Netinfo Security ›› 2020, Vol. 20 ›› Issue (4): 1-11.doi: 10.3969/j.issn.1671-1122.2020.04.001
Previous Articles Next Articles
LIU Jianwei, HAN Yiran, LIU Bin(), YU Beiyuan
Received:
2019-10-23
Online:
2020-04-10
Published:
2020-05-11
Contact:
Bin LIU
E-mail:liubin12sun@163.com
CLC Number:
LIU Jianwei, HAN Yiran, LIU Bin, YU Beiyuan. Research on 5G Network Slicing Security Model[J]. Netinfo Security, 2020, 20(4): 1-11.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2020.04.001
[1] | IMT-2020(5G). 5G Concept White Paper [EB/OL]. , 2018-10-13. |
第五代移动通信技术推进组. 5G概念白皮书[EB/OL]. , 2018-10-13. | |
[2] | 3GPP TR 38.913. Study on Scenarios and Requirements for Next Generation Access Technologies[EB/OL]. , 2019-7-19. |
[3] | IMT-2020(5G). 5G Security Requirements and Architecture White Paper[EB/OL]. , 2018-10-24. |
第五代移动通信技术推进组. 5G安全需求与架构白皮书[EB/OL]. , 2018-10-24. | |
[4] | 3GPP TS 33.501. Security Architecture and Procedures for 5G System (Release 15)[EB/OL]. , 2019-7-19. |
[5] | LIU Jianwei, WANG Yumin.Network Security: Technology and Practice[M]. 3rd editon. Beijing: Tsinghua University Press, 2017. |
刘建伟,王育民.网络安全: 技术与实践[M].第3版.北京:清华大学出版社,2017. | |
[6] | Huawei. 5G Service Guaranteed Network Slicing Whitepaper[EB/OL]. , 2019-2-15. |
[7] | 3GPP TS 33. 512. Access and Mobility Management Function(AMF)[EB/OL]. 2, 2018-11-19. |
[8] | 3GPP TS 33.514.5G Security Assurance Specification(SCAS) for the Unified Data Management(UDM) Network Product Class[EB/OL]. , 2019-7-19. |
[9] | KHAN M, NIEMI V.Concealing IMSI in 5G Network Using Identity Based Encryption[M]// Springer. Network and System Security. Cham: Springer, Cham, 2017: 544-554. |
[10] | 3GPP TS 23. 012. Location Management Procedures(Release 14)[EB/OL]. , 2018-6-22. |
[11] | YAO Shixiong, CHEN Jing, HE Kun, et al.PBCert: Privacy-Preserving Blockchain-based Certificate Status Validation Toward Mass Storage Management[J]. IEEE Access, 2018, 7: 6117-6128. |
[12] | CEBE M, AKKAYA K. Efficient Certificate Revocation Management Schemes for IoT-based Advanced Metering Infrastructures in Smart Cities[EB/OL]. , 2019-7-19. |
[13] | Huawei. 5G Security Architecture White Paper[EB/OL]. , 2019-3-17. |
华为. 5G安全架构白皮书[EB/OL]. ,2019-3-17. | |
[14] | 3GPP TR 38. 802. Study on New Radio Access Technology Physical Layer Aspects(release 14)[EB/OL]. , 2017-9-26. |
[15] | LIU Caixia, HU Xinxin, LIU Shuxin, et al.Security Analysis of 5G Network EAP-AKA’ Protocol Based on Lowe’s Taxonomy[J]. Journal of Electronics & Information Technology, 2019, 41(8): 1800-1807. |
刘彩霞,胡鑫鑫,刘树新,等.基于Lowe分类法的5G网络EAP-AKA’协议安全性分析[J].电子与信息学报,2019,41(8):1800-1807. | |
[16] | BORDEL B, ORUE A B, ALCARRIA R, et al.An IntraSlice Security Solution for Emerging 5G Networks Based on Pseudo-Random Number Generators[J]. IEEE Access, 2018, 7: 16149-16164. |
