CN113079163A - 5G smart city safety framework - Google Patents

5G smart city safety framework Download PDF

Info

Publication number
CN113079163A
CN113079163A CN202110359714.1A CN202110359714A CN113079163A CN 113079163 A CN113079163 A CN 113079163A CN 202110359714 A CN202110359714 A CN 202110359714A CN 113079163 A CN113079163 A CN 113079163A
Authority
CN
China
Prior art keywords
security
layer
unit
network
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110359714.1A
Other languages
Chinese (zh)
Inventor
廉明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Changtai Information Security Service Co ltd
Original Assignee
Anhui Changtai Information Security Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Changtai Information Security Service Co ltd filed Critical Anhui Changtai Information Security Service Co ltd
Priority to CN202110359714.1A priority Critical patent/CN113079163A/en
Publication of CN113079163A publication Critical patent/CN113079163A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a 5G smart city security architecture, which is a five-layer architecture; the five-layer architecture comprises: the system comprises an application security layer, an industry platform/technology middle platform security layer, a network security layer, an edge computing security layer and a terminal security layer. The application security layer is used for guaranteeing the security of the application account and the application software; the industry platform/technology middle platform safety layer is used for guaranteeing safe and stable operation of the industry platform and the technology middle platform; the network security layer is used for protecting the security of the network; the edge computing security layer is used for preventing intrusion and damage of an external network to an edge computing network; and the terminal security layer is used for guaranteeing the communication security. By adopting the 5G smart city security architecture provided by the invention, the security problem of a 5G smart city system can be reduced, and the data security and privacy of users and enterprises can be effectively protected.

