Computer Science ›› 2024, Vol. 51 ›› Issue (5): 1-11.doi: 10.11896/jsjkx.231000104

• Discipline Frontier • Previous Articles     Next Articles

Overview of Security Technologies and Strategies for Intelligent Railway 5G

LI Panpan1,2, WU Hao1,3, LIU Jiajia1,2, DUAN Li4, LU Yunlong1,3   

  1. 1 State Key Laboratory of Advanced Rail Autonomous Operation,Beijing Jiaotong University,Beijing 100044,China
    2 School of Electronics and Information Engineering,Beijing Jiaotong University,Beijing 100044,China
    3 Frontiers Science Center for Smart High-speed Railway System,Beijing Jiaotong University,Beijing 100044,China
    4 School of Computer and Information Technology,Beijing Jiaotong University,Beijing 100044,China
  • Received:2023-10-17 Revised:2024-03-07 Online:2024-05-15 Published:2024-05-08
  • About author:LI Panpan,born in 1997,Ph.D.Her main research interests include mmwave high-speed railway wireless communication and so on.
    WU Hao,born in 1973,Ph.D,professor,Ph.D supervisor.Her main research interests include broadband mobile communication system and private mobile communication.
  • Supported by:
    Science and Technology Research and Development Plan of China Railway Co., Ltd.(K2022G018).

Abstract: Digital technology is reshaping all walks of life,which is the only way for the development of the industry.While digital servitization technologies such as 5G empower industries such as railways,they also bring some security risks.Security is a prerequisite for all services.In order to promote the innovative applications of 5G in intelligent railway,this paper first systematically reviews the security risks and challenges faced by intelligent railway 5G from the perspectives of terminal,air interface,communication,data,system,and public-private network integration.In view of new service scenarios,we analyze the new technologies,new terminals and new applications for railways,and the new requirements of 5G security for smart railways.The new features of 5G security enhancement in aspects of password algorithm,air interface security,privacy,unified authentication,and roaming are also summarized.On this basis,the key points of smart railway 5G security are given,including certification,physical layer security,terminal security,slice security and edge computing security.For 5G private network deployment,recommendations are also given in terms of infrastructure,communication security,data security,and endogenous security defense system.

Key words: Intelligent railway, The 5th generation mobile communication technology, Endogenous security, Overview of strategies, Digital servitization

CLC Number: 

