信息网络安全 ›› 2020, Vol. 20 ›› Issue (4): 1-11.doi: 10.3969/j.issn.1671-1122.2020.04.001

• 等级保护 • 上一篇    下一篇

5G网络切片安全模型研究

刘建伟, 韩祎然, 刘斌(), 余北缘   

  1. 北京航空航天大学网络空间安全学院,北京 100191
  • 收稿日期:2019-10-23 出版日期:2020-04-10 发布日期:2020-05-11
  • 通讯作者: 刘斌 E-mail:liubin12sun@163.com
  • 作者简介:

    作者简介:刘建伟(1964—),男,山东,教授,博士,主要研究方向为网络与信息安全、通信网络安全、密码学、信道编码技术等;韩祎然(1997—),女,辽宁,硕士研究生,主要研究方向为网络空间安全;刘斌(1995—),男,河南,硕士研究生,主要研究方向为5G网络接入认证与密钥协商协议;余北缘(1996—),男,北京,博士研究生,主要研究方向为物联网安全。

  • 基金资助:
    国家自然科学基金[61972018]

Research on 5G Network Slicing Security Model

LIU Jianwei, HAN Yiran, LIU Bin(), YU Beiyuan   

  1. School of Cyber Science and Technology, Beihang University, Beijing 100191, China
  • Received:2019-10-23 Online:2020-04-10 Published:2020-05-11
  • Contact: Bin LIU E-mail:liubin12sun@163.com

摘要:

随着5G通信时代的到来,网络切片技术将与垂直行业深度融合,为用户提供更丰富的移动互联网和物联网业务。然而,网络切片技术的引入带来许多新的安全隐患与挑战,部分原有的安全防护技术不再适用。此外,各类切片的不同特点使得原有的安全服务无法满足网络切片中的不同需求。因此,研究网络切片技术存在的安全问题以及相应的应对策略并提出新的安全策略,是保障实现5G网络安全的关键所在。文章首先从网络切片的架构、管理模型和实现技术3个方面阐述了网络切片技术现存的安全问题;然后针对这些安全问题提出了维护切片安全的相关措施;最后建立了一个网络切片安全模型,为5G网络切片提供差异化的安全服务。

关键词: 网络切片, 物联网, 网络切片架构, 管理模型, 网络安全

Abstract:

With the advent of the 5G communication era, network slicing technology will be deeply integrated with vertical industries to provide users with richer mobile Internet and IoT services. However, the introduction of network slicing technology brings many new security risks and challenges, and some of the original security protection technologies are no longer applicable. In addition, the different characteristics of various slices make the original security services unable to meet the different needs of network slices. Therefore, studying the security problems and corresponding countermeasures of network slicing technology and proposing new security policies are the key to guarantee the realization of 5G network security. This article first describes the existing security problems of network slicing technology from three aspects of network slicing architecture, management model, and implementation technology, then proposes relevant measures to maintain slice security in response to these security problems. Finally, a network slicing security model is established to provide differentiated security services for 5G network slicing.

Key words: network slicing, Internet of Things, network slicing architecture, management model, cyber security

中图分类号: