Endogenous security common problems and solutions of the mobile communication networks
Based on the understanding of the mobile communication essential characteristics and the mobile communication network inherent characteristics, from a new perspective, the genetic defects existing in the mobile communication network inherent mechanism, especially in the mobility management mechanism...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2022-09-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022176/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539988241514496 |
---|---|
author | Caixia LIU Xinsheng JI Jiangxing WU |
author_facet | Caixia LIU Xinsheng JI Jiangxing WU |
author_sort | Caixia LIU |
collection | DOAJ |
description | Based on the understanding of the mobile communication essential characteristics and the mobile communication network inherent characteristics, from a new perspective, the genetic defects existing in the mobile communication network inherent mechanism, especially in the mobility management mechanism were analyzed.These genetic defects would not disappear with the intergenerational development of mobile communication network, therefore, they were also known as endogenous security defects or endogenous security common problems of mobile communication networks.The endogenous security threats that may be introduced by security defects such as “acquiescence in information authenticity” and “ubiquitous data visibility” were pointed out.Under the guidance of the cyberspace endogenous security theory, the ideas and methods to solve the endogenous security common problems in mobile communication networks were proposed, such as breaking the “default trust” with “zero trust” and realizing the “user data limited visibility” with“variable implicit mapping”. |
format | Article |
id | doaj-art-ac347605efdf499aab9aaf62ab0643bf |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2022-09-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-ac347605efdf499aab9aaf62ab0643bf2025-01-14T06:28:45ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2022-09-0143707959391606Endogenous security common problems and solutions of the mobile communication networksCaixia LIUXinsheng JIJiangxing WUBased on the understanding of the mobile communication essential characteristics and the mobile communication network inherent characteristics, from a new perspective, the genetic defects existing in the mobile communication network inherent mechanism, especially in the mobility management mechanism were analyzed.These genetic defects would not disappear with the intergenerational development of mobile communication network, therefore, they were also known as endogenous security defects or endogenous security common problems of mobile communication networks.The endogenous security threats that may be introduced by security defects such as “acquiescence in information authenticity” and “ubiquitous data visibility” were pointed out.Under the guidance of the cyberspace endogenous security theory, the ideas and methods to solve the endogenous security common problems in mobile communication networks were proposed, such as breaking the “default trust” with “zero trust” and realizing the “user data limited visibility” with“variable implicit mapping”.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022176/mobile communication network5Gendogenous security problemendogenous security structurevariable implicit mapping |
spellingShingle | Caixia LIU Xinsheng JI Jiangxing WU Endogenous security common problems and solutions of the mobile communication networks Tongxin xuebao mobile communication network 5G endogenous security problem endogenous security structure variable implicit mapping |
title | Endogenous security common problems and solutions of the mobile communication networks |
title_full | Endogenous security common problems and solutions of the mobile communication networks |
title_fullStr | Endogenous security common problems and solutions of the mobile communication networks |
title_full_unstemmed | Endogenous security common problems and solutions of the mobile communication networks |
title_short | Endogenous security common problems and solutions of the mobile communication networks |
title_sort | endogenous security common problems and solutions of the mobile communication networks |
topic | mobile communication network 5G endogenous security problem endogenous security structure variable implicit mapping |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2022176/ |
work_keys_str_mv | AT caixialiu endogenoussecuritycommonproblemsandsolutionsofthemobilecommunicationnetworks AT xinshengji endogenoussecuritycommonproblemsandsolutionsofthemobilecommunicationnetworks AT jiangxingwu endogenoussecuritycommonproblemsandsolutionsofthemobilecommunicationnetworks |