[1]邬贺铨. 5G时代的网络安全挑战与服务[J]. 中国信息安全, 2020 (10): 3033[2]杨红梅, 冯泽冰, 邱勤,等. 5G安全知识库[R]. 北京: 中国信息通信研究院, 2021[3]3rd Generation Partnership Project (3GPP). 3GPP TS 23.503 V18.1.0 Policy and Charging Control Framework for the 5G System (5GS) (Release 18)[SOL]. 2023 [20230501]. https:www.3gpp.orgftpSpecsarchive23_series23.503[4]3rd Generation Partnership Project (3GPP). 3GPP TS 33.521 V17.2.0 5G Security Assurance Specification; Network Data Analytics Function (NWDAF) (Release 17)[SOL]. 2023 [20230501]. https:www.3gpp.orgftpSpecsarchive33_series33.521[5]The 5G Infrastructure Public Private Partnership (5G PPP). 5G PPP 5GENSURE Security and Privacy Enablers[EBOL]. [20230501]. https:5gppp.eu5gensuresecurityandprivacyenablers[6]王建英, 吕俟林, 李文江. 5G网络安全监测预警机制浅析[J]. 通信技术, 2020, 54(11): 27802785[7]徐国荣. 5G网络安全监测预警机制[J]. 数字通信世界, 2021(10): 137138[8]陶宏才.安全协议结构及其范式研究[D]. 成都: 西南交通大学, 2007[9]Burrows M, Abadi M, Needham R. A logic of authentication[J]. ACM Trans on Computer Systems, 1990, 8(1): 1836[10]Gong L, Needham R M, Yahalom R. Reasoning about belief in cryptographic protocols[C] Proc of IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 1990: 234248[11]Abadi M, Tuttle M R. A semantics for a logic of authentication[C] Proc of the 10th Annual ACM Symp on Principles of Distributed Computing. New York: ACM, 1991: 201216[12]Syverson P F, Van Oorschot P C. On unifying some cryptographic protocol logics[C] Proc of the 1994 IEEE Computer Society Symp on Research in Security and Privacy. Piscataway, NJ: IEEE, 1994: 1428[13]Millen J K, Clark S C, Freedman S B. The interrogator: Protocolsecuity analysis[J]. IEEE Trans on Software Engineering, 1987, 13(2): 274288[14]Meadows C. The NRL protocol analyzer: An overview[J]. The Journal of Logic Programming, 1996, 26(2): 113131[15]Dolev D, Yao A. On the security of public key protocols[J]. IEEE Trans on Information Theory, 1983, 29(2): 198208[16]Meier S, Schmidt B, Cremers C, et al. The TAMARIN prover for the symbolic analysis of security protocols[C] Proc of the 25th Int Conf on Computer Aided Verification. Berlin: Springer, 2013: 696701[17]Sidhu D P. Authentication protocols for computer networks: I[J]. Computer Networks and ISDN Systems, 1986, 11(4): 297310[18]Varadharajan V. Verification of network security protocols[J]. Computers & Security, 1989, 8(8): 693708[19]Bolignano D. An approach to the formal verification of cryptographic protocols[C] Proc of the 3rd ACM Conf on Computer and Communications Security. New York: ACM, 1996: 106118[20]Paulson L C. Proving properties of security protocols by induction[C] Proc of the 10th Computer Security Foundations Workshop. Piscataway, NJ: IEEE, 1997: 7083[21]Fábrega F J T, Herzog J C, Guttman J D. Honest ideals on strand spaces[C] Proc of the 11th IEEE Computer Security Foundations Workshop. Piscataway, NJ: IEEE, 1998: 6677[22]Basin D, Dreier J, Hirschi L, et al. A formal analysis of 5G authentication[C] Proc of the 2018 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2018: 13831396[23]李晓逸. 5G认证协议设计及形式化验证[D]. 