At present, a new round of global scientific and technological revolution and industrial transformation are emerging, and cross-industry and cross-domain integration and innovation will continue to deepen. A large number of new applications, new formats and new models will be generated, and higher requirements are also placed on mobile communication technologies. As the development direction of the new generation of mobile communication technology, the fifth generation mobile communication (5G) will further meet the massive demand of future Internet of Things applications on the basis of improving the service experience of mobile Internet users, and integrate deeply with industries such as industry, medical care and transportation. To achieve a true "Internet of Everything".
Facing the new development trend of 5G networks, especially 5G new services, new architectures and new technologies, it will pose new challenges to security and user privacy protection. In addition to basic communication security, 5G security mechanisms need to provide differentiated security services for different service scenarios, adapt to multiple network access methods and new network architectures, protect user privacy, and support open security capabilities.
5G new scene brings new security threats
The main difference between the 5G eMBB scenario and the traditional mobile Internet scenario is that it provides users with faster network speed and high density capacity, so there will be a large number of small stations. The deployment mode, deployment conditions and functions of the small stations are flexible and diverse. The traditional 4G security mechanism does not consider the security threats in such a dense networking scenario. Therefore, in addition to the security threats of the traditional mobile Internet, there may be a security threat of small station access in such a dense networking scenario.
For large-scale IoT scenarios, it is estimated that by 2020, there will be 50 billion connected devices. The terminal includes an Internet of Things terminal, an RFID tag, a short-range wireless communication terminal, a mobile communication terminal, a camera, and a sensor network gateway. Because most IoT terminals have the characteristics of limited resources, dynamic topology changes, complex network environment, data-centric and closely related applications, they are more vulnerable to threats and attacks than traditional wireless networks. In the case of this massive equipment, in order to ensure the accurate and effective information, it is necessary to introduce a security mechanism in the machine communication. If each message of each device needs to be separately authenticated, the verification of the network side security signaling needs to consume a large amount of resources. In the traditional 4G network authentication mechanism, the problem of massive authentication signaling is not taken into consideration. Once the network receives the terminal signaling request that exceeds the processing capability of the network signaling resources, a signaling storm will be triggered, resulting in the emergence of network services. problem. Further, the entire mobile communication system may malfunction and collapse.
In low-latency and high-reliability scenarios, especially for delay-sensitive applications such as car networking and remote real-time medical, low-latency and high-security requirements are proposed. In these scenarios, in order to avoid accidents such as vehicle collisions and surgical misoperations, 5G networks are required to provide delay QoS guarantees as low as 1 ms while ensuring high reliability. Traditional security protocols, such as the authentication process and the encryption and decryption process, are not designed with ultra-reliable and low-latency communication scenarios. This may cause the delay caused by traditional complex security protocols/algorithms to fail to meet the requirements of ultra-low latency. At the same time, the application of 5G ultra-dense deployment technology makes the coverage of a single access node very small. When the terminal such as a vehicle moves quickly, the mobility management process of the network will be very frequent. For the purpose of low latency, mobility management is related. Functional units and processes need to be optimized.
5G new network architecture puts new requirements on security
The 5G new network architecture needs to be more flexible, smarter and better. It can automatically adapt to the differentiated service requirements of massive services, and comprehensively schedule network resources based on the whole network view, including access capability, computing power, storage capacity and network. Connection capabilities, etc., specifically include: 5G network based on control and forwarding separation mode to achieve a more flat user interface; relying on the new architecture of the global control function, can achieve coordinated control of multiple access technologies; learn from the idea of ​​IT virtualization technology The meta-form and the network connection method are reconstructed, and the infrastructure of the 5G network introduces virtualization technologies such as NFV to implement network slicing and network element deployment on demand, thereby increasing the flexibility and scalability of the overall network.
——NFV security requirements
The 5G network infrastructure platform will choose more data centers based on common hardware architecture to form high forwarding performance and carrier-class management requirements for 5G networks. NFV technology implements mapping of underlying physical resources to virtualized resources, constructs virtual machines (VMs), and loads network logic functions (VNFs); the virtualized system implements unified management of virtualized infrastructure platforms and dynamic reconfiguration of resources. NFV has the potential to help strengthen network security, security policies can be orchestrated, and the advantages of virtualization can be leveraged to isolate business load and enhance security. NFV also brings new security risks while enhancing security. Compared with traditional telecommunication equipment, the separation of software and hardware and the openness of virtualized networks bring new potential security issues to NFV:
First, introduce a new high-risk area - virtualized management. The virtualization management layer is the core of NFV. Once it is compromised, all the virtual machines on it will face the attack directly, and the consequences will be unimaginable.
