[1] 闫新成,毛玉欣,赵红勋. 5G典型应用场景安全需求及安全防护对策[J].中兴通讯技术,2019,7(8) : 6-13
[2] 常志泉,谢玉娟.5G网络安全技术探究[J].信息安全研究.2019,5(12):1124-1128
[3] Ghada Arfaoui; Pascal Bisson; Rolf Blom.A Security Architecture for 5G Networks[J].IEEE Access, 2018, 6: 22466-22479
[4] Mantas G,Komninos N,Rodriguez J.Security for 5G communications in Fundamentals of 5G Mobile Networks[J].Wiley, 2015, 9:207-220
[5] Spongy K,Iwamura M,Staehle M, et al.Design considerations for a 5G network architecture[J].IEEE Communications Magazine, 2014,52(11):65-75
[6] Wang C, Haider F, Gao X, et al.Cellular architectureand key technologies for 5G wireless communication networks[J].IEEE Communications Magazine,2014,52 (2):122-130
[7] Mavromoustakis C X,Bourdena A,Mastorakis G, et al.An energy-aware scheme for efficient spectrumutilization in a 5G mobile cognitive radio network architecture[J],Telecommunication systems,2015,59 (1): 63-75
[8] 3GPP Standard TS 24.501.3rd Generation Partnership Project, Stage 3 Release 15, V15.2.0[S].Technical Specifification Group Core Network and Terminals: Non-Access-Stratum (NAS) Protocol for 5G System (5GS) , 2018
[9] 3GPP Standard TS 23.502,3rd Generation Partnership Project,Stage 2 Release 15, V15.4.0[S] .Technical Specification Group Services and System Aspects:Procedures for the 5G System. 2018
[10] Arkko J,Norrman K,Naslund M, et al.A USIM compatible 5G AKA protocol with perfect forward secrecy[C]// Proc of 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications,2015, 10:1205-1209
[11] Yang H, Zheng H,Zhang J,et al.Block-chain based trusted authentication in cloud radio over fiber network for 5G[C]// Proc of 16th International Conference on Optical Communications and Networks, 2017,4:1-3
[12] Miao, Y,Jiang, Y, Peng L, Hossain, et al.Telesurgery Robot Based on 5G Tactile Internet[J].2018,4 (23):1645-1654
[13] Duan X,Wang X.Authentication handover and privacy protection in 5G HetNets using software-defined networking[C]// Proc of IEEE Communication.2015.4(53):28-35
[14] Tahir S,R uj S,Rahulamathavan Y,et a1.A new secure and lightweight searchable encryption scheme over encrypted cloud data[C]//IEEE Transactions on Emerging Topics in Computing,2019,7(4)530-544
[15] Wang W J,Jiang H Y,Xia X G,et al.A wireless secret key generation method based on Chinese remainder theorem in FDD systems[J].Science China-information sciences,2012,55(7):1605-1616
[16] Lou Y M,Jin L,Zhong z,et al.Secret key generation scheme based on MIMO received signal spaces[J]. Scientia Sinica Informationis.2017,47(3):362-373
[17] Gupta A, Jha RK, Gandotra P, et al.Bandwidth spoofing and intrusion detection system for multistage 5G wireless communication network[J].IEEE Transactions on Vehicular Technology,2018,67 (1): 618-32
[18] Zyskind G,Nathan O,Pentland A S.Decentralizing privacy:using blockchain to protect personal data[C]//Proc of IEEE Security and Privacy Workshops,2015:180-184
[19] Kravitz D W,Cooper J.Securing user identity and transactions synlbiotically:IoT meets blockchain [C]//Proc of IEEE Global Internet of Things Summit,Geneva,2017
[20] Lei A,Cruickshank H,Cao Y,et al.Blockchain-based dynamic key nlanagement for heterogelleous intelligent transportation systems[C]//Proc of IEEE Int Things Journal.2017,4:1832-1843
|