Description

5G smart city safety framework
Technical Field
The invention relates to the field of smart city security, in particular to a 5G smart city security architecture.
Background
According to the definition of ISO (International organization for standardization), the smart city effectively integrates a physical system, a digital system and a human system in an established environment, thereby providing a sustainable, prosperous and inclusive comprehensive environment system for citizens.
The smart city utilizes the information technology, promotes the fusion of information space, physical space and social space in the city, accelerates the economic development and transformation of the city through rich application systems, improves the efficiency of governments and public services, facilitates the working and living of citizens, effectively protects and utilizes the environment, and realizes the harmonious development of the economy, the society and the environment.
However, 5G brings new safety risks while injecting new power to smart city development. For example, in different layers of a 5G smart city, security problems exist in a terminal layer, an edge computing layer, a network layer, a platform layer, an application layer and the like. For a terminal layer of a 5G smart city, safety requirements mainly include that the terminal per se is well reinforced and protected in terms of software and hardware, and damage or information stealing caused by external invasion to the terminal is avoided; for a 5G smart city edge computing layer, the damage to equipment systems in an edge computing site caused by intrusion from an external network needs to be prevented; for a 5G smart city network layer, security requirements mainly include RAN base station air interface, bearer network, 5GC and 5G slice security; for a 5G smart city platform layer, the intrusion of channels such as a network or API (application programming interface) interface call and the like into an application platform and a technical middle platform system needs to be prevented; for the 5G smart city application layer, data security and application system security are concerned. Therefore, how to construct a security architecture of a 5G smart city becomes an urgent problem to be solved.
Disclosure of Invention
The invention aims to provide a 5G smart city safety architecture to solve the safety problem of a 5G smart city.
In order to achieve the purpose, the invention provides the following scheme:
A5G smart city security architecture, the 5G smart city security architecture is a five-layer architecture; the five-layer architecture comprises: the system comprises an application security layer, an industry platform/technology middle platform security layer, a network security layer, an edge computing security layer and a terminal security layer.
The application security layer is used for guaranteeing the security of the application account and the application software; after the safety of the account and the software is determined, the terminal safety layer is used for guaranteeing the communication safety and sending the bottom data to the edge computing safety layer safely; the edge computing security layer is used for preventing intrusion and damage of an external network to an edge computing network, carrying out secure storage and computation on received data and then sending the data to the industry platform/technology middle platform security layer; the industry platform/technology middle platform safety layer is used for guaranteeing safe and stable operation of the industry platform and the technology middle platform; the network security layer is used for protecting the security of the 5G network.
Further, the application security layer includes:
the identity management unit is used for identity management of each user;
the access control unit is used for managing the authentication mode and the access authority of each user;
the data security unit is used for protecting confidentiality, integrity and usability of sensitive data of industries and users;
a service security unit for preventing malicious misuse of the service itself;
and the application reinforcement unit is used for regularly and safely reinforcing the application software system.
Further, the industry platform/technology middleware security layer comprises:
the API interface safety unit is used for ensuring the safety of various API calls, information acquisition and transmission and operation instruction transmission among network elements;
the platform infrastructure safety unit is used for ensuring the safety of the bottom layer of the platform infrastructure;
and the disaster recovery backup unit is used for backing up the data of the key industry platform and the key technology platform.
Further, the network security layer includes: the system comprises a base station air interface side safety unit, a bearer network safety unit, a 5GC core network safety unit and a 5G slice safety unit.
Furthermore, the base station air interface side security unit solves the problem of user data eavesdropping and tampering of the air interface by starting the SUCI encryption and the encryption function of the air interface PDCP layer data packet; by deploying a DDOS detection defense system, when DDOS large-flow attack occurs, the base station performs some current-limiting control to solve the problem of air interface DDOS attack from UE; the problem of malicious interference of other attack sources to an air interface is solved by deploying a unified pseudo base station detection system and a spectrum interference detection system in the whole network.
Furthermore, the bearer network security unit solves the confidentiality and integrity problems of the network data message by deploying IPSEC security encryption; the BGP routing hijacking attack problem is solved by configuring MD5 authentication or SSL encryption security measures.
Furthermore, the 5GC core network security unit defends various possible security threats from the outside of the data center by intensively deploying security measures such as a firewall, a sandbox, a WAF and an IPS at the exit boundary of the 5GC telecommunication cloud data center; the safety of the I-layer cloud infrastructure of the telecommunication cloud is guaranteed through measures in aspects of VDC and VPC resource isolation, Hypervisor safety monitoring, vulnerability scanning of an operating system database and the like; the safety problem of the 5GC network element is solved by installing a safety component which runs internally on the network element system, monitoring the running condition of the network element and other measures.
