




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Preface
6Gnetworksareevolvingtowardscomplexityanddiversity,withincreasingopenness
leadingtofurtherblurringoftraditionalnetworksecurityboundaries.Asnetworkattack
methodscontinuetoescalate,futurenetworkscannotrelysolelyonpassivedefense
mechanismssuchasboundaryisolationandplug-insecuritycapabilitiestoensuresecurity.
Therefore,6Gnetworksshouldhavebuilt-insecuritygenestofullyguaranteethe
end-to-endsecurityandtrustworthinessof6Gnetworks.
Built-insecurityisaconceptandmethodforrealizing6Gsecurity.Itemphasizes
integratingsecurityasacoreelementandbasicfeatureintotheentirelifecycleof6G
networks.Securityisrootedin6Gnetworksandcoexistswiththenetwork,enabling6G
networkstohaveself-protection,self-repair,andself-adaptationcapabilities.Itproactively
respondstovariousthreatsandattacksthroughinternalmechanismstoimprovetheoverall
securityandreliabilityof6Gnetworks.
Thereconstructionof6Gnetworkarchitectureprovidesanopportunityandwindow
periodforestablishinganewsecuritysystem.TheIMT-2030(6G)PromotionGroup
pointedoutinthe"6GNetworkSecurityVisionTechnologyResearchReport"[1]that6G
networksecurityshouldhavethefourcharacteristicsof"activeimmunity,resilient
autonomy,digitaltwinsecurity,andubiquitouscollaboration";Inthe"6GTrustworthy
built-inSecurityArchitectureResearchReport"[2],itproposestheconceptofintegrating
"trust+security",andconstructsa6Gtrustworthybuilt-insecurityarchitecturefromthree
levelsofsecuritycapability,securitycontrol,andsecuritydecision-making.Itcollaborates
withdigitaltwinnetworks,artificialintelligenceanalysiscapabilities,andresource
orchestrationandschedulingcapabilities.Intheformofasecurityplane,itprovidesbuilt-in
securitygenesfor6Gnetworkstoachievethesecurityandreliabilityof6Gnetworks.
3/45
Figure1SchematicDiagramof6GTrustworthyBuilt-inSecurityArchitecture
Basedonthe6Gtrustworthybuilt-insecurityarchitecture,thiswhitepaperdescribes
theapplicationscenariosandsecurityrequirements,technicalprinciples,application
concepts,relatedchallenges,andsuggestionsofpotentialkeytechnologiesfor6Gsecurity
fromthreelevelsofsecuritycapability,securitycontrol,andsecuritydecision.Amongthem,
Chapter1WirelessPhysicalLayerSecurityTechnology,Chapter2DistributedTrust
Technology,Chapter3UbiquitousTrustedTechnology,Chapter4QuantumSecurity
Technology,andChapter5PrivacyProtectionTechnologybelongtothepotentialkey
technologiesatthesecuritycapabilitylevel;Chapter6SecurityCapabilityService-Oriented
TechnologyandChapter7MimicDefenseTechnologybelongtothepotentialkey
technologiesatthesecuritycontrollayer;Chapter8AISecurityManagementandDecision
TechnologyandChapter9DTNSecurityDeductionTechnologybelongtothepotentialkey
technologiesatthesecuritydecision-makinglayer.Theabovethreecategoriesof
technologieswillsupportthedesignoftheoverall6Gtrustworthybuilt-insecuritysystem
aroundthegoalsoftrustandsecurity.
4/45
I.WirelessPhysicalLayerSecurityTechnology
1.1ScenariosandSecurityRequirements
Inthefuture,thetypesandquantitiesof6Gterminalswillcontinuetoincrease.Various
InternetofThings(IoT)deviceswithdifferentcapabilitieswillgraduallybecomethemain
force.However,mostIoTterminalshavelimitedprocessingcapabilitiesandcannotcarry
complexsignalingandprocessingoverhead.Inaddition,theyaredistributedindifferentopen
electromagneticenvironments,facingseverewirelesssecuritychallenges[3].Wireless
physicallayersecurity(PLS)technologyutilizesthenaturalsecurityattributesofwireless
channels,suchasanisotropy,randomvariability,andthird-partyuncertainty,toprovide
securitycapabilitiesthatcanbeintegratedbutdonotrelyontraditionalsecuritymechanisms.
