Journal of Information Security Reserach ›› 2021, Vol. 7 ›› Issue (5): 476-484.
Online:
2021-05-05
Published:
2021-05-05
余晓光1 翟亚红3 余滢鑫2 阳陈锦剑1 解晓青1 彭晓晨3 彭琳赓3
通讯作者:
余晓光
作者简介:
余晓光
高级安全专家,主要研究方向为5G安全、物联网安全、数据安全、安全解决方案、网络与信息安全.
sean.yuxg@huawei.com
翟亚红
在职研究生,高级工程师,主要研究领域为网络安全、认证认可
zhaiyh@isccc.gov.cn
余滢鑫
学士,高级工程师,主要研究方向为应用软件安全设计、5G安全、安全解决方案、网络与信息安全.
yuyingxin@huawei.com
阳陈锦剑
网络安全工程师.主要研究方向为渗透测试、5G安全解决方案、5G靶场、网络与信息安全.
yangchenjinjian@163.com
解晓青
研究生,工程师.主要研究方向为网络安全渗透、5G安全、信息安全.
xxqworkl@163.com
彭晓晨
工程师.主要研究领域为网络安全、认证认可.
pengxc@isccc.gov.cn
彭琳赓
工程师.主要研究领域为网络安全、认证认可.
penglg@isccc.gov.cn
余晓光 翟亚红 余滢鑫 阳陈锦剑 解晓青 彭晓晨 彭琳赓. 5G安全国内外形势与政策分析[J]. 信息安全研究, 2021, 7(5): 476-484.
[1]. United States Congress.The Secure 5G and Beyond Act of 2020[EB/OL]. 2020-03[2021-03-25]. https://www.congress.gov/bill/116th-congress/senate-bill/893 [2]. The White House. National Strategy To Secure 5G of the United States of America[EB/OL]. 2020-03[2021-03-25]. https://www.hsdl.org/?view&did=835776 [3]. United States Congress. USA Telecommunications Act[EB/OL].(2020-04-24) [2021-03-25].https://www.congress.gov/bill/116th-congress/house-bill/6624 [4]. US Defense Innovation Board.The 5G ecosystem: Risks & opportunities for DoD[EB/OL].2019-04[2021-03-25].https://media.defense.gov/2019/Apr/03/2002109302/-1/-1/0/DIB_5G_STUDY_04.03.19.PDF [5]. US Department of Defense. Department of Defense 5G Strategy[EB/OL]. (2020-05-02) [2021-03-25]. https://www.cto.mil/wp-content/uploads/2020/05/DoD_5G_Strategy_May_2020.pdf [6]. US Department of Defense. 5G Strategy Implementation Plan[EB/OL]. (2020-12-15) [2021-03-25]. https://www.cto.mil/wp-content/uploads/2020/12/DOD-5G-Strategy-Implementation-Plan.pdf [7]. CSIS Working Group on Trust and Security in 5G Networks. Criteria for Security and Trust in Telecommunications Networks and Services[EB/OL]. (2020-05-13) [2021-03-25]. https://www.csis.org/analysis/criteria-security-and-trust-telecommunications-networks-and-services [8]. 林梓瀚.基于数据治理的欧盟法律体系建构研究[J].信息安全研究,2021,7(4):335-341 [9]. EU. Commission Recommendation - Cybersecurity of 5G Networks[EB/OL].(2019-03-26) [2021-03-25]. https://digital-strategy.ec.europa.eu/en/library/cybersecurity-5g-networks [10]. EU NIS Corporation Group. EU coordinated risk assessment of the cybersecurity of 5G networks[EB/OL].2019-10 [2021-03-25]. https://www.politico.eu/wp-content/uploads/2019/10/Report-EU-risk-assessment-final-October-9.pdf [11]. ENISA. Threat landscape of 5G networks[EB/OL].(2019-11-14) [2021-03-25]. https://www.enisa.europa.eu/publications/enisa-threat-landscape-report-for-5g-networks [12]. EU NIS Corporation Group. Cybersecurity of 5G networks EU toolbox of risk mitigating measures[EB/OL].(2020-01-23) [2021-03-25]. https://digital-strategy.ec.europa.eu/en/library/cybersecurity-5g-networks-eu-toolbox-risk-mitigating-measures [13]. EU NIS Corporation Group . Report on member state’s progress in implementing the EU toolbox on 5G cybersecurity[EB/OL].(2020-07-24) [2021-03-25]. https://digital-strategy.ec.europa.eu/en/library/report-member-states-progress-implementing-eu-toolbox-5g-cybersecurity [14]. UK Cabinet Office.National cyber security strategy 2016 to 2021[EB/OL].(2016-11-01) [2021-03-25]. https://www.gov.uk/government/publications/national-cyber-security-strategy-2016-to-2021 [15]. Levy I. The future of telecoms in the UK[EB/OL].(2020-01-28) [2021-03-25]. https://www.ncsc.gov.uk/blog-post/the-future-of-telecoms-in-the-uk [16]. NCSC. Security analysis for the UK telecoms sector[EB/OL].2020-01 [2021-03-25]. https://www.ncsc.gov.uk/files/Summary%20of%20the%20NCSCs%20security%20analysis%20for%20the%20UK%20telecoms%20sector.pdf [17]. Yu Ning.'D10' 5G club an outdated idea with cold war mind-set[EB/OL].(2020-05-31) [2021-03-25]. https://www.globaltimes.cn/content/1190107.shtml [18]. Reuters. UK seeks alliance to avoid reliance on Chinese tech[EB/OL]. (2020-04-14) [2021-03-25]. https://www.reuters.com/article/us-britain-tech-coalition-idUSKBN2343JW [19]. UK NCSC. NCSC advice on the use of equipment from high risk vendors in UK telecoms networks[EB/OL]. (2020-01-28) [2021-03-25]. https://www.ncsc.gov.uk/guidance/ncsc-advice-on-the-use-of-equipment-from-high-risk-vendors-in-uk-telecoms-networks [20]. Conradi M,Keogh C. Huawei and use of high-risk vendors in UK telecoms networks[EB/OL]. (2020-02-05) [2021-03-25].https://www.technologyslegaledge.com/2020/02/huawei-and-use-of-high-risk-vendors-in-uk-telecoms-networks/ [21]. UK GCHQ. NCSC updates its advice on managing high risk vendors within UK telecoms networks[EB/OL]. (2020-07-14) [2021-03-25].https://www.gchq.gov.uk/news/ncsc-updates-its-advice-on-managing-high-risk-vendors-within-uk-telecoms-networks [22]. CMS. 5G Regulation and Law in Japan[EB/OL]. (2021-02-16) [2021-03-25].https://cms.law/en/int/expert-guides/cms-expert-guide-to-5g-regulation-and-law/japan [23]. Goud N. Now Japan bans the use of Huawei 5G equipment[EB/OL]. 2021-02 [2021-03-25].https://www.cybersecurity-insiders.com/now-japan-bans-the-use-of-huawei-5g-equipment/ [24]. CMS. 5G 5G Regulation and Law in South Korea[EB/OL]. (2021-01-11) [2021-03-25].https://cms.law/en/int/expert-guides/cms-expert-guide-to-5g-regulation-and-law/south-korea [25]. ISDP. South Korea’s 5G cybersecurity strategy[EB/OL]. (2020-12-18) [2021-03-25].https://isdp.eu/event/south-koreas-5g-cybersecurity-strategy/ [26]. Wieland K. South Korea pushes back against US pressure on Huawei[EB/OL]. (2020-10-15) [2021-03-25].https://www.lightreading.com/5g/south-korea-pushes-back-against-us-pressure-on-huawei---report/d/d-id/764668 [27]. Kim E.ITU-T adopts KISA’s proposal on 5G security as atandard draft[EB/OL]. (2020-09-01) [2021-03-25].http://www.businesskorea.co.kr/news/articleView.html?idxno=51380 [28]. 倪光南.坚持信创科技自立自强建设网络强国和数字中国[J].信息安全研究,2021,7(1):2-3 [29]. 国家发展和改革委员会.推动5G安全体系建设[EB/OL]. (2020-08-18)[2021-03-25].http://www.sic.gov.cn/News/91/10564.htm [30]. 中国信通院.5G安全报告[EB/OL]. 2020-02 [2021-03-25].http://www.caict.ac.cn/kxyj/qwfb/bps/202002/t20200204_274118.htm |
[1] | . Study on security key issues and standards of 5G MEC [J]. Journal of Information Security Reserach, 2021, 7(5): 390-395. |
[2] | . Research on the Way of Constructing 5G Security Evaluation and Certification System with Mutual Trust and Recognition [J]. Journal of Information Security Reserach, 2021, 7(5): 396-401. |
[3] | . The current situation of the international mobile communication security detection and certification system [J]. Journal of Information Security Reserach, 2021, 7(5): 402-411. |
[4] | . Research on Cybersecurity of 5G Networks EU Toolbox of Risk Mitigating Measures [J]. Journal of Information Security Reserach, 2021, 7(5): 412-417. |
[5] | . Research on 5G Security Capabilities for Vertical Applications [J]. Journal of Information Security Reserach, 2021, 7(5): 418-422. |
[6] | . Research on 5G Supply Chain Security Risks and Countermeasures [J]. Journal of Information Security Reserach, 2021, 7(5): 423-427. |
[7] | . Security solution of 5G smart port industry application [J]. Journal of Information Security Reserach, 2021, 7(5): 428-435. |
[8] | . Unified Security Evaluation Test Model and System Establishment for 5G Assets [J]. Journal of Information Security Reserach, 2021, 7(5): 436-442. |
[9] | . The evolution and current status of the global 5G security assessment and certification system [J]. Journal of Information Security Reserach, 2021, 7(5): 443-449. |
[10] | . Current Situation For 5G Transmission Network Security [J]. Journal of Information Security Reserach, 2021, 7(5): 450-456. |
[11] | . Discussion on 5G Radio Access Network Security [J]. Journal of Information Security Reserach, 2021, 7(5): 457-465. |
[12] | . 5G network risk assessment methods and practices [J]. Journal of Information Security Reserach, 2021, 7(5): 466-475. |
[13] | . Summary of The Security Of Image Adversarial Samples [J]. Journal of Information Security Reserach, 2021, 7(4): 294-309. |
[14] | . Research and Design of Cloud Edge Collaboration Based on Blockchain [J]. Journal of Information Security Reserach, 2021, 7(4): 310-318. |
[15] | . Research on Acceleration Method of Searchable Encryption of Private Data Based on Trusted Hardware [J]. Journal of Information Security Reserach, 2021, 7(4): 319-327. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||||||
Full text 388
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Abstract 342
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||