, wherein the terminal security layer (5) comprises: a communication security unit (20) for encrypting communication data end to end; the APP security unit (21) is used for carrying out vulnerability scanning and security reinforcement on the APP software of the terminal;
firstly, the APP security unit (21) scans software to avoid the intrusion damage of the terminal caused by the vulnerability of the application software, and then the communication security unit (20) encrypts the terminal of the communication data to prevent the communication data of the terminal from being intercepted or tampered.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110359714.1A CN113079163A (en) | 2021-04-02 | 2021-04-02 | 5G smart city safety framework |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110359714.1A CN113079163A (en) | 2021-04-02 | 2021-04-02 | 5G smart city safety framework |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113079163A true CN113079163A (en) | 2021-07-06 |
Family
ID=76614838
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110359714.1A Pending CN113079163A (en) | 2021-04-02 | 2021-04-02 | 5G smart city safety framework |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113079163A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113596026A (en) * | 2021-07-29 | 2021-11-02 | 电子科技大学 | Physical layer secure transmission method based on multiple channels |
CN114143348A (en) * | 2021-11-30 | 2022-03-04 | 中国电力科学研究院有限公司 | Electric power Internet of things security defense method and system, storage medium and server |
CN114301739A (en) * | 2021-12-29 | 2022-04-08 | 北京国家新能源汽车技术创新中心有限公司 | Central gateway security architecture, system and storage medium |
CN115955674A (en) * | 2023-03-10 | 2023-04-11 | 中国人民解放军军事科学院战争研究院 | Mobile communication secrecy method and system for border prevention and control network |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105337971A (en) * | 2015-10-20 | 2016-02-17 | 上海电机学院 | Electric power information system cloud safety guarantee system and implementation method thereof |
CN105871876A (en) * | 2016-05-05 | 2016-08-17 | 云神科技投资股份有限公司 | Smart city cloud security architecture building method |
CN107483530A (en) * | 2017-06-14 | 2017-12-15 | 广州宏和网络科技有限公司 | A kind of smart city system and its implementation based on cloud computing and Internet of Things |
CN109347847A (en) * | 2018-11-01 | 2019-02-15 | 广东粤迪厚创科技发展有限公司 | A kind of smart city security assurance information system |
US20190273783A1 (en) * | 2016-08-10 | 2019-09-05 | Chengdu Qinchuan Iot Technology Co., Ltd. | Smart City System Architecture |
CN110335187A (en) * | 2019-06-18 | 2019-10-15 | 国家信息中心 | A kind of smart city operating system |
CN110378827A (en) * | 2019-07-26 | 2019-10-25 | 王永德 | A kind of smart city service architecture device based on nformation grid service |
CN111223195A (en) * | 2020-01-16 | 2020-06-02 | 弘道(深圳)物联科技有限公司 | City level wisdom parking system platform |
-
2021
- 2021-04-02 CN CN202110359714.1A patent/CN113079163A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105337971A (en) * | 2015-10-20 | 2016-02-17 | 上海电机学院 | Electric power information system cloud safety guarantee system and implementation method thereof |
CN105871876A (en) * | 2016-05-05 | 2016-08-17 | 云神科技投资股份有限公司 | Smart city cloud security architecture building method |
US20190273783A1 (en) * | 2016-08-10 | 2019-09-05 | Chengdu Qinchuan Iot Technology Co., Ltd. | Smart City System Architecture |
CN107483530A (en) * | 2017-06-14 | 2017-12-15 | 广州宏和网络科技有限公司 | A kind of smart city system and its implementation based on cloud computing and Internet of Things |
CN109347847A (en) * | 2018-11-01 | 2019-02-15 | 广东粤迪厚创科技发展有限公司 | A kind of smart city security assurance information system |
CN110335187A (en) * | 2019-06-18 | 2019-10-15 | 国家信息中心 | A kind of smart city operating system |
CN110378827A (en) * | 2019-07-26 | 2019-10-25 | 王永德 | A kind of smart city service architecture device based on nformation grid service |
CN111223195A (en) * | 2020-01-16 | 2020-06-02 | 弘道(深圳)物联科技有限公司 | City level wisdom parking system platform |
Non-Patent Citations (3)
Title |
---|
IMT-2020(5G)推进组: "5G 智慧城市安全需求与架构白皮书", 《5G 智慧城市安全需求与架构白皮书》 * |
IMT-2020(5G)推进组安全工作组: "5G智慧城市安全需求与发展建议", 《中国信息界》 * |
吕欣等: "智慧城市网络安全体系框架研究", 《信息安全研究》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113596026A (en) * | 2021-07-29 | 2021-11-02 | 电子科技大学 | Physical layer secure transmission method based on multiple channels |
CN113596026B (en) * | 2021-07-29 | 2022-04-22 | 电子科技大学 | Physical layer secure transmission method based on multiple channels |
CN114143348A (en) * | 2021-11-30 | 2022-03-04 | 中国电力科学研究院有限公司 | Electric power Internet of things security defense method and system, storage medium and server |
CN114301739A (en) * | 2021-12-29 | 2022-04-08 | 北京国家新能源汽车技术创新中心有限公司 | Central gateway security architecture, system and storage medium |
CN114301739B (en) * | 2021-12-29 | 2023-08-22 | 北京国家新能源汽车技术创新中心有限公司 | Central gateway security architecture, system and storage medium |
CN115955674A (en) * | 2023-03-10 | 2023-04-11 | 中国人民解放军军事科学院战争研究院 | Mobile communication secrecy method and system for border prevention and control network |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113079163A (en) | 5G smart city safety framework | |
Albugmi et al. | Data security in cloud computing | |
Kazim et al. | A survey on top security threats in cloud computing | |
Getov | Security as a service in smart clouds--opportunities and concerns | |
Malik et al. | Security framework for cloud computing environment: A review | |
KR101534307B1 (en) | Caused by the use of smart device internal confidential data leakage prevention & trace system and method | |
Bokhari et al. | Security and privacy issues in cloud computing | |
Sharma et al. | Security-as-a-Service from Clouds: A comprehensive Analysis | |
Lemoudden et al. | A Survey of Cloud Computing Security Overview of Attack Vectors and Defense Mechanisms. | |
Madasu | A Research to Study Concerns Regarding the Security of Cloud Computing | |
Vidhani et al. | Security Challenges in 5G Network: A technical features survey and analysis | |
Alani et al. | Security threats in cloud computing | |
Kostadinov et al. | Security policies for wireless and network infrastructure | |
US11722519B1 (en) | System and method for dynamically avoiding double encryption of already encrypted traffic over point-to-point virtual private networks for lateral movement protection from ransomware | |
Haider et al. | Data security and privacy in fog computing applications | |
KR101237376B1 (en) | Integrated security control System and Method for Smartphones | |
Copeland et al. | Securing enterprise mobile information | |
CN106598713A (en) | Secure dynamic virtual machine migration method and system | |
Kumar | Intrusion detection and prevention system in enhancing security of cloud environment | |
Sharma et al. | Review Of Cloud Computing Data Security And Threats | |
Raza et al. | A review on security issues and their impact on hybrid cloud computing environment | |
Abro | Mobile networks security landscape | |
Jiang et al. | Research on Edge Computing Security Defense of Information Energy System | |
Mishra | A review of cloud security solutions: Leveraging machine learning and deep learning techniques | |
Mahalakshmi | Assessment on security issues and classification in cloud computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210706 |