Byminingandutilizingthebuilt-insecurityattributesofwirelesschannels,PLScanachieve
theintegrateddesignofcommunicationandsecurity,whichisexpectedtoprovidelightweight
securitycapabilitiesfortheinformationsecurityof6GInternetofThings[4].Wirelessbuilt-in
securitytechnologyisbasedonthetheoryofphysicallayersecurity,whichcanachievethe
endogenousintegrateddesignofcommunicationandsecuritybyfurtherexploringand
utilizingthebuilt-insecurityattributesofwirelesschannels.Underthestimulationofnew
technologiessuchasReconfigurableIntelligentSurface(RIS)andintegratedsensingand
communication,wirelessbuilt-insecuritytechnologycanfurtherperceive,customize,and
manipulatetheelectromagneticenvironmentmorefinely,therebyactivelyshapingtheoptimal
environmentforcombatingwirelessdisturbancesandprovidingadaptivesecuritycapabilities
for6G.
1.2TechnicalPrinciples
(1)PhysicalLayerKeyGeneration
Thephysicallayerkeygenerationtechnologyutilizeschannelreciprocity.The
transmitterandreceivercanrespectivelyobtainconsistentchannelfeatures,suchaschannel
stateinformationandreceivedsignalstrength,togenerateconsistentphysicallayerkeys.
However,thenaturalwirelesschannelisuncontrollable.ByusingRISandotherpotentialkey
technologiesof6G,thewirelessenvironmentcanbeactivelyremodeled,throughoptimizing
thechannelconditionsofcommunication,andreducingthecorrelationbetweenthelegitimate
channelandtheeavesdroppingchannel,increasestherandomnessofthechannelandthe
5/45
entropyofthechannelasarandomsource,therebygreatlyimprovingthekeygeneration
performance.
(2)PhysicalLayerSecurityTransmission
Thephysicallayersecuritytransmissiontechnologydesignssecurebeamformingbased
onthecharacteristicsofwirelesschannels.Itmayincorporatetheartificialnoiseinjectionto
ensurereliabletransmissionofconfidentialinformationwithinthedesiredchannelspace,
whileattemptingtotransmittheartificialnoiseasmuchaspossibleinthenullspaceofthe
desiredchannel,thusmaximizingthecapacityforsecuretransmission.Additionally,RIScan
beleveragedtocustomizeandoptimizethewirelessenvironment,amplifyingthequality
differencebetweenlegitimatechannelsandeavesdroppingchannels,therebyachievingsecure
transmission.
(3)ChannelFingerprintAuthentication
Channelfingerprintauthenticationutilizestheuniquenessandtime-spacespecificityof
wirelesschannelstorealizetheauthenticationofnodeidentityornetworkpacketsthrough
continuouschannelcomparisonorchannelcomparisonwithincoherenttime.Inessence,the
channelcharacteristicsareusedtoadd"positionstamp"tousers.Inthatcase,itnotonly
increasesthelengthofthetrustedroot,butalsoextendsthetraditionaltrustedroot
comparisonandauthenticationmechanismbasedonidentityinformationindextothe
authenticationofwirelesssignals,resistingunknownwirelessaccessattacks.
1.3TechnologyApplicationConcepts
Wirelessbuilt-insecuritytechnologycansolvesecuritythreatsinthephysicallayer
signaldomain,suchaswirelesseavesdropping,wirelessinterference,andwirelessdeception,
thusbuilding6Gairinterfacephysicallayersecurityatomiccapabilities.Furthermore,it
couldbeintegratedintotheupper-layersecuritycapabilitylayertoformanintegratedsecurity
capability,whichcouldprovideasecureandtrustedfoundationforupper-layerapplicationsto
meetdifferentiatedsecurityprotectionrequirements.Thewirelessbuilt-insecuritymechanism
couldprovidesecuritycapabilitieswhichdonotdependoncomputationalcomplexity,reduce
therequirementsforterminalenergyconsumptionandprocessingcapabilities,andmeetthe
securityandlightweightrequirementsoftypical6Gapplicationscenarios.Forexample,in
massiveIoTscenarios,thephysicallayerkeygenerationtechnologycanbecombinedwith
theupper-layerkeysystemorlightweightencryptionalgorithmtoreducetheburdenofkey
distribution/management,andimprovesecuritywhilereducingcomputationalcomplexity.
Atthesametime,byusing6GpotentialkeytechnologiessuchasExtremelyLarge-Scale
MIMOantennas,RIS,andintegratedsensingandcommunication,wecanactivelycontroland
6/45
finelyperceivethewirelessenvironment,excavateandcustomizewirelesschannel
information,andimprovecommunicationqualitywhileassistinginimprovingwireless
securityperformance.
Figure2SchematicDiagramofApplicationConceptsofWirelessPhysicalLayer
SecurityTechnology
1.4ChallengesandSuggestions
Leveragingtheinherentsensingandcontrolchannelcapabilitiesof6G,itisexpectedto
constructanewwirelessphysicallayersecuritytechnologywithintelligentnativeintegration.
However,therelatedresearchisstillinitsinitialstageandneedstobeexploredasfollows:
Utilizeemerging6GtechnologiessuchasRIS,integratedsensingandcommunication,etc.,to
enhancetheabilityforchannelcustomizationandprecisesensing,exploringtheempowering
mechanismfromsensingcapabilitiestosecurecommunicationcapabilities,achievingthe
integrateddesignofcommunication,sensing,andsecurity;Utilizethedeepintegrationof
physicallayersecurityandupper-layersecuritymechanismstofurtherimprovetherobustness
of6Gsecurity;Designandtesttheperformanceevaluationstandards,methodsand
experimentalanalysisofphysicallayersecuritytechnologyaccordingto6Gsecurity
requirements,layingthefoundationforitsengineeringapplications,andconstructinga
wirelessendogenoussecurityperformanceevaluationsystem.
II.DistributedTrustTechnology
2.1ScenariosandSecurityRequirements
Theopennetworkecologyandheterogeneousintegratednetworkarchitectureof6Gput
forwardnewrequirementsforthetrustsystem.Ontheonehand,6Gnetworkshavethe
characteristicsofcross-network,cross-industry,anddeepparticipationofallpartiesinthe
ecology.6Gnetworkswillsupportmulti-partyresourcesharing.Spectrumresourcesand
7/45
computingpowerwillbecomenetworkresourcesthatcanbedynamicallyandon-demand
sharedbymultiplepartiesinthe6Geratoachieveresourcesharing,valuetransferand
monetization.Therefore,thereisaneedforadecentralized,open,transparent,and
tamper-proofoperationalmechanismthatcanbuildconsensusamongmultipleparties,address
resourcecompetitionissues,andensuretheentireprocessisopen,transparent,and
trustworthy[5].
Ontheotherhand,6Gnetworkssupportheterogeneousnetworkssuchassatellite
networks,industrynetworks,andbodyareanetworks.Devicesfromdifferentorganizations
andinstitutionsneedtoestablishsecureandreliabletrustrelationships.Traditional
telecommunicationsnetworksmainlyadoptcentralizedandendorsementtrustmodels.Inthe
future,6Gnetworksneedtointroducetrustmodelsbasedonconsensus.Theentities
participatinginthenetworkusetechnicalmeanstoachievemutualtrustamongmultiple
partiessothattherootoftrustnolongerdependsonasinglepointbutiscomposedof
multipleparticipatingparties[6].
2.2TechnicalPrinciples
Blockchainisthefoundationofdistributedtrust.Blockchaintechnologyisessentiallya
decentralizeddatabasethatwritesinformationintoablockandformsachainofblocksby
connectingeachblock.Eachblockcontainsinformationaboutthepreviouslyconnectedblock
andusescryptographictechniquessuchashashalgorithmstopreventthecontentand
connectionoftheblockfrombeingtamperedwith.Blockchainhasthecharacteristicsof
decentralization,openness,transparency,traceability,andtamper-proof[5].Thekey
technologiestoimplementblockchaincanbesummarizedasP2Pprotocol,consensus
algorithm,ledgerstructure,incentivemechanism,smartcontract,cryptographicalgorithm,
etc.
Accordingtotheaccesssystemauthorizationmethodofparticipants,blockchainsystems
canbedividedintotwocategories:Permissionlessblockchainsystems,whereanyonecan
accessthesystemwithoutauthorization,andparticipantsareuntrusted;Permissioned
blockchainsystems,whereparticipantscanonlyaccessthesystemafterbeingauthenticated,
andparticipantsdonotfullytrusteachother(semi-trusted).Accordingtothedifferent
applicationscopesofblockchain,thepermissionedblockchainsystemscanbedividedinto
consortiumchainsandprivatechains.Aconsortiumchainisablockchainjointlymanagedby
multipleinstitutions[6].