  • TN915
[1]AI B,MA G Y,ZHONG Z D.5G technology and applications insmart high-speed rail[J].ZTE Communications,2019,25(6):42-54.
[2]WANG T J.Railway 5G key technology analysis and development route[J].China Railway,2020(11):9-11.
[3]Security architecture and procedures for 5G system:3GPP TS 33 501[S].ETSI,2019.
[4]QIANG Q,WU G,HUANG K Z.5G security technology research and standard progress[J].Scientia Sinica Informationis,2021(51):347-366.
[5]Future Mobile Communications Forum.Summary Review of the 2020 World 5G Conference [EB/OL].https://w5gc.com/upload/file/20230616168690208865.pdf.
[6]YD/T 3628-2019 “5G Mobile Communication Network Security Technical Requirements”[S].Beijing:Ministry of Industry and Information Technology of the People's Republic of China,2019.
[7]China Academy of Information and Communications Technology &IMT-2020(5G) Promotion Group.5G Security Report [R].Beijing:2020.
[8]5G Network Security Standardization White Paper [S].Beijing:National Information Security Standardization Technical Committee,2021.
[9]BASIN D,DREIER J,HIRSCHI L,et al.A formal analysis of 5G authentication[C]//The 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:1383-1396.
[10]HU X X,LIU C X,PENG Y B,et al.Security Research on 5G Authentication and Authentication Protocol[J].Radio Communications Technology,2020,46(4):405-411.
[11]ARKKO J,NORRMAN K,NÄSLUND M,et al.A USIM compatible 5G AKA protocol with perfect forward secrecy[C]//2015 IEEE Trustcom/BigDataSE/ISPA.2015:1205-1209.
[12]LI X H,LIU F W,QI M P,et al.Security analysis of 5G-DHAKA protocol based on PKI[J].Cyberspace Security,2020,10(11):1-5.
[13]DUAN X Y,WANG X B.Authentication handover and privacy protection in 5G hetnets using software-defined networking[J].IEEE Communications Magazine,2015,53(4):28-35.
[14]FANG H,WANG X B,TONASIN S.Machine learning for intelligent authentication in 5G and beyond wireless networks[J].IEEE Wireless Communications,2019,26(5):55-61.
[15]GOEL S,NEGI R.Guaranteeing secrecy using artificial noise[J].IEEE Transactions on Wireless Communications,2008,7(6):2180-2189.
[16]GOEL S,AGGARWAL V,YENER A,et al.Modeling Location Uncertainty for Eavesdroppers:A Secrecy Graph Approach[C]//2010 IEEE International Symposium on Information Theory.2010:2627-2631.
[17]LIU W,LI M,TIAN X,et al.Transmit filter and artificial noise design for secure MIMO-OFDM systems[J].arXiv:1704.08007,2017.
[18]KHISTI A,WORNELL G W.Secure transmission with multipleantennas:Part II:The MIMOME wiretap channel[J].IEEE Transactions on Information Theory,2010,56(11):5515-5532.
[19]ZHU F C,GAO F F,YAO M L,et al.Joint information and jamming beamforming for physical layer security with full duplex base station[J].IEEE Transactionson Signal Processing,2014,62(24):6391-6401.
[20]DONG Y,EL SHAFIE A,HOSSAIN M J,et al.Secure beamforming in full-duplex SWIPT systems with loopback self-interference cancellation[C]//2018 IEEE International Conference on Communications(ICC).2018:1-6.
[21]HERSHEY J E,HASSAN A A,YARLAGADDA R.Unconven-tional cryptographic keying variable management[J].IEEE Transactions on Communications,1995,43(1):3-6.
[22]HASSAN A A,STARK W E,HERSHEY J E,et al.Cryptographic key agreement for mobile radio[J].Digital Signal Processing,1996,6(4):207-212.
[23]ZHANG J,HE B,DUONG T Q,et al.On the key generation from correlated wireless channels[J].IEEE Communications Letters,2017,21(4):961-964.
[24]ZHAN F,YAO N,GAO Z,et al.Efficient key generation leveraging wireless channel reciprocity for MANETs[J].Journal of Network and Computer Applications,2018,103:18-28.
[25]HUO F,GONG G.XOR encryption versus phase encryption,an in-depth analysis[J].IEEE Transactions on Electromagnetic Compatibility,2015,57(4):903-911.
[26]REILLY D,KANTER G S.Noise-enhanced encryption forphysical layer security in an OFDM radio[C]//2009 IEEE Radio and Wireless Symposium.IEEE,2009:344-347.
[27]MA R,DAI L,WANG Z,et al.Secure communication in TDS-OFDM system using constellation rotation andnoise insertion[J].IEEE Transactions on Consumer Electronics,2010,56(3):1328-1332.