Second, flexible and virtual networks obscure security boundaries. Security policies are difficult to migrate in real time and dynamically with network adjustment. Virtual machines are vulnerable to attacks by other virtual machines on the same host. Traditional physical security boundary-based protection mechanisms are in cloud computing environments. It is difficult to get an effective application.
Third, users lose complete control over resources and multi-tenant sharing computing resources, resulting in data leakage and attack risks, and put forward higher requirements for data security protection. And users, applications and data resources gather, it is easy to become the target of hacker attacks, and once attacked, the scope of impact is wide and harmful.
5G security For the introduction of virtualization technologies such as NFV, it is necessary to provide diversified system-level protection for network devices to prevent various types of illegal attacks and intrusions. The 5G network environment will contain the hardware and software infrastructure of multiple vendors, so the network identity must be effectively managed to prevent unauthorized users from accessing network resources. 5G security will provide transmission protection, providing security protection such as confidentiality and integrity for data transmission, and handling malicious eavesdropping and forwarding of data in transit.
——Network slice security requirements
Network slicing is a key feature of 5G networks. A network slice will form an end-to-end logical network that flexibly provides one or more network services as required by the slice demand side. An important security issue for network slicing is that the network slice needs to provide an isolation mechanism between different slice instances to prevent resources in the slice from being illegally accessed by network nodes in other types of network slices. For example, a patient in a medical slice network only wants to be accessed by a doctor who is connected to the slice network, and does not wish to be accessed by people in other slice networks. There is also a need for isolation between network slices of the same service type. For example, when different enterprises use a slice network of the same service type, it is not desirable for service resources in the enterprise to be accessed by network slice nodes of other enterprises.
Services, resources, and data are isolated and protected in the network slice to achieve the same user experience as the traditional private network, so that users can confidently store the application data originally stored in the private network to the cloud, the user is You can access private resources anytime, anywhere without worrying about the security of these resources, so as to promote the healthy and rapid development of various vertical businesses.
- Security requirements for multi-RAT access
The heterogeneous access network will be one of the main technical features of the next generation access network, and the 5G network will be a network in which multiple wireless access technologies are coexisting. Heterogeneity is not only reflected in different access technologies, such as WiFi and cellular networks, but also in the difference in local network architecture caused by access networks because of different owners. Therefore, 5G networks need to build a common authentication. The mechanism can establish a secure operation network on different access technologies and insecure access networks.
In addition, in terms of secure interoperability between heterogeneous networks, terminals may switch between heterogeneous networks. In this case, secure interoperation between heterogeneous networks, such as security context delivery, key update, and different Separate the security context between networks.
* * *
In the future, 5G security will provide comprehensive security protection based on more diverse scenarios, multiple access methods and new network architectures. In addition to meeting basic communication security, 5G security mechanisms can provide differentiated security services for different business scenarios, adapt to multiple network access methods and new network architectures, protect user privacy, and support open security capabilities. At present, 5G standardization work has been fully launched. 3GPPSA2 will complete the research work of 5G network architecture by the end of 2016. Therefore, it is not necessary to clarify the security requirements of 5G networks as early as possible, and comprehensively consider 5G security in the overall architecture design and subsequent standardization of 5G networks. Requirements, in order to finally achieve the goal of building a more secure and trusted 5G new network.
A Solar Panel, or photo-voltaic (PV) module, is an assembly of photo-voltaic cells mounted in a framework for installation. Solar panels use sunlight as a source of energy to generate direct current electricity.
The main two types of solar panels. Each of these types of solar cells is made in a unique way and has a different aesthetic appearance.
- Mono crystalline
- Poly crystalline
Mono Solar Panel,Poly Solar Panel,Monocrystalline Solar Cell,Mono And Poly Solar Panel
NANTONG RONGCHANG IMPORT&EXPORT CO.,LTD , https://www.ergsolarcn.com