浏览全部资源
扫码关注微信
[ "夏仕达(1993- ),男,北京邮电大学博士生,主要研究方向为基于物理层安全的终端身份安全接入和异常用户检测。 " ]
[ "徐瑨(1981- ),女,博士,北京邮电大学副教授,主要研究方向为宽带移动通信、无线网络安全等。 " ]
[ "陶小峰(1970- ),男,博士,北京邮电大学教授、博士生导师,主要研究方向为无线通信、移动通信安全等。 " ]
纸质出版日期:2020-03-30,
网络出版日期:2020-03,
移动端阅览
夏仕达, 徐瑨, 陶小峰. 面向6G智能终端身份鉴别技术[J]. 物联网学报, 2020,4(1):131-138.
SHIDA XIA, JIN XU, XIAOFENG TAO. Intelligent terminal identification technology toward 6G. [J]. Chinese journal on internet of things, 2020, 4(1): 131-138.
夏仕达, 徐瑨, 陶小峰. 面向6G智能终端身份鉴别技术[J]. 物联网学报, 2020,4(1):131-138. DOI: 10.11959/j.issn.2096-3750.2020.00159.
SHIDA XIA, JIN XU, XIAOFENG TAO. Intelligent terminal identification technology toward 6G. [J]. Chinese journal on internet of things, 2020, 4(1): 131-138. DOI: 10.11959/j.issn.2096-3750.2020.00159.
智能终端将极大地拓展6G的应用,也使6G面临更大的安全威胁,实现可靠的终端身份鉴别是保证6G网络安全的前提。针对 6G 网络架构与终端特点,归纳了身份鉴别技术在面向 6G 智能终端时的挑战与需求;进一步分析了面向 6G 智能终端身份鉴别的发展趋势;最后,探索了物理层认证在 6G 网络智能终端身份鉴别中的可能实现机制。
The intelligent terminal will greatly expand the applications of 6G .However
it will also make 6G face with greater security threats.The reliable terminal identification technology is the premise to ensure the security of 6G networks.Firstly
based on the network architecture and terminal characteristics
the requirements and challenges of 6G intelligent terminal identification were summarized.Then
the development trend was put forward for 6G intelligent terminal identification.Finally
physical layer authentication was explored to achieve possible realization of intelligent terminal identity authentication mechanism in 6G networks.
智能终端6G身份鉴别物理层认证
intelligent terminal6Gidentificationphysical layer authentication
ZHANG Z, XIAO Y, MA Z ,et al. 6G wireless networks:vision,requirements,architecture,and key technologies[J]. IEEE Vehicular Technology Magazine, 2019,14(3): 28-41.
STRINATI E C, BARBAROSSA S, GONZALEZ-JIMENEZ J L ,et al. 6G:the next frontier from holographic messaging to artificial intelligence using sub terahertz and visible light communication[J]. IEEE Vehicular Technology Magazine, 2019,14(3): 42-50.
LETAIEF K B, CHEN W, SHI Y ,et al. The roadmap to 6G:AI empowered wireless networks[J]. IEEE Communications Magazine, 2019,57(8): 84-90.
YANG P, XIAO Y, XIAO M ,et al. 6G wireless communications:vision and potential techniques[J]. IEEE Network, 2019,33(4): 70-75.
ZONG B, FAN C, WANG X ,et al. 6G technologies:key drivers,core requirements,system architectures,and enabling technologies[J]. IEEE Vehicular Technology Magazine, 2019,14(3): 18-27.
CHEN C M, XIANG B, LIU Y ,et al. A secure authentication protocol for Internet of vehicles[J]. IEEE Access, 2019,7: 12047-12057.
NARMADHA R . Heterogeneous network security management[J]. International Journal of Intelligent Enterprise, 2019,6(1): 32-52.
DENNING D E . Is quantum computing a cybersecurity threat?[J]. American Scientist, 2019,107(2): 83-85.
CHENG X, ZHANG Z, CHEN F ,et al. Secure identity authentication of community medical Internet of things[J]. IEEE Access, 2019,7: 115966-115977.
ZHOU L, LI X, YEH K H ,et al. Lightweight IoT-based authentication scheme in cloud computing circumstance[J]. Future Generation Computer Systems, 2019,91: 244-251.
CHEN Y, SHEN Q, SUN P ,et al. Reliable migration module in trusted cloud based on security level-design and implementation[C]// 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PHD Forum. IEEE, 2012: 2230-2236.
LI X, HAN Y, GAO J ,et al. Secure hierarchical authentication protocol in VANET[J]. IET Information Security, 2019,14(1): 99-110.
牛静媛 . 移动通信系统安全性分析[D]. 北京:北京邮电大学, 2008.
NIU J Y . Analysis of the security mechanism in mobile communication system[D]. Beijing:Beijing University of Posts and Telecommunications, 2008.
张磊 . GSM/UMTS 混合网络安全若干关键技术研究[D]. 北京:北京邮电大学, 2011.
ZHANG L . Key technology research on GSM/UMTS hybrid network security[D]. Beijing:Beijing University of Posts and Telecommunications, 2011.
CHANG C C, LEE J S, CHANG Y F . Efficient authentication protocols of GSM[J]. Computer Communications, 2005,28(8): 921-928.
NTANTOGIAN C, XENAKIS C . One-pass EAP-AKA authentication in 3G-WLAN integrated networks[J]. Wireless personal communications, 2009,48(4): 569-584.
MUN H, HAN K, KIM K . 3G-WLAN interworking:security analysis and new authentication and key agreement based on EAP-AKA[C]// 2009 Wireless Telecommunications Symposium. IEEE, 2009: 1-8.
向东南, 毛文俊 . LTE系统EPS-AKA过程安全性研究与改进[J]. 无线电通信技术, 2016,42(5): 60-63.
XIANG D N, MAO W J . Research and improvement of LTE EPS-AKA procedure security[J]. Radio Communication Technology, 2016,42(5): 60-63.
FERRAG M A, MAGLARAS L, ARGYRIOU A ,et al. Security for 4G and 5G cellular networks:a survey of existing authentication and privacy-preserving schemes[J]. Journal of Network and Computer Applications, 2018,101: 55-82.
胡鑫鑫, 刘彩霞, 刘树新 ,等. 移动通信网鉴权认证综述[J]. 网络与信息安全学报, 2018,4(12): 5-19.
HU X X, LIU C X, LIU S X ,et al. Overview of mobile communication network authentication[J]. Chinese Journal of Network and Information Security, 2018,4(12): 5-19.
PRASAD A R, ARUMUGAM S, SHEEBA B ,et al. 3GPP 5G security[J]. Journal of ICT Standardization, 2018,6(1): 137-158.
BASIN D, DREIER J, HIRSCHI L ,et al. A formal analysis of 5G authentication[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2018: 1383-1396.
黄开枝, 金梁, 钟州 . 5G物理层安全技术——以通信促安全[J]. 中兴通讯技术, 2019,25(4): 43-49.
HUANG K Z, JIN L, ZHONG Z . 5G physical layer security technology:enhancing security by communication[J]. ZTE Technology Journal, 2019,25(4): 43-49.
PAUL L Y, BARAS J S, SADLER B M . Physical-layer authentication[J]. IEEE Transactions on Information Forensics and Security, 2008,3(1): 38-51.
WANG X, HAO P, HANZO L . Physical-layer authentication for wireless security enhancement:current challenges and future developments[J]. IEEE Communications Magazine, 2016,54(6): 152-158.
杨惠杰, 周天祺, 桂梓原 . 区块链技术在物联网中的身份认证研究[J]. 中兴通讯技术, 2018,24(6): 39-44.
YANG H J, ZHOU T Q, GUI Z Y . Blockchain technology for identityauthentication in Internet of things[J]. ZTE Technology Journal, 2018,24(6): 39-44.
HAMMI M T, HAMMI B, BELLOT P ,et al. Bubbles of trust:a decentralized blockchain-based authentication system for IoT[J]. Computers & Security, 2018,78: 126-142.
LIN C, HE D, HUANG X ,et al. BSeIn:a blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0[J]. Journal of Network and Computer Applications, 2018,116: 42-52.
ZENG K . Physical layer key generation in wireless networks:challenges and opportunities[J]. IEEE Communications Magazine, 2015,53(6): 33-39.
ZHANG J, RAJENDRAN S, SUN Z ,et al. Physical layer security for the Internet of things:authentication and key generation[J]. IEEE Wireless Communications, 2019,26(5): 92-98.
ZENG K, GOVINDAN K, MOHAPATRA P . Non-cryptographic authentication and identification in wireless networks[security and privacy in emerging wireless networks][J]. IEEE Wireless Communications, 2010,17(5): 56-62.
GAO N, NI Q, FENG D ,et al. Physical layer authentication under intelligent spoofing in wireless sensor networks[J]. Signal Processing, 2020,166:107272.
ZHAO C, HUANG M, HUANG L ,et al. A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks[J]. Computer networks, 2017,128: 164-171.
WANG N, JIANG T, LYU S ,et al. Physical-layer authentication based on extreme learning machine[J]. IEEE Communications Letters, 2017,21(7): 1557-1560.
LIAO R F, WEN H, WU J ,et al. Deep-learning-based physical layer authentication for industrial wireless sensor networks[J]. Sensors, 2019,19(11):2440.
BALDINI G, GIULIANI R, DIMC F . Physical layer authentication of Internet of things wireless devices using convolutional neural networks and recurrence plots[J]. Internet Technology Letters, 2019,2(2):e81.
XIAO L, LI Y, HAN G ,et al. PHY-layer spoofing detection with reinforcement learning in wireless networks[J]. IEEE Transactions on Vehicular Technology, 2016,65(12): 10037-10047.
XIAO L, WAN X, HAN Z . PHY-layer authentication with multiple landmarks with reduced overhead[J]. IEEE Transactions on Wireless Communications, 2017,17(3): 1676-1687.
QIU X, JIANG T, WU S ,et al. Physical layer authentication enhancement using a Gaussian mixture model[J]. IEEE Access, 2018,6: 53583-53592.
FANG H, WANG X, HANZO L . Learning-aided physical layer authentication as an intelligent process[J]. IEEE Transactions on Communications, 2018,67(3): 2260-2273.
YANG J, CHEN Y, TRAPPE W ,et al. Detection and localization of multiple spoofing attackers in wireless networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2012,24(1): 44-58.
XIA S, LI N, TAO X F ,et al. Multiple attributes based spoofing detection using an improved clustering algorithm in mobile edge network[C]// 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN). IEEE, 2018: 242-243.
CHEN Y, WEN H, WU J ,et al. Clustering based physical-layer authentication in edge computing systems with asymmetric resources[J]. Sensors, 2019,19(8):1926.
LIU J, WANG X . Physical layer authentication enhancement using two-dimensional channel quantization[J]. IEEE Transactions on Wireless Communications, 2016,15(6): 4171-4182.
FANG H, WANG X, HANZO L . Adaptive trust management for soft authentication and progressive authorization relying on physical layer attributes[J]. IEEE Transactions on Communications, 2020
XIAO L, YAN Q, LOU W ,et al. Proximity-based security techniques for mobile users in wireless networks[J]. IEEE Transactions on Information Forensics and Security, 2013,8(12): 2089-2100.
0
浏览量
880
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构