[28]OU Y,XIE J,LING J.An improved network terminal security evaluation index system[C]//2014 International Conference on Management of e-Commerce and e-Government.IEEE,2014:65-69.
[29]WEI F,ZHANG M.A risk assessment scheme of intellignet terminal based on attack tree[C]//2016 4th International Confe-rence on Cloud Computing and Intelligence Systems(CCIS).IEEE,2016:67-71.
[30]QIN N L,LI B,YAO X P.Research on security protection technology of smart mobile terminals based on national secret algorithm[C]//The 12th Academic Conference of the Electric Po-wer Communications Professional Committee of the Chinese So-ciety of Electrical Engineering.Chinese Society for Electrical Engineering,2019:386-390.
[31]LI X,ZHI Y,LIU Y,et al.New terminal security protectiontechnology based on level protection[J].Electronics World,2020(18):24-25.
[32]SCOTT-HAYWARD S,O'CALLAGHAN G,SEZER S.SDN security:A survey[C]//2013 IEEE SDN For Future Networks and Services(SDN4FNS).IEEE,2013:1-7.
[33]LAL S,TALEB T,DUTTA A.NFV:Security threats and best practices[J].IEEE Communications Magazine,2017,55(8):211-217.
[34]MAO Y L,CHEN L,YOU S L,et al.5G network slicing security isolation mechanism and application[J].Mobile Communications,2019,43(10):31-37.
[35]NIU B,YOU W,TANG H,et al.5G network slice security trust degree calculation model[C]//2017 3rd IEEE International Conference on Computer and Communications(ICCC).IEEE,2017:1150-1157.
[36]THANTHARATE A,PAROPKARI R,WALUNJ V,et al.Secure5G:a deep learning framework towards a secure network slicing in 5G and beyond[C]//2020 10th Annual Computing and Communication Workshop and Conference(CCWC).IEEE,2020:0852-0857.
[37]LI P,XU C,XU H,et al.Research on data privacy protection algorithm with homomorphism mechanism based on redundant slice technology in wireless sensor networks[J].China Communications,2019,16(5):158-170.
[38]YIN C,XI J,SUN R,et al.Location privacy protection based on differential privacy strategy for big data in industrial internet of things[J].IEEE Transactions on Industrial Informatics,2017,14(8):3628-3636.
[39]ZHENG J,AN X,ZOU C,et al.A cloaking-based approach to protect location privacy in location-based services[C]//Procee-dings of the 33rd Chinese Control Conference.IEEE,2014:5459-5464.
[40]SUGUNA M,ANUSIA R,SHALINIE S M,et al.Secure identity management in mobile cloud computing[C]//2017 International Conference on Nextgen Electronic Technologies:Silicon to Software ICNETS2.IEEE,2017:42-45.
[41]LI H,WANG L.Online orchestration of cooperative defenseagainst ddos attacks for 5G MEC[C]//2018 IEEE Wireless Communications and Networking Conference(WCNC).IEEE,2018:1-6.
[42]HUI H W,ZHOU C C,XING S,et al.A new resource allocationmechanism for security of mobile edge computing system[J].IEEE Access,2019,7:116886-116899.
[43]WANG Q,HU H,HU R Q.Secure and Energy-Efficient Off-loading and Resource Allocation in aNOMA-Based MEC Network[C]//2020 IEEE/ACM Symposium on Edge Computing(SEC).IEEE,2020:420-424.
[44]SUN Q,TIAN L,FENF C,et al.Research status of private network security based on 5G[J].Journal of Command and Control,2021(4):299-309.
[45]China Mobile Communications Group Co.,Ltd.China Mobile5G Industry Private Network Technical White Paper [R].Beijing,2020.
[46]China United Network Communications Group Co.,Ltd.China Unicom 5G Industry Private Network White Paper [R].Beijing,2020.
[47]JI X S,HUANG K Z,JIN L,et al.5G security technology research review[J].Mobile Communications,2019,43(1):34-39.
[48]ZHANG W J.Research on technical solutions of railway communication network security management center[J].China Safety Science Journal,2019,29(S2):88-92.
[49]TANG K.New security features and countermeasures for vertical industries based on 5G[J].ZTE Communications,2019,25(4):54-59.
[50]LI H Y,ZHAO J,LIU B Q,et al.Research on the technical route of high-speed railway infrastructure inspection and monitoring system[J].China Railway,2021(1):98-104.
[51]SONG X D,XU Y,NING Y,et al.Design and application of big data analysis platform for railway safety management[J].China Railway,2019(8):50-56.