[17] | FU Yulong, ZHENG Yan, LI Hui.A Secure SDN-based Multi-RANs Architecture for Future 5G Networks[J]. Computers & Security, 2017, 70(9): 648-662. |
[18] | 3GPP TS 23. 501. System Architecture for the 5G System[EB/OL]. , 2019-7-19. |
[19] | SATTAR D, MATRAWY A.Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices[C]//IEEE. Conference on Communications and Network Security, June 10-12, 2019, Washington, USA. New York: IEEE, 2019: 82-90. |
[20] | KHETTAB Y, BAGAA M, LEONEL D, et al.Virtual Security as a Service for 5G Verticals[C]//IEEE. Wireless Communications and Networking IEEE Conference, April 15-18, 2018, Barcelona, Spain. New York: IEEE, 2018: 1-6. |
[21] | KOTULSKI Z, NOWAK T W, SEPCZUK M, et al. Graph-based Quantitative Description of Networks’ Slices Isolation[EB/OL]. , 2019-7-19. |
[22] | HU Xinxin, LIU Caixia, LIU Shuxin, et al.Signalling Security Analysis: Is HTTP/2 Secure in 5G Core Network?[C]//IEEE. 10th International Conference on Wireless Communications and Signal Processing, October 18-20, 2018, Hangzhou, China. New York: IEEE, 2018: 1-6. |
[23] | SATHI V N, SRINIVASAN M, THIRUVASAGAM P K, et al.A Novel Protocol for Securing Network Slice Component Association and Slice Isolation in 5G Networks[C]//MSWiM. The 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, October 28-November 2, 2018, Montreal, QC, Canada. New York: ACM, 2018: 249-253. |
[24] | HE Jialing, ZHANG Zijian, LI Meng, et al.Provable Data Integrity of Cloud Storage Service with Enhanced Security in the Internet of Things[J]. IEEE Access, 2018, 7: 6226-6239. |
[25] | IMT-2020(5G). AI-based Intelligent Slice Management and Collaboration White Paper [EB/OL]. , 2019-3-21. |
第五代移动通信技术推进组. 基于AI的智能切片管理和协同白皮书[EB/OL]. , 2019-3-21. | |
[26] | 3GPP TS 28.530. Management and Orchestration; Concepts, Use Cases and Requirements[EB/OL]. ,2019-9-25. |
[27] | 3GPP TR 33.813. Study on Security Aspects of Enhanced Network Slicing(Rel-16)[EB/OL]. , 2019-9-25. |
[28] | NI Jianbing, LIN Xiaodong, SHEN X S.Efficient and Secure Service-oriented Authentication Supporting Network Slicing for 5G-Enabled IoT[J]. IEEE Journal on Selected Areas in Communications, 2018, 36(3): 644-657. |
[29] | WANG Xiaolei.Research on Virtual Resource Management Technology of 5G Network Slice[D]. Zhengzhou: Information Engineering University, 2018. |
王晓雷. 5G网络切片的虚拟资源管理技术研究[D].郑州:战略支援部队信息工程大学,2018. | |
[30] | 3GPP TS 28.531. Management and Orchestration; Provisioning[EB/OL]. ,2019-6-12. |
[31] | 3GPP TR 22.862. Technical Specification Group Services and System Aspects; Feasibility Study on New Services and Markets Technology Enablers for Critical Communications; Stage 1(Rel 14)[EB/OL]. ,2016-3-9. |
[32] | BANNOUR F, SOUIHI S, MELLOUK A.Distributed SDN Control: Survey, Taxonomy, and Challenges[J]. IEEE Communications Surveys & Tutorials, 2018, 20(1): 333-354. |
[33] | ETSI GS NFV-SEC 012. Network Functions Virtualisation(NFV) Release 3; Security; System Architecture Specification for Execution of Sensitive NFV Components[EB/OL]. ,2017-1-1. |
[34] | YAO Jiaying, HAN Zhigeng, SOHAIL M, et al.A Robust Security Architecture for SDN-based 5G Networks[J]. Future Internet, 2019, 11(4): 338-346. |
[35] | KIM H, PARK P, RYOU J.Auto-configurable Security Mechanism for NFV[J]. TIIS, 2018, 12(2): 786-799. |
[36] | CCID Think Tank Radio Management Institute. Research Report on the Top 10 Application Segments of 5G [EB/OL]. , 2019-4-17. |
赛迪智库无线电管理研究所. 5G十大细分应用场景研究报告[EB/OL]. , 2019-4-17. | |
[37] | CAICT. AR / VR White Paper[EB/OL]. , 2019-5-8. |
中国信息通信研究院. AR/VR白皮书[EB/OL]. , 2019-5-8. | |
[38] | HSIAO T C, HUANG Yumin, CHUNG Y F, et al.Efficient Hierarchical Key Management Scheme for VR/AR Database Systems[J]. International Journal of Network Security, 2019, 22(4): 551-555. |
[39] | CCID Research Institute. White Paper on the Development of China Ultra HD Video Industry[EB/OL]. , 2019-5-19. |
赛迪研究院. 中国超高清视频产业发展白皮书[EB/OL]. ,2019-5-19. | |
[40] | CAICT. Internet of Vehicles White Paper[EB/OL]. , 2019-5-26. |
中国信息通信研究院. 车联网白皮书[EB/OL]. , 2019-5-26. | |
[41] | TIMO VAN ROERMUND. In-Vehicle Networks and Security. Automotive Systems and Software Engineering[EB/OL]. , 2019-7-18. |
[42] | IMT-2020(5G). 5G Drone Application White Paper[EB/OL]. , 2019-6-3. |
第五代移动通信技术推进组. 5G无人机应用白皮书[EB/OL]. , 2019-6-3. | |
[43] | Internet Healthcare Industry Alliance. White Paper on Smart Healthcare in the 5G Era[EB/OL]. , 2019-6-23. |
互联网医疗健康产业联盟. 5G时代智慧医疗健康白皮书[EB/OL]. , 2019-6-23. | |
[44] | LÜ Denglong, ZHU Shibing, LIU Ran. Research on Big Data Security Storage Based on Compressed Sensing[EB/OL]. , 2019-1-11. |
[45] | Huawei. 5G Network Slicing for Vertical Industries[EB/OL]. , 2019-7-10. |
[46] | IMT-2020(5G). M2M Task Force Technical Report[EB/OL]. , 2019-6-20. |
第五代移动通信技术推进组. M2M专题组技术报告[EB/OL]. ,2019-6-20. | |
[47] | China Mobile Communications Corporation. 5G Smart City White Paper[EB/OL]. , 2019-7-18. |
中国移动通信集团公司. 5G智慧城市白皮书[EB/OL]. , 2019-7-18. | |
[48] | China Mobile Communications Corporation. China Mobile Edge Computing White Paper[EB/OL]. , 2019-6-27. |
中国移动通信集团公司. 中国移动边缘计算白皮书[EB/OL]. ,2019-6-27. | |
[49] | CSHIA, CAICT. China Smart Home Development White Paper[EB/OL]. , 2019-7-28. |
中国智能家居产业联盟,中国信息通信研究院. 中国智能家居发展白皮书[EB/OL]. , 2019-7-28. | |
[50] | WHITEHURST L N, ANDEL T R, MCDONALD J T.Exploring Security in ZigBee Networks[C]//CISR. The 9th Annual Cyber and Information Security Research Conference, April 8-10, 2014, Oak Ridge, Tennessee, USA. New York: ACM, 2014: 25-28. |
[51] | Huawei. Smart Security Open Architecture and Ecological White Paper[EB/OL]. , 2019-8-26. |
华为. 智能安防开放架构与生态白皮书[EB/OL]. ,2019-8-26. | |
[52] | SIGWELE T, PILLAI P, SANGODOYIN A, et al.Security Aware Virtual Base Station Placement in 5G Cloud Radio Access Networks[C]//WISATS. International Conference on Wireless and Satellite Systems, September 14-15, 2017, Oxford, UK. Cham:Springer, Cham, 2017: 3-10. |