Inadditiontousingblockchaintobuildatrustbase,6Galsoneedstodesignadistributed
authenticationscheme.Theauthenticationofatelecommunicationnetworkconsistsoftwo
8/45
parts.Oneistheauthenticationbetweentelecommunicationnetworkdevices.Thecurrent
methodmainlyadoptsthepublickeycertificatemethod,andthetrustrootisusuallytheCA
oftheoperatororequipmentvendor.Thisisakindofendorsementtrustmechanism[6].
DecentralizedPublicKeyInfrastructure(DPKI)maybecomeanalternativetechnologyfor
distributeddeviceauthentication.Bybuildingatrustplatformcollaboratively,andstoring
certificatesandcertificateverificationprocessesinadistributedmanner,DPKIcanachieve
cross-domaincertificateverification,enhancingthetrustworthinessandreliabilityofCAs.
Thesecondistheauthenticationbetweentelecommunicationnetworkusersandthe
network.Currently,theidentityofauseristypicallycreatedbyoperatorsandissuedwhen
theusersignscontractswiththeoperator.Allidentitiesarecentrallycreated,maintained,and
managedbytheoperator,essentiallyconstitutingacentralizedauthenticationscheme.Digital
identitymayemergeasanalternativetechnologyfordistributeduserauthentication.
DecentralizedIdentifiers(DID)definedbytheW3Careaverifiable,decentralizedformof
digitalidentity.DIDisheldbythecontroller,decoupledfromthecentralizedregistration
authority,identityproviderandcertificateauthority,anddoesnotrequireanyendorsement
fromotherparties.
2.3TechnologyApplicationConcepts
(1)6GBlockchain
The6Gblockchainisbasedonthe6Gnetworkastheinfrastructure,andmobile
communicationnetworknodesastheinfrastructurenodesofblockchain.6Gblockchain
serves6Gservices,andaroundthecorefunctionof"multi-partytrust",itprovidesasecure
andtrustedplatformforupper-layerservice.Theservicealsoneedstoreshapetheservice
proceduresduetotheintroductionofblockchain[7].Accordingtothedifferentrolesof
blockchainintelecomnetworks,blockchainisdeployedindifferentpositionsofthenetwork,
andtherearethreedeploymentmodes.Thefollowingfigureisaschematicdiagram:
9/45
Figure3SchematicDiagramofBlockchainDeployment
1)Underlyingblockchainmode:Thecorenetworkblockchainmoduleisdeployedat
thelevelofnetworkelementsornetworkmanagement,generatinginitialblockchain
nodesaftertheestablishmentofthenetwork,andundertakingthefunctionsof
blockchainconstruction,maintenance,andpermissionauthenticationofblockchain
nodes.Theblockchaincapabilitiesofaccessnetworksandterminals(inwhich
blockchainclientsmaybeprovided)arepre-installedandcanbeusedafteraccesstothe
network.Theblockchainexistswiththeestablishmentofthenetworkandcanrealize
functionssuchasuserauthenticationandauthorizationandcorenetworkservice
discoveryempoweredbyblockchain.
2)Upper-layerblockchainmode:Theblockchainisbuiltontopoftheexistingtelecom
networkarchitecture,andblockchainfunctionscanbepluggedinorremovedaccording
torequirements.Theblockchainfunctionalityisdeployedintheformofnetwork
functionsinthecorenetwork,evolvingindependentlyanditeratingquickly.The
blockchaincapabilitiesofaccessnetworksandterminals(inwhichblockchainclients
maybeprovided)canbeissuedbythecorenetwork,andtheblockchaincapabilitiescan
befreelyconfiguredaccordingtorequirements.
3)Hybridblockchainmode:Theblockchainmoduleisdividedintotwoparts,onepart
belongingtothebasicfunctionsofthetelecomnetwork,deployedintheunderlying
mode,andonlycontainingbasictrustfunctionssuchasidentityauthentication;Theother
partbelongstotheservicefunctionsofthetelecomnetwork,deployedintheupper-layer
mode,andadditionalfunctionscanbeaddedorremovedasneeded.
(2)DistributedAuthentication
Fordistributedauthenticationamongtelecomnetworkdevices,6Gnetworkswill
introducetheDPKItechnologybasedonblockchain.Itwillleveragetheblockchain's
10/45
characteristicsofopennessandtransparency,consensusamongmultipleparties,and
tamper-prooftobuildatrustalliance,enablingblockchain-basedcertificateandidentity
management,transparentauditing,andcross-domainverification.Therearethreemain
technicalapproaches:First,therealvaluesofcertificatesarestoredinastoragesystem,while
thehashesofcertificatesarestoredintheblockchain.Theblockchainmaintainstheintegrity
ofthedata,therebypreventingfromthefailureofnodesinthestoragesystemduetoattacks.