[52]WU W,MA X N,LIU Y J,et al,Research on security strategies of railway data service platform[J].China Railway,2019(8):63-68.
[53]WU J X.Principles of cyberspace mimicry defense:generalizedrobust control and endogenous security[M].Beijing:Science Press,2018.
[54]YUN T Y,LUO J,PENG B,et al.Dynamic defense methods for endogenously secure industrial control networks[C]//2018 Chinese Automation Congress(CAC).IEEE,2018:635-639.
[55]HU A Q,FANG L T,LI T.Research on endogenous securitydefense system based on bionic mechanism[J].Chinese Journal of Network and Information Security,2021,7(1):11-19.
[56]ZHOU Z,KUANG X H,SUN L M,et al.Endogenous security defense against deductive attack:when artificial intelligence meets active defense for online service[J].IEEE Communications Magazine,2020,58(6):58-64.
[57]JIANG W Y,LIU B Y,WANG C.Endogenous security network architecture[J].Telecommunication Science,2019,35(9):20-28.
[58]GUO S Y,QI W Y,DAI M L,et al.Endogenous trusted net-work architecture for intelligent sharing[J].Journal on Communications,2020,41(11):86.
[59]SUN Y,YANG S,GONG G J,et al.Research on endogenous security of distribution Internet of Things based on trusted computing and blockchain[J].Huadian Technology,2020,42(8):61-67.
[1] BAI Wanrong, WEI Feng, ZHENG Guangyuan, WANG Baohui. Study on Intrusion Detection Algorithm Based on TCN-BiLSTM [J]. Computer Science, 2023, 50(11A): 230300142-8.
[2] ZHAO Yang, LI Lingyun, ZHAO Xiaoxia, LIU Xianhui, ZHANG Liang. Missing Localization Characteristic Estimation Algorithm for Passive UHF RFID Tag [J]. Computer Science, 2023, 50(6A): 220500055-6.
[3] CHEN Li-ping, XU Peng, WANG Dan-chen, XU Yang. Study on Formal Verification of EAP-TLS Protocol [J]. Computer Science, 2022, 49(11A): 211100111-5.
[4] LIU Xing-guang, ZHOU Li, LIU Yan, ZHANG Xiao-ying, TAN Xiang, WEI Ji-bo. Construction and Distribution Method of REM Based on Edge Intelligence [J]. Computer Science, 2022, 49(9): 236-241.
[5] SHAN Yong-feng, JIANG Rui, XU You-yun, LI Da-peng. Power Consumption Scheme Oriented to Full-duplex Multi-relay Cooperative SWIPT Networks [J]. Computer Science, 2022, 49(7): 280-286.
[6] QIU Xu, BIAN Hao-bu, WU Ming-xiao, ZHU Xiao-rong. Study on Task Offloading Algorithm for Internet of Vehicles on Highway Based on 5G MillimeterWave Communication [J]. Computer Science, 2022, 49(6): 25-31.
[7] XIAO Yong, JIN Xin, FENG Jun-hao. Cross-layer Matching Mechanism of Link Communication Rate for Heterogeneous Communication in Power System [J]. Computer Science, 2021, 48(11A): 495-499.
[8] SUN Yi-fan, MI Zhi-chao, WANG Hai, ZHAO Ning. Cluster-based Topology Adaptive OLSR Protocol for UAV Swarm Network [J]. Computer Science, 2021, 48(6): 268-275.
[9] CHENG Yun-fei, TIAN Hong-xin, LIU Zu-jun. Collaborative Optimization of Joint User Association and Power Control in NOMA Heterogeneous Network [J]. Computer Science, 2021, 48(3): 269-274.
[10] YU Tian-qi, HU Jian-ling, JIN Jiong, YANG Jian-feng. Mobile Edge Computing Based In-vehicle CAN Network Intrusion Detection Method [J]. Computer Science, 2021, 48(1): 34-39.
[11] ZHONG Xu-dong,HE Yuan-zhi,REN Bao-quan,DONG Fei-hong. Channel Allocation and Power Control Algorithm for Cognitive Satellite Networks Based on Cooperative Game Theory [J]. Computer Science, 2020, 47(1): 252-257.
[12] FANG Xu-yuan, TIAN Hong-xin, SUN De-chun, DU Wen-cong, QI Ting. Utility Function Heterogeneous Network Access Algorithm Based on Green Energy Perception [J]. Computer Science, 2019, 46(8): 127-132.
[13] QI Bin,WANG Yu,ZOU Hong-xia,LI Ji-xing. Adaptive Testing Technology Based on Cognitive Diagnostic in Cybersecurity [J]. Computer Science, 2019, 46(7): 102-107.
[14] ZHENG Ben-li, LI Yue-hui. Study on SDN Network Load Balancing Based on IACO [J]. Computer Science, 2019, 46(6A): 291-294.
[15] XU Fang, DENG Min, XIONG Zeng-gang, YE Cong-huan, XU Ning. Data Forwarding Algorithm Based on Multidimensional Context Matching in Mobile Social Networks [J]. Computer Science, 2019, 46(2): 81-87.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!