期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Key Technologies for Security Control of 5G-R Terminal and Application Access
1
作者 MA Jun LIU Chang +2 位作者 LIN Wei LI Hui HAN Xu(Translated) 《Chinese Railways》 2025年第1期3-10,共8页
Terminals and their access represent a vulnerable aspect in the security framework of 5G-railway(5G-R)system.To enhance the control of 5G-R terminals and their access to applications,this paper analyzes the applicatio... Terminals and their access represent a vulnerable aspect in the security framework of 5G-railway(5G-R)system.To enhance the control of 5G-R terminals and their access to applications,this paper analyzes the application scenarios,operational modes,services supported by 5G-R terminals,and the data paths between these terminals and the connected railway application service systems.Further analysis concentrates on the security risks posed by the characteristics of intelligent 5G-R handheld terminals,lightweight Internet of Things(IoT)communication terminals,and onboard integrated wireless transmission equipment with public-private convergence.In light of the risks above,this paper presents the terminal security control requirements.Furthermore,based on the planned architecture of the 5G-R system and security technologies such as terminal identity authentication and behavior auditing,the paper proposes a solution package for the 5G-R terminal security control system,including the overall architecture,functional implementation,and interface configuration.These solutions aim to achieve unified control over the admission and access of 5G-R handheld terminals,IoT communication terminals,and onboard integrated wireless communication equipment to railway application systems.Additionally,they enable the security control and analysis of terminal behaviors and application data,facilitate the security management of terminals,and ensure the secure release,download,and installation of mobile applications. 展开更多
关键词 5G-R 5G-R terminal application access security control communication interface
原文传递
Device authentication for 5G terminals via Radio Frequency
2
作者 Ping Dong Namin Hou +2 位作者 Yuting Tang Yushi Cheng Xiaoyu Ji 《High-Confidence Computing》 2024年第4期23-33,共11页
The development of wireless communication network technology has provided people with diversified and convenient services.However,with the expansion of network scale and the increase in the number of devices,malicious... The development of wireless communication network technology has provided people with diversified and convenient services.However,with the expansion of network scale and the increase in the number of devices,malicious attacks on wireless communication are becoming increasingly prevalent,causing significant losses.Currently,wireless communication systems authenticate identities through certain data identifiers.However,this software-based data information can be forged or replicated.This article proposes the authentication of device identity using the hardware fingerprint of the terminal’s Radio Frequency(RF)components,which possesses properties of being genuine,unique,and stable,holding significant implications for wireless communication security.Through the collection and processing of raw data,extraction of various features including time-domain and frequency-domain features,and utilizing machine learning algorithms for training and constructing a legal fingerprint database,it is possible to achieve close to a 97%recognition accuracy for Fifth Generation(5G)terminals of the same model.This provides an additional and robust hardware-based security layer for 5G communication security,enhancing monitoring capability and reliability. 展开更多
关键词 Radio Frequency fingerprint 5G terminal authentication Wireless security Mobile communication networks
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部