Table of Content

    05 May 2021, Volume 7 Issue 5
    Study on security key issues and standards of 5G MEC
    2021, 7(5):  390-395. 
    Asbtract ( )   PDF (1792KB) ( )  
    References | Related Articles | Metrics
    This paper first introduces the logic architecture of 5G Multi-access Edge computing (MEC) system, puts forward the overall goal of MEC security, gives the 5G MEC security architecture, analyzes the key security issues of MEC infrastructure security, core network security, networking security, communication security, data security, terminal security, MEC platform security, MEC app security, management security in detail, and analyzes the security risks of key security issues, puts forward the corresponding solution. In addition, this paper also combs the 5G MEC security related international and domestic standards, Finally, the future work of MEC security is prospected. 
    Research on the Way of Constructing 5G Security Evaluation and Certification System with Mutual Trust and Recognition
    2021, 7(5):  396-401. 
    Asbtract ( )   PDF (869KB) ( )  
    References | Related Articles | Metrics
    At present, 5G security has become a common challenge for all countries in the world. As a global leading country in 5G technology, while accelerating the development and application deployment of 5G, China urgently needs to build an objective, unified, open and transparent 5G security evaluation and certification system, so as to alleviate the security risks in 5G deployment and application, and promote 5G international cooperation and trust building. On the basis of combing the progress of 5G security evaluation and certification in the United States and Europe, this paper analyzes the promotion ideas of the construction of 5G security evaluation and certification system in the United States and Europe, and then puts forward the idea of building 5G security evaluation and certification system with mutual trust and recognition based on the actual needs of 5G security guarantee in China.
    The current situation of the international mobile communication security detection and certification system
    2021, 7(5):  402-411. 
    Asbtract ( )   PDF (2973KB) ( )  
    References | Related Articles | Metrics
    With the advent of the 5G era, countries are accelerating the construction of 5G network system, 5G equipment gradually into various industries, in the process of moving towards a digital society to build 5G network security certification system is of great significance to all countries. The purpose of this paper is to conduct in-depth research on the 5G security testing and certification system architecture of China and the countries of the United States, Europe, Japan and South Korea, including the main policies, core institutions and testing certification process, and hope to provide support for the construction of China's 5G security network certification system and the construction of a 5G security network certification system of mutual trust and mutual recognition among countries through comparative analysis of each country's 5G security development process and the 5G security inspection certification process system.
    Research on Cybersecurity of 5G Networks EU Toolbox of Risk Mitigating Measures
    2021, 7(5):  412-417. 
    Asbtract ( )   PDF (760KB) ( )  
    References | Related Articles | Metrics
    Cybersecurity of 5G networks has attracted international attention and become the focus. In order to strengthen cybersecurity of 5G networks, EU have issued ‘cybersecurity of 5G networks EU Toolbox of risk mitigating measure’ and implement it in EU Member States in 2020. In 2021, EU have started to formulate cybersecurity of 5G networks certification plan to implement 5G toolbox. The purpose of this paper is to study cybersecurity of 5G networks risks and risk mitigation measures. Firstly, this paper reviews the relevant research on cybersecurity of 5G networks, and introduces the background of 5G toolbox. Secondly, by using the method of literature analysis, this paper studies 5G toolbox and relevant 5G certification plans, and deeply analyzes the strategic measures, technical measures, supporting action measures and risk mitigation plans of 5G toolbox. Finally, from the perspective of the relationship between 5G toolbox and certification, the results show that: 5G toolbox takes 5G standard and 5G certification as an important means to mitigate 5G network security risks; 5G toolbox highlights the important role of 5G standard and certification in technical measures and support actions.
    Research on 5G Security Capabilities for Vertical Applications
    2021, 7(5):  418-422. 
    Asbtract ( )   PDF (1730KB) ( )  
    References | Related Articles | Metrics
     This paper analyzes 5G security requirements, summarizes technical and standardization progress, studies 5G security service architecture based on micro- service dynamic choreography, and puts forward the implementation methods and applications of key security capabilities, such as terminal security access authentication, MEC service monitoring, slice service security isolation, data asset automatic identification and risk perception ability, so as to provide references for security services to 5G enabled verticals.
    Research on 5G Supply Chain Security Risks and Countermeasures
    2021, 7(5):  423-427. 
    Asbtract ( )   PDF (786KB) ( )  
    References | Related Articles | Metrics
    5G network has spawned "Internet of Everything, Intelligent Connection of Everything", which promotes the digital transformation of the industry, and has become one of the key infrastructures that countries attach great importance . 5G supply chain security is related to the core interests of the country and is the core security of 5G network security. This article summarizes the current situation The background and current situation of the 5G supply chain, analyze the current supply chain security risks, and propose four response strategies such as strategic guidelines, technological innovation, standard support, and risk control, so as to provide for the improvement of China's 5G supply chain security technology and management level. For reference, it aims to enhance the security assurance capabilities of China's 5G supply chain and build a safe and orderly ecological environment for the 5G supply chain.
    Security solution of 5G  smart port industry application
    2021, 7(5):  428-435. 
    Asbtract ( )   PDF (1168KB) ( )  
    References | Related Articles | Metrics
    The promotion and application of 5G technology in the port industry is an important content and the only way to build a smart port. How to ensure the security of the smart port has become an important problem to be solved urgently. This paper introduces the typical business scenarios of 5G in the smart port, analyzes the security requirements, and puts forward a comprehensive security protection scheme covering the edge of the cloud network, which can provide technical reference for the landing application of 5G in the smart port industry.