Second,operatorsformaconsortiumchain,witheachoperatorwritingtheircertificatesand
CAcertificatesrequiredfornetworkoperationsintotheconsortiumchain.During
authentication,completecertificatesdonotneedtobeprovided,andonlythecorresponding
identifiersontheblockchainneedtobecarried.Third,devicepublickeysaregeneratedbased
onidentityinformation,withouttheneedforsignaturesfromauthoritativeentitiesortheuse
ofdigitalcertificates,simplifyingthecomplexityofkeymanagement[7].
Fordistributedauthenticationbetweentelecomnetworkusersandthenetwork,6G
networkswilladoptdigitalidentitytechnology.Usershavetheirowndigitalidentitiesandcan
autonomouslycontrolthescopeoftheiridentities'useindifferenttrustdomainsorservices,
selectivelysharingspecificidentityinformationwithentitiesthatneedverification.Digital
identitycansupportanonymousidentityverification.Userscanprovidethenecessaryidentity
informationwhentheyneedtoverifytheiridentity,whilesimultaneouslyprotectingtheir
privacy;Identityauthenticationisextendedtoallentitieswithinthenetwork,encompassing
notonlyuserauthenticationbutalsotheauthenticationofdigitalpersonas,AIassistants,
networknodes,andevendistributedautonomousnetworksasawhole;Combiningdigital
identitywithsmartcontractscanrealizeautomatedidentityauthenticationandpermission
control.
2.4ChallengesandSuggestions
Blockchainfacestheimpossibletriangleofsecurity,transactionrate,and
decentralization.Itisimpossibletosimultaneouslyachieveallthree.Ifblockchainisapplied
to6Gnetworks,theexistingblockchainarchitectureusedintheinternetcannotcopewiththe
largeandfasttransactionscharacteristicof6G.Thispresentsacriticalflaw,asthesecurity
andtransactionratefallshortofrequirements,significantlyimpactingsystemsecurity.
Therefore,researchisneededonaspectsofblockchainsuitablefor6Gnetworks,including
ledgerstructure,deploymentmode,consensusalgorithm,andapplicationmode.Ananalysis
ofthethreesidesoftheimpossibletriangleisnecessarytoselectthemostsuitableblockchain
for6Gnetworks.
Distributedauthenticationintroducesanewwayofmanagingandverifyingcertificates
11/45
andidentities,bringingnewchallengestothenetwork.Firstly,effectivelymanaging,storing,
andtransmittingdistributedcertificatesandidentitiespresentsachallenge.Thisrequires
consideringdatareliabilityandmaintainingdataconsistency.Secondly,theauthentication
processbeforenetworkentitiesinteractneedstobereconstructed.Newandadvanced
cryptographictechnologiescanbeutilizedtoenhancethesecurityandverificationefficiency
ofcertificatesandidentities,ensuringsecureprotectionandefficientverificationduring
distributedstorage.Furthermore,theintroductionofsmartcontracttechnologycanrealize
automatedauthenticationandpermissioncontrolofcertificatesandidentities,ultimately
improvingsystemefficiency.
12/45
III.UbiquitousTrustTechnology
3.1ScenariosandSecurityRequirements
The6Gcloud-edge-terminalconvergedarchitecturewillblurthetraditionalsecurity
boundaries,requiringcross-domainandconsistentsecuritysolutionstorealizeaunified
orchestrationofsecuritypolicies.Atthesametime,thedevelopmentofgenerativeartificial
intelligencewillgreatlyreducetheattackthresholdandimprovetheautomationofattacks.
Traditionalsecurityprotectionmechanismsofdetectingandthenfilteringwillnotbeableto
meettherequirementsofmassiveserviceconnectionsandlowlatency.6Gnetworksneeda
securitytechnologythatdoesnotrelyonpriorknowledgeofattacks,doesnotaffectservice
processingperformance,andcanensurethesecurityofdataprocessingandcross-domain
interconnectionandinteroperability.Thistechnologyshouldalsobeabletoprovidea
consistentsecuritysolutionforthecloud,edge,andterminal,andprovidereal-time
assessmentandprotectionofnetworkassets.