Furthermore, the 5G slice security unit can access the corresponding network slice only through the double authentication and authorization of the slice user (government agency, industrial and mining enterprise) and the 5G network operator, thereby ensuring the legal access of the slice and the legal use of slice resources and realizing the security guarantee of the 5G network slice.
Further, the edge computing security layer includes:
the boundary protection unit is used for deploying a firewall at an external interface of the UPF equipment to realize boundary isolation protection;
the edge computing cloud infrastructure security unit is used for ensuring the bottom layer security of the edge computing network;
for the safety of edge computing, firstly, the intrusion and the damage of an edge computing network from an external network are avoided through the boundary protection unit; and then, the safety of the edge computing cloud infrastructure is ensured through the edge computing cloud infrastructure safety unit, so that the safety of the edge computing network is realized.
Further, the terminal security layer includes:
the communication security unit is used for encrypting the communication data end to end; the APP safety unit is used for carrying out vulnerability scanning and safety reinforcement on the APP software of the terminal;
firstly, the APP security unit scans software to avoid the intrusion damage of a terminal caused by the vulnerability of the application software, and then the communication security unit encrypts the terminal of communication data to prevent the communication data of the terminal from being intercepted or tampered.
The invention has the beneficial effects that: the invention provides a 5G smart city security architecture, which realizes that the terminal of a 5G smart city is not easy to be invaded and invaded by hackers through a terminal security layer; by the edge computing security layer, physical attack in a 5G smart city system and cross-network penetration and cross infection of network attack are avoided; the safety of the 5G network is protected through the network safety layer; the industrial confidential data and the data privacy of the user are guaranteed through an industrial platform/technical middle platform security layer; through the application of the security layer, unauthorized access caused by illegal access is avoided, and the security of an application system is guaranteed. According to the invention, the safety risk of the 5G smart city system is reduced by applying the safety layer, the industry platform/technology middle platform safety layer, the network safety layer, the edge calculation safety layer and the terminal safety layer.
Drawings
FIG. 1 is a diagram of a 5G smart city security hierarchy according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments. The embodiments of the present invention have been presented for purposes of illustration and description, and are not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Example 1
Fig. 1 is a 5G smart city security architecture diagram provided in the present invention, as shown in fig. 1, a 5G smart city security architecture, wherein the 5G smart city security architecture is a five-layer architecture; the five-layer architecture comprises: the system comprises an application security layer 1, an industry platform/technology middle platform security layer 2, a network security layer 3, an edge calculation security layer 4 and a terminal security layer 5.
The application security layer 1 is used for ensuring the security of the application account and the application software; after the safety of the account and the software is determined, the terminal safety layer 5 is used for guaranteeing the communication safety and sending the bottom data to the edge computing safety layer 4 safely; the edge computing security layer 4 is used for preventing intrusion and damage of an external network to an edge computing network, performing secure storage and computation on received data, and then sending the data to the industry platform/technology middle platform security layer 2; the industry platform/technology middle platform safety layer 2 is used for guaranteeing safe and stable operation of the industry platform and the technology middle platform; the network security layer 3 is used to secure the 5G network itself.
Example 2
In a 5G smart city system, each application system is usually configured with a plurality of user accounts of different categories and different authority levels. Especially for some applications of 5G smart cities, services are provided for the industry and the public in the vast society, so that the guarantee of the safety of an application layer is very important.
In this embodiment, the application security layer 1 includes:
an identity management unit 6 for identity management of each user;
an access control unit 7 for managing an authentication method and access authority of each user;
the data security unit 8 is used for protecting the confidentiality, integrity and availability of sensitive data of industries and users;
a service security unit 9 for preventing malicious misuse of the service itself;
the application reinforcement unit 10 is used for regularly and safely reinforcing the application software system;
firstly, performing behavior analysis and flow analysis on the smart city service implementation through the service security unit 9; the role of each user (e.g. system administrator, ordinary external user) is then clearly defined by said identity management unit 6 and said access control unit 7; then, the data security unit 8 encrypts and stores the data and processes the data anonymization; finally, the reinforcement unit 10 is applied to perform periodic vulnerability scanning and security reinforcement on the system.
Example 3
In the 5G smart city system, in order to avoid data leakage and tampering of an industry application platform and an IT middle desk and guarantee confidentiality, integrity and availability of the data, some measures in data security can be deployed, such as data encryption storage, data anonymization processing, data security deletion, regular backup of the data and the like.
In this embodiment, the industry platform/technology midplatform security layer 2 includes:
the API interface safety unit 11 is used for ensuring the safety of various API calls, information acquisition and transmission and operation instruction transmission among network elements;