北京: 北京交通大学, 2021[24]Xiao Y, Gao S. Formal verification and analysis of 5G AKA protocol using mixed strand space model[J]. Electronics, 2022, 11(9): 1333[25]余晓光, 曹扬, 张国翊, 等. 5G安全靶场技术与关键能力研究[J]. 保密科学技术, 2021, 129(6): 2936[26]The MathWorks, Inc. 5G Toolbox: Simulate, analyze, and test 5G communications systems[CPOL]. [20230501]. https:www.mathworks.comproducts5g[27]Mark T. The challenges of fuzzing 5G protocols[ROL]. Manchester: NCC Group, 2021[20230501]. https:research.nccgroup.com20211011thechallengesoffuzzing5gprotocols[28]解晓青, 余晓光, 余滢鑫,等. 5G网络安全渗透测试框架和方法[J]. 信息安全研究, 2021, 7(9): 795801[29]邱勤, 刘胜兰, 韩晓露,等. 5G应用安全参考架构与解决方案研究[J]. 信息安全研究, 2020, 6(8): 680687[30]邵晓萌, 韩文婷. 5G网络攻击技术研究及防护建议[J]. 信息通信技术与政策, 2022 (12): 7981[31]王蕴实, 张曼君, 徐雷,等. 5G核心网异网漫游安全风险及安全防护策略[J]. 通信世界, 2022 (17): 3941[32]刘建伟, 韩祎然, 刘斌, 等. 5G网络切片安全模型研究[J]. 信息网络安全, 2020, 20(4): 111[33]张鑫亮. 面向安全需求的网络切片部署与调整方法研究[D]. 郑州: 战略支援部队信息工程大学, 2022[34]彭健, 李文彬, 陈丰. 5G网络能力开放安全架构和流程研究[J]. 邮电设计技术, 2023 (4): 1016[35]王东升, 孙凡清等. 电力5G业务切片全生命周期研究[J]. 电力信息与通信技术, 2020, 18(8): 102108.[36]杨红梅, 王亚楠. 5G边缘计算安全关键问题及标准研究[J]. 信息安全研究, 2021, 7(5): 390395[37]庄小君, 杨波, 杨利民, 等. 面向垂直行业的5G边缘计算安全研究[J]. 保密科学技术, 2020, 120(9): 2027[38]3GPP. 3GPP TS 33.501 V18.1.0. Security architecture and procedures for 5G system (Release 18)[SOL]. (20230330) [20230501]. https:www.3gpp.orgftpSpecsarchive33_series33.501[39]郑东, 张应辉. 密码技术在5G安全中的应用[J]. 信息安全与通信保密, 2019 (1): 5058[40]尹魏昕, 贾咏哲, 高艳松,等. 物理不可克隆函数(PUF)研究综述[J]. 网络安全技术与应用, 2018 (6): 4142, 54[41]陆海涛, 李刚, 高旭昇. 5G网络的设备及其接入安全[J]. 中兴通讯技术, 2019, 25(4): 1924, 55[42]Seok B,Sicato J C S, Erzhena T, et al. Secure D2D communication for 5G IoT network based on lightweight cryptography[J]. Applied Sciences, 2019, 10(1): 217[43]Wang M, Yan Z, Niemi V. UAKAD2D: Universal authentication and key agreement protocol in D2D communications[J]. Mobile Networks and Applications, 2017, 22(3): 510525[44]Sun Y, Cao J, Ma M, et al. Privacypreserving device discovery and authentication scheme for D2D communication in 3GPP 5G HetNet[C] Proc of the 2019 Int Conf on Computing, Networking and Communications (ICNC). Piscataway, NJ: IEEE, 2019: 425431[45]Zhang A, Lin X. Securityaware and privacypreserving D2D communications in 5G[J]. IEEE Network, 2017, 31(4): 7077[46]邱勤, 张弘扬, 张峰,等. 网络虚拟化安全技术研究[J]. 保密科学技术, 2022 (9): 5864[47]GonzálezGranadillo G, GonzálezZarzosa S, Diaz R. Security information and event management (SIEM): Analysis, trends, and usage in critical infrastructures[J]. Sensors, 2021, 21(14): 4759[48]王丽娜, 王斐, 刘维杰. 面向SDN的安全威胁及其对抗技术研究[J]. 武汉大学学报: 理学版, 2019, 65(2): 153164[49]陈紫晨. 异构无线网络干扰抑制技术研究[D]. 西安: 西安电子科技大学, 2019[50]成思玥, 李华圣. 基于无线电管理的5G技术发展趋势研究[J]. 中国无线电, 2015 (4): 1920[51]王永娟, 樊昊鹏, 代政一,等. 侧信道攻击与防御技术研究进展[J]. 计算机学报, 2023, 46(1): 202228
|