3.2TechnicalPrinciples
Trustedcomputingisatechnologybasedonhardware,software,andprotocolsthataims
toprotecttheintegrity,availability,andconfidentialityofcomputersystems,prevent
unauthorizedaccessandattacks,andprovidetheabilitytoverifyandassessthe
trustworthinessofcomputersystems.Trustedcomputingmainlyincludesthefollowingkey
technologies:secureboot,securemetric,remoteauthentication,trustedexecution
environment,andmemory/virtualmachinesecurity.
(1)SecureBootandTrustedMetric
Byverifyingtheintegrityandauthenticityofthefirmware,operatingsystem,anddrivers
duringthesystembootprocess,itensuresthatonlyauthorizedsoftwareisloadedand
executed.Thisfunctioncaneffectivelydetectandpreventunauthorizedortamperedsoftware
frombeingloadedandexecutedduringthebootprocess,thuseffectivelypreventingthe
intrusionofmalicioussoftware.Itcanalsopreventattacksonchipsbyexploitinghardware
vulnerabilities.Theapplicationofsecurebootandtrustedmetriccanensurethatassetscanbe
discoveredintimewhenattackedbymalicioussoftware.Throughtheremoteauthentication
server,thesecuritypostureofallassetscanbeevaluated,sothatsecurityO&Mpersonnelcan
performsecurityO&Monassetsmoreefficiently.
13/45
(2)TrustedExecutionEnvironment
Atrustedexecutionenvironmentprovidesanenvironmentthatisisolatedfromthemain
operatingsystem.Thismeansthatevenifthemainoperatingsystemisattacked,sensitive
dataandcodewillnotbeaffected.Atthesametime,applicationsrunninginthetrusted
executionenvironmentcansecurelyprocesssensitivedatawithoutworryingaboutthisdata
beingaccessedbymalicioussoftwareorunauthorizedapplications.Forusers,sincethe
trustedexecutionenvironmentallowsequipmentmanufacturersandapplicationdevelopersto
buildaverifiablechainoftrust,ensuringthateverylinkfromboottoruntimeissecure,it
increasesusertrustindevicesandapplications.Therefore,thetrustedexecutionenvironment
canbeusedtoprotectassetsthatareinaninsecureenvironmentorassetsthatrunhigh-risk
applicationsandprocesssensitivedata.
3.3TechnologyApplicationConcepts
Byapplyingtrustedcomputingsolutionsin6Gnetworks,itispossibletoprovideusers
of6Gnetworkswithahigherlevelofsecurity,andallow6Gnetworkmaintainerstoprovide
thesamequalityofserviceatalowercostandwithlessenergyconsumption.
Acompletetrustedcomputingsolutionrequiresthecollaborationofchips,firmware,
operatingsystems,etc.Thefollowingfigureshowstherelationshipbetweenkeytrusted
computingtechnologies:
Figure4SchematicDiagramoftheRelationshipBetweenKeyTechnologiesofTrusted
Computing
Ascanbeseenfromthefigureabove,therootoftrustisthecornerstone,providinga
trustedfoundation.Securemetricbuildsachainoftrusttoextendtrusttotheoperatingsystem
andapplications.Thetrustedexecutionenvironmentprovidesasecuritymechanismtoprotect
14/45
sensitivedataprocessedduringapplicationexecution.Sincetherootoftrustislocatedina
read-onlyareaandtrustedverificationislocatedonaremoteserver,itisdifficultforattackers
touploadmalicioussoftwareortamperwithapplications.
Forassetsthathaveappliedtrustedcomputingsolutions,O&Mstrategiesaremore
concernedwithhowtoconfigurethemsothatattackerscannotcauseharm,ratherthanthe
attacksandattackvectorslaunchedagainsttheassets.Thismakessecurity
detection/protectionnolongerinserieswiththebusiness,notonlyeliminatingtheproblems
ofincreasedservicelatency,bandwidth,andimpactonservicecontinuitycausedbysecurity
detection/defense,butalsogreatlyreducingtheresourceconsumptionandenergy
consumptionofsecuritydetection/defense.
ForsecurityO&M,trustedcomputingprovidesaunifiedsolutionforheterogeneous
assets.Throughthesameprotocol,theremoteauthenticationservercontinuouslyevaluates
thesecuritystateofassets,providinganendorsementforcross-domaininterconnectionand
interoperability.Assetsthatfallintoanuntrustedstatecanbequicklydiscoveredandisolated.
Fordataproviders,trustedcomputingprovidesanisolatedsecureoperatingenