期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
面向5G资产的统一安全评测模型与体系构建 被引量:8
1
作者 冯泽冰 司培培 《信息安全研究》 2021年第5期436-442,共7页
5G新架构、新技术、新应用的发展对安全提出了新的挑战.一方面,5G引入众多IT技术,资产形态更加复杂多样,网络切片、边缘计算、网络能力开放等技术的应用带来了新的安全威胁,另一方面,5G与垂直行业深度融合,安全要求从“通用安全”向“... 5G新架构、新技术、新应用的发展对安全提出了新的挑战.一方面,5G引入众多IT技术,资产形态更加复杂多样,网络切片、边缘计算、网络能力开放等技术的应用带来了新的安全威胁,另一方面,5G与垂直行业深度融合,安全要求从“通用安全”向“按需安全”转变.为保障5G网络安全,全球移动通信系统协会(GSMA)制定网络设备安全保障框计划(NESAS),通过5G设备安全评估提升安全能力.然而,NESAS主要关注大粒度的5G基站和核心网设备,缺乏对网络运行安全、数据资产安全等方面的评估机制.ARMIT模型从5G网络资产组成和安全威胁出发,构建适用于5G资产和网络运行的安全要求、安全能力评价指标体系和评测方法,为设备企业、运营商等开展5G产品、网络和服务的安全能力评测提供有效的参考. 展开更多
关键词 5G安全 网络安全 风险评估 安全检测 5G威胁
在线阅读 下载PDF
A Survey of Security Issues in Cognitive Radio Networks 被引量:9
2
作者 LI Jianwu feng zebing +1 位作者 feng Zhiyong ZHANG Ping 《China Communications》 SCIE CSCD 2015年第3期132-150,共19页
In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utili... In the last decade,cognitive radio(CR) has emerged as a major next generation wireless networking technology,which is the most promising candidate solution to solve the spectrum scarcity and improve the spectrum utilization.However,there exist enormous challenges for the open and random access environment of CRNs,where the unlicensed secondary users(SUs) can use the channels that are not currently used by the licensed primary users(PUs) via spectrum-sensing technology.Because of this access method,some malicious users may access the cognitive network arbitrarily and launch some special attacks,such as primary user emulation attack,falsifying data or denial of service attack,which will cause serious damage to the cognitive radio network.In addition to the specifi c security threats of cognitive network,CRNs also face up to the conventional security threats,such as eavesdropping,tampering,imitation,forgery,and noncooperation etc..Hence,Cognitive radio networks have much more risks than traditional wireless networks with its special network model.In this paper,we considered the security threats from passive and active attacks.Firstly,the PHY layer security is presented in the view of passive attacks,and it is a compelling idea of using the physical properties of the radio channel to help provide secure wireless communications.Moreover,malicious user detection is introduced in the view of active attacks by means of the signal detection techniques to decrease the interference and the probabilities of false alarm and missed detection.Finally,we discuss the general countermeasures of security threats in three phases.In particular,we discuss the far reaching effect of defensive strategy against attacks in CRNs. 展开更多
关键词 CRNs security physical layer security security capacity active attacks passive attacks
在线阅读 下载PDF
区块链增强无人机蜂群系统安全性分析 被引量:6
3
作者 冯泽冰 芦玥 《信息通信技术与政策》 2020年第2期14-18,共5页
无人机蜂群作战在面对高强度对抗、动态性战场变化时具备规模优势和成本优势,目前已经被全球各国广泛用于军事领域。同时,无人机蜂群系统也成为了网络攻击目标,面临着恶意节点入侵、无人机劫持、无线干扰和数据窃取等安全风险。区块链... 无人机蜂群作战在面对高强度对抗、动态性战场变化时具备规模优势和成本优势,目前已经被全球各国广泛用于军事领域。同时,无人机蜂群系统也成为了网络攻击目标,面临着恶意节点入侵、无人机劫持、无线干扰和数据窃取等安全风险。区块链技术具备非对称加密、链式数据存储、节点协作共识等特点,被研究用于抵御分布式网络攻击威胁的有效技术手段,在一定程度上可以有效增强无人机蜂群的安全性。对目前无人机蜂群系统发展情况和面临的安全风险,以及区块链技术增强无人机蜂群系统安全性的可行性进行了分析和研究,提出了应用区块链技术的一些技术挑战。 展开更多
关键词 无人机蜂群 区块链 网络安全
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部