a platform infrastructure security unit 12 for securing a bottom layer of the platform infrastructure;
the disaster recovery backup unit 13 is used for backing up data of key industry platforms and technical platforms;
firstly, the platform infrastructure security unit 12 reinforces and guarantees the security of the cloud infrastructure base through resource isolation and security scanning of an operating system database, and then for the security of a communication interface, an attacker is prevented from invading and stealing sensitive data through the communication interface between machines and machines by adopting interface authentication and other modes through the API interface security unit 11.
Example 4
In this embodiment, the network security layer 3 includes: a base station air interface side security unit 14, a bearer network security unit 15, a 5GC core network security unit 16 and a 5G slice security unit 17.
Specifically, for an air interface between a 5G UE terminal and a base station, the security threats faced by the air interface mainly include user data eavesdropping and tampering of the air interface, an air interface DDOS attack from the UE, and malicious interference of a pseudo base station or other attack sources on the air interface.
Aiming at the safety problem, the base station air interface side safety 14 solves the problem of user data eavesdropping and tampering of the air interface by starting the SUCI encryption and the encryption function of the air interface PDCP layer data packet; by deploying a DDOS detection defense system, when DDOS large-flow attack occurs, the base station performs some current-limiting control to solve the problem of air interface DDOS attack from UE; the problem of malicious interference of other attack sources to an air interface is solved by deploying a unified pseudo base station detection system and a spectrum interference detection system in the whole network.
Specifically, for the security of the bearer network, the confidentiality and integrity problems of the network data packet and the BGP route hijacking attack problem are faced.
Aiming at the safety problem, the bearer network safety unit 15 solves the confidentiality and integrity problems of the network data message by deploying IPSEC safety encryption; the BGP routing hijacking attack problem is solved by configuring MD5 authentication or SSL encryption security measures.
Specifically, for the security of a 5GC core network, the security problems mainly face to the border security of a 5GC telecommunication cloud data center, the security of a telecommunication cloud I-layer cloud infrastructure, and the security of a 5GC network element itself.
Aiming at the security problem, the 5GC core network security unit 16 centrally deploys security measures such as a firewall, a sandbox, a WAF and an IPS at the exit boundary of the 5GC telecommunication cloud data center to defend various possible security threats coming from the outside of the data center; the safety of the I-layer cloud infrastructure of the telecommunication cloud is guaranteed through measures in aspects of VDC and VPC resource isolation, Hypervisor safety monitoring, vulnerability scanning of an operating system database and the like; the safety problem of the 5GC network element is solved by installing a safety component which runs internally on the network element system, monitoring the running condition of the network element and other measures.
Specifically, for 5G slice security, the 5G slice security unit 17 can access the corresponding network slice only through double authentication and authorization of the slice user (government agency, industrial and mining enterprise) and the 5G network operator, so as to ensure legal access of the slice and legal use of slice resources, thereby ensuring 5G network slice security.
Example 5
In the 5G era, due to popularization and application of delay sensitive services such as industrial manufacturing, AR/VR, automatic driving and the like, a large number of mobile edge computing clouds are deployed. In order to avoid cross-network penetration and cross-infection of physical attacks and network attacks, attention needs to be paid to security management and control of the mobile edge computing cloud and isolation between the enterprise network and the operator 5G network.
In this embodiment, the edge calculation security layer 4 includes:
the boundary protection unit 18 is used for deploying a firewall at an external interface of the UPF equipment to realize boundary isolation protection;
the edge computing cloud infrastructure security unit 19 is used for ensuring the bottom layer security of the edge computing network;
for the security of edge computing, firstly, the edge computing network is prevented from being invaded and damaged by an external network through the boundary protection unit 18; and then, the security of the edge computing cloud infrastructure is ensured by the edge computing cloud infrastructure security unit 19, so that the security of the edge computing network is realized.
Example 6
The number of terminals of the 5G smart city is large, the distribution range is wide, the software is relatively uncontrollable, and the intelligent city is easy to invade and trap by hackers.
In this embodiment, the terminal security layer 5 includes:
a communication security unit 20 for performing end-to-end encryption on communication data;
and the APP safety unit 21 is used for implementing vulnerability scanning and safety reinforcement on the APP software of the terminal.
In order to guarantee the security of the terminal communication service, the APP security unit 21 is used for periodically scanning software to prevent the terminal from being damaged by intrusion due to the vulnerability of the application software, and then the communication security unit 20 is used for encrypting the terminal of the communication data to prevent the communication data of the terminal from being intercepted or tampered.
It is to be understood that the described embodiments are merely a few embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by one of ordinary skill in the art and related arts based on the embodiments of the present invention without any creative effort, shall fall within the protection scope of the present invention. It is to be understood that the described embodiments are merely a few embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by one of ordinary skill in the art and related arts based on the embodiments of the present invention without any creative effort, shall fall within the protection scope of the present invention.

Claims (6)

1. A5G smart city security architecture, comprising: the system comprises an application security layer (1), an industry platform/technology middle platform security layer (2), a network security layer (3), an edge calculation security layer (4) and a terminal security layer (5);
the application security layer (1) is used for ensuring the security of the application account and the application software; after the safety of the account and the software is determined, the terminal safety layer (5) is used for guaranteeing the communication safety and sending bottom data to the edge computing safety layer (4) safely; the edge computing security layer (4) is used for preventing intrusion and damage of an external network to the edge computing network, carrying out secure storage and computation on received data and then sending the data to the industry platform/technology middle platform security layer (2); the industry platform/technology middle platform safety layer (2) is used for guaranteeing safe and stable operation of the industry platform and the technology middle platform; the network security layer (3) is used for protecting the security of the 5G network.
2. The 5G smart city security architecture as claimed in claim 1, wherein the application security layer (1) comprises:
an identity management unit (6) for identity management of each user;
an access control unit (7) for managing an authentication method and access authority of each user;
a data security unit (8) for protecting confidentiality, integrity and availability of industry and user sensitive data;
a service security unit (9) for preventing malicious misuse of the service itself;
the application reinforcement unit (10) is used for regularly and safely reinforcing the application software system;
firstly, performing behavior analysis and flow analysis on the smart city service implementation through the service security unit (9); the role of each user is then clearly defined by the identity management unit (6) and the access control unit (7); then, the data is encrypted and stored and processed in an anonymization way through a data security unit (8); and finally, applying a reinforcing unit (10) to carry out periodical vulnerability scanning and security reinforcing on the system.
3. The 5G smart city security architecture as claimed in claim 1, wherein the industry platform/technology middleware security layer (2) comprises:
the API interface safety unit (11) is used for ensuring the safety of various API calls, information acquisition and transmission and operation instruction transmission among network elements;
a platform infrastructure security unit (12) for securing a bottom layer of the platform infrastructure;
and the disaster recovery backup unit (13) is used for backing up the data of the key industry platform and the key technology platform.
The platform infrastructure security unit (12) guarantees the security of the cloud infrastructure base, and then an attacker is prevented from invading and stealing sensitive data through the communication interface between the machine and the machine through the API interface security unit (11).
4. The 5G smart city security architecture as claimed in claim 1, wherein the network security layer (3) comprises: a base station air interface side security unit (14), a bearer network security unit (15), a 5GC core network security unit (16) and a 5G slice security unit (17).
5. The 5G smart city security architecture as claimed in claim 1, wherein the edge computing security layer (4) comprises:
the boundary protection unit (18) is used for deploying a firewall at an external interface of the UPF equipment to realize boundary isolation protection;
an edge computing cloud infrastructure security unit (19) for securing the bottom layer security of the edge computing network;
firstly, the boundary protection unit (18) is used for avoiding the invasion and damage of an edge computing network from an external network; and then the safety of the edge computing cloud infrastructure is ensured through the edge computing cloud infrastructure safety unit (19), so that the safety of the edge computing network is realized.
6. The 5G smart city security architecture as claimed in claim 1, wherein the terminal security layer (5) comprises: a communication security unit (20) for encrypting communication data end to end; the APP security unit (21) is used for carrying out vulnerability scanning and security reinforcement on the APP software of the terminal;
firstly, the APP security unit (21) scans software to avoid the intrusion damage of the terminal caused by the vulnerability of the application software, and then the communication security unit (20) encrypts the terminal of the communication data to prevent the communication data of the terminal from being intercepted or tampered.
CN202110359714.1A 2021-04-02 2021-04-02 5G smart city safety framework Pending CN113079163A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110359714.1A CN113079163A (en) 2021-04-02 2021-04-02 5G smart city safety framework

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110359714.1A CN113079163A (en) 2021-04-02 2021-04-02 5G smart city safety framework

Publications (1)

Publication Number Publication Date
CN113079163A true CN113079163A (en) 2021-07-06

Family

ID=76614838

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110359714.1A Pending CN113079163A (en) 2021-04-02 2021-04-02 5G smart city safety framework

Country Status (1)

Country Link
CN (1) CN113079163A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113596026A (en) * 2021-07-29 2021-11-02 电子科技大学 Physical layer secure transmission method based on multiple channels
CN114143348A (en) * 2021-11-30 2022-03-04 中国电力科学研究院有限公司 Electric power Internet of things security defense method and system, storage medium and server
CN114301739A (en) * 2021-12-29 2022-04-08 北京国家新能源汽车技术创新中心有限公司 Central gateway security architecture, system and storage medium
CN115955674A (en) * 2023-03-10 2023-04-11 中国人民解放军军事科学院战争研究院 Mobile communication secrecy method and system for border prevention and control network

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105337971A (en) * 2015-10-20 2016-02-17 上海电机学院 Electric power information system cloud safety guarantee system and implementation method thereof
CN105871876A (en) * 2016-05-05 2016-08-17 云神科技投资股份有限公司 Smart city cloud security architecture building method
CN107483530A (en) * 2017-06-14 2017-12-15 广州宏和网络科技有限公司 A kind of smart city system and its implementation based on cloud computing and Internet of Things
CN109347847A (en) * 2018-11-01 2019-02-15 广东粤迪厚创科技发展有限公司 A kind of smart city security assurance information system
US20190273783A1 (en) * 2016-08-10 2019-09-05 Chengdu Qinchuan Iot Technology Co., Ltd. Smart City System Architecture
CN110335187A (en) * 2019-06-18 2019-10-15 国家信息中心 A kind of smart city operating system
CN110378827A (en) * 2019-07-26 2019-10-25 王永德 A kind of smart city service architecture device based on nformation grid service
CN111223195A (en) * 2020-01-16 2020-06-02 弘道(深圳)物联科技有限公司 City level wisdom parking system platform