    Unified Security Evaluation Test Model and System Establishment for 5G Assets
    2021, 7(5):  436-442. 
    Asbtract ( )   PDF (1277KB) ( )  
    References | Related Articles | Metrics
    The development of new architectures, technologies and applications of 5G poses new challenges to security. On the one hand, 5G introduces many IT technologies, making the form of assets more complex and diverse. The application of network slicing, multi-access edge computing, network capacity opening and other technologies brings new security threats. On the other hand, 5G is deeply integrated with vertical industries, and 5G security requires a transformation from "general security" to "on-demand security". Global System for Mobile Communications Association has established Network Equipment Security Assurance Scheme (NESAS), which leverages security evaluation to improve 5G security. However, NESAS mainly focus on large-scale 5G base station and core network equipment testing, lacking the scheme of network operation security and data protection.  A novel security evaluation model (ARMIT model) for 5G assets is proposed. The model first describes 5G assets composition and threats landscape, and then stresses the evaluation security requirements, indexes and methods regarding to 5G assets and network operation. It provides an effective reference for equipment enterprises and operators to carry out security capability evaluation of 5G products, networks and services.
    The evolution and current status of the global 5G security assessment and certification system
    2021, 7(5):  443-449. 
    Asbtract ( )   PDF (1277KB) ( )  
    References | Related Articles | Metrics
    5G security has attracted global attention, and the establishment of a unified standard-based 5G security assessment and certification system to deal with 5G security risks has become a common demand of all parties in the information and communication technology (ICT) field. At present, there are two main international assessment and certification systems that are highly recognized in the field of 5G security, namely CC (Common Criteria) and NESAS (Network Equipment Security Assurance Framework). This article will deeply analyze the internal correlation and difference between the assessment and certification methodology of CC and NESAS, study the current status and methodology evolution of the global 5G security assessment and certification system, sort out the working ideas of the EU to carry out the 5G security unified certification plan, and put forward suggestions for the next step based on our actual situation.
    Current Situation For 5G Transmission Network Security
    2021, 7(5):  450-456. 
    Asbtract ( )   PDF (2785KB) ( )  
    References | Related Articles | Metrics
    New 5G technologies bring large bandwidth, ultra-low latency, and high-precision synchronization opportunities for transmission bearer network. At the same time, its virtualization, flexibility, and hierarchical features bring new security challenges. This article describes security risks faced by the transmission bearer network between 5G RAN, 5G Core, MEC, and the Internet. It also analyzes typical security requirements and security protection solutions for the access of 5G RAN, 5G Core, MEC, Internet, and NMS management plane to the 5G transport network. By summarizing new security risks, new requirements, and new protection technologies faced by transmission networks in new 5G scenarios, we hope to provide reference for security requirements and protection technologies during the promotion and construction of 5G telecom networks.
    Discussion on 5G Radio Access Network Security
    2021, 7(5):  457-465. 
    Asbtract ( )   PDF (3698KB) ( )  
    References | Related Articles | Metrics
    As 5G network construction enters a stage of rapid development, 5G mobile communications systems support application scenarios such as enhanced mobile bandwidth, high reliability, low latency, and low power consumption and large connections. In addition to existing mobile Internet applications, The emergence of 5G provides powerful network access for the development of emerging industries such as AR, VR, V2X, and IoT, provides an information infrastructure platform for the rapid development of vertical industries, and lays a solid foundation for the Internet of Everything. The new application scenarios and key technologies of 5G bring convenience, but also bring new security risks and challenges. The combination of 5G and vertical industries also brings new security requirements for 5G. This document provides an in-depth discussion on air interface security for 5G wireless access. This paper discusses 5G wireless air interface security from the aspects of access authentication, air interface encryption and integrity protection, and wireless access privacy protection, providing reference for wireless access security protection technologies during 5G telecom network promotion and construction.
    5G network risk assessment methods and practices
    2021, 7(5):  466-475. 
    Asbtract ( )   PDF (1935KB) ( )  
    References | Related Articles | Metrics
    Based on the discrete characteristics of the high-level risks of 5G networks, this article provides a 5G network risk assessment model based on the general risk management framework of ISO 27005. Through the analysis of the characteristics of 5G ecology, four ecological plane are proposed as the external context for risk analysis. Through the analysis of the characteristics of 5G technology, a structured risk analysis idea based on ICO integration is proposed, and the main high-level risks of 5G networks are analyzed based on this. The 5G security matrix is proposed as a countermeasure model for 5G network risks, and practical suggestions are given from the perspectives of trust system, assessment system, de-trust system, 5G security map, and continuous risk measurement and management. Finally, recommendations for security rating of key 5G components are made.
    5G Security Situation and Policy Analysis at Home and Abroad
    2021, 7(5):  476-484. 
    Asbtract ( )   PDF (1187KB) ( )  
    References | Related Articles | Metrics
    With the continuous commercial use of 5G globally, 5G security has become the focus of attention of all countries. Countries around the world have formulated their own national 5G security strategies, laws and regulations, and academic institutions and think tanks have also formulated standards and strategies. The global 5G development situation and progress are different. Influenced by countries such as the United States and the European Union, the world's major economies have different strategies for 5G supplier selection and technology route. This paper discusses the situation of 5G security at home and abroad in detail, analyzes the main national policies of each country, and makes suggestions on the development and response of 5G in China.