[53] | CAICT. Artificial Intelligence Security White Paper[EB/OL]. , 2019-9-26. |
中国信息通信研究院. 人工智能安全白皮书[EB/OL]. , 2019-9-26. |
[1] | LANG Weimin, ZHANG Han, ZHAO Yifeng, YAO Jinfang. A Blockchain-based Behavior Regulation and Activities Management Scheme for Internet of Things [J]. Netinfo Security, 2020, 20(2): 22-29. |
[2] | Liangchen CHEN, Baoxu LIU, Shu GAO. Research on Traffic Data Sampling Technology in Network Attack Detection [J]. Netinfo Security, 2019, 19(8): 22-28. |
[3] | A-yong YE, Junlin JIN, Lingyu MENG, Ziwen ZHAO. Research on Access Control for Privacy Protection of Mobile Terminals [J]. Netinfo Security, 2019, 19(8): 51-60. |
[4] | Yitao NI, Yongjia CHEN, Bogang LIN. Automatic De-obfuscation-based Malicious Webpages Detection [J]. Netinfo Security, 2019, 19(4): 37-46. |
[5] | Liangchen CHEN, Shu GAO, Baoxu LIU, Zhigang LU. Research Status and Development Trends on Network Encrypted Traffic Identification [J]. Netinfo Security, 2019, 19(3): 19-25. |
[6] | Jian ZHANG, Bohan CHEN, Liangyi GONG, Zhaojun GU. Research on Malware Detection Technology Based on Image Analysis [J]. Netinfo Security, 2019, 19(10): 24-31. |
[7] | Qiongqiong DUAN, Dinghua XIANG, Hongzhou SHI. Design on the Blockchain-based Authentication for Smart Objects [J]. Netinfo Security, 2018, 18(9): 95-101. |
[8] | Na ZHAO, Hui LONG, Jinshu SU. A Scheme for Anonymous Authentication and Privacy Protection in the Internet of Things Environment [J]. Netinfo Security, 2018, 18(11): 1-7. |
[9] | Fulong CHEN, Ziyang ZHANG, Taochun WANG, Dong XIE. A Kind of Secure Identity Authentication Method Based on Contact Signals for Internet of Things [J]. Netinfo Security, 2018, 18(11): 40-48. |
[10] | Yanan CHEN, Qian MEI, Hu XIONG, Weixiang XU. Certificateless Parallel Key-insulated Signature for Industrial Internet of Things [J]. Netinfo Security, 2018, 18(10): 1-9. |
[11] | Hong FAN, Hua SHAO, Haitao LI. Implementation and Application of Internet of Things Security Technology [J]. Netinfo Security, 2017, 17(9): 38-41. |
[12] | Kuo ZHAO, Yongheng XING. Security Survey of Internet of Things Driven by Block Chain Technology [J]. Netinfo Security, 2017, 17(5): 1-6. |
[13] | Qiang HUANG, Gaojian WANG, Wenzhi MI, Lunwei WANG. Centralized and Unified Trusted Computing Platform Management Model and Its Application [J]. Netinfo Security, 2017, 17(4): 9-14. |
[14] | Liping XU, Wenjiang HAO. Analysis and Enlightenment of US Government and Enterprise Cyber Threat Intelligence [J]. Netinfo Security, 2016, 16(9): 278-284. |
[15] | Kunlun PENG, Wei PENG, Dongxia WANG, Qianqian XING. Research Survey on Security Issues in Cyber-Physical Systems [J]. Netinfo Security, 2016, 16(7): 20-28. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||