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105337971A (en) * 2015-10-20 2016-02-17 上海电机学院 Electric power information system cloud safety guarantee system and implementation method thereof
CN105871876A (en) * 2016-05-05 2016-08-17 云神科技投资股份有限公司 Smart city cloud security architecture building method
US20190273783A1 (en) * 2016-08-10 2019-09-05 Chengdu Qinchuan Iot Technology Co., Ltd. Smart City System Architecture
CN107483530A (en) * 2017-06-14 2017-12-15 广州宏和网络科技有限公司 A kind of smart city system and its implementation based on cloud computing and Internet of Things
CN109347847A (en) * 2018-11-01 2019-02-15 广东粤迪厚创科技发展有限公司 A kind of smart city security assurance information system
CN110335187A (en) * 2019-06-18 2019-10-15 国家信息中心 A kind of smart city operating system
CN110378827A (en) * 2019-07-26 2019-10-25 王永德 A kind of smart city service architecture device based on nformation grid service
CN111223195A (en) * 2020-01-16 2020-06-02 弘道(深圳)物联科技有限公司 City level wisdom parking system platform

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
IMT-2020(5G)推进组: "5G 智慧城市安全需求与架构白皮书", 《5G 智慧城市安全需求与架构白皮书 *
IMT-2020(5G)推进组安全工作组: "5G智慧城市安全需求与发展建议", 《中国信息界》 *
吕欣等: "智慧城市网络安全体系框架研究", 《信息安全研究》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113596026A (en) * 2021-07-29 2021-11-02 电子科技大学 Physical layer secure transmission method based on multiple channels
CN113596026B (en) * 2021-07-29 2022-04-22 电子科技大学 Physical layer secure transmission method based on multiple channels
CN114143348A (en) * 2021-11-30 2022-03-04 中国电力科学研究院有限公司 Electric power Internet of things security defense method and system, storage medium and server
CN114301739A (en) * 2021-12-29 2022-04-08 北京国家新能源汽车技术创新中心有限公司 Central gateway security architecture, system and storage medium
CN114301739B (en) * 2021-12-29 2023-08-22 北京国家新能源汽车技术创新中心有限公司 Central gateway security architecture, system and storage medium
CN115955674A (en) * 2023-03-10 2023-04-11 中国人民解放军军事科学院战争研究院 Mobile communication secrecy method and system for border prevention and control network

Similar Documents

Publication Publication Date Title
CN113079163A (en) 5G smart city safety framework
Albugmi et al. Data security in cloud computing
Kazim et al. A survey on top security threats in cloud computing
Getov Security as a service in smart clouds--opportunities and concerns
Malik et al. Security framework for cloud computing environment: A review
KR101534307B1 (en) Caused by the use of smart device internal confidential data leakage prevention & trace system and method
Bokhari et al. Security and privacy issues in cloud computing
Sharma et al. Security-as-a-Service from Clouds: A comprehensive Analysis
Lemoudden et al. A Survey of Cloud Computing Security Overview of Attack Vectors and Defense Mechanisms.
Madasu A Research to Study Concerns Regarding the Security of Cloud Computing
Vidhani et al. Security Challenges in 5G Network: A technical features survey and analysis
Alani et al. Security threats in cloud computing
Kostadinov et al. Security policies for wireless and network infrastructure
US11722519B1 (en) System and method for dynamically avoiding double encryption of already encrypted traffic over point-to-point virtual private networks for lateral movement protection from ransomware
Haider et al. Data security and privacy in fog computing applications
KR101237376B1 (en) Integrated security control System and Method for Smartphones
Copeland et al. Securing enterprise mobile information
CN106598713A (en) Secure dynamic virtual machine migration method and system
Kumar Intrusion detection and prevention system in enhancing security of cloud environment
Sharma et al. Review Of Cloud Computing Data Security And Threats
Raza et al. A review on security issues and their impact on hybrid cloud computing environment
Abro Mobile networks security landscape
Jiang et al. Research on Edge Computing Security Defense of Information Energy System
Mishra A review of cloud security solutions: Leveraging machine learning and deep learning techniques
Mahalakshmi Assessment on security issues and classification in cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210706