Terminals and their access represent a vulnerable aspect in the security framework of 5G-railway(5G-R)system.To enhance the control of 5G-R terminals and their access to applications,this paper analyzes the applicatio...Terminals and their access represent a vulnerable aspect in the security framework of 5G-railway(5G-R)system.To enhance the control of 5G-R terminals and their access to applications,this paper analyzes the application scenarios,operational modes,services supported by 5G-R terminals,and the data paths between these terminals and the connected railway application service systems.Further analysis concentrates on the security risks posed by the characteristics of intelligent 5G-R handheld terminals,lightweight Internet of Things(IoT)communication terminals,and onboard integrated wireless transmission equipment with public-private convergence.In light of the risks above,this paper presents the terminal security control requirements.Furthermore,based on the planned architecture of the 5G-R system and security technologies such as terminal identity authentication and behavior auditing,the paper proposes a solution package for the 5G-R terminal security control system,including the overall architecture,functional implementation,and interface configuration.These solutions aim to achieve unified control over the admission and access of 5G-R handheld terminals,IoT communication terminals,and onboard integrated wireless communication equipment to railway application systems.Additionally,they enable the security control and analysis of terminal behaviors and application data,facilitate the security management of terminals,and ensure the secure release,download,and installation of mobile applications.展开更多
The development of wireless communication network technology has provided people with diversified and convenient services.However,with the expansion of network scale and the increase in the number of devices,malicious...The development of wireless communication network technology has provided people with diversified and convenient services.However,with the expansion of network scale and the increase in the number of devices,malicious attacks on wireless communication are becoming increasingly prevalent,causing significant losses.Currently,wireless communication systems authenticate identities through certain data identifiers.However,this software-based data information can be forged or replicated.This article proposes the authentication of device identity using the hardware fingerprint of the terminal’s Radio Frequency(RF)components,which possesses properties of being genuine,unique,and stable,holding significant implications for wireless communication security.Through the collection and processing of raw data,extraction of various features including time-domain and frequency-domain features,and utilizing machine learning algorithms for training and constructing a legal fingerprint database,it is possible to achieve close to a 97%recognition accuracy for Fifth Generation(5G)terminals of the same model.This provides an additional and robust hardware-based security layer for 5G communication security,enhancing monitoring capability and reliability.展开更多
文摘Terminals and their access represent a vulnerable aspect in the security framework of 5G-railway(5G-R)system.To enhance the control of 5G-R terminals and their access to applications,this paper analyzes the application scenarios,operational modes,services supported by 5G-R terminals,and the data paths between these terminals and the connected railway application service systems.Further analysis concentrates on the security risks posed by the characteristics of intelligent 5G-R handheld terminals,lightweight Internet of Things(IoT)communication terminals,and onboard integrated wireless transmission equipment with public-private convergence.In light of the risks above,this paper presents the terminal security control requirements.Furthermore,based on the planned architecture of the 5G-R system and security technologies such as terminal identity authentication and behavior auditing,the paper proposes a solution package for the 5G-R terminal security control system,including the overall architecture,functional implementation,and interface configuration.These solutions aim to achieve unified control over the admission and access of 5G-R handheld terminals,IoT communication terminals,and onboard integrated wireless communication equipment to railway application systems.Additionally,they enable the security control and analysis of terminal behaviors and application data,facilitate the security management of terminals,and ensure the secure release,download,and installation of mobile applications.
基金supported by the National Natural Science Foun-dation of China(62271280,62222114,61925109,and 62071428).
文摘The development of wireless communication network technology has provided people with diversified and convenient services.However,with the expansion of network scale and the increase in the number of devices,malicious attacks on wireless communication are becoming increasingly prevalent,causing significant losses.Currently,wireless communication systems authenticate identities through certain data identifiers.However,this software-based data information can be forged or replicated.This article proposes the authentication of device identity using the hardware fingerprint of the terminal’s Radio Frequency(RF)components,which possesses properties of being genuine,unique,and stable,holding significant implications for wireless communication security.Through the collection and processing of raw data,extraction of various features including time-domain and frequency-domain features,and utilizing machine learning algorithms for training and constructing a legal fingerprint database,it is possible to achieve close to a 97%recognition accuracy for Fifth Generation(5G)terminals of the same model.This provides an additional and robust hardware-based security layer for 5G communication security,enhancing monitoring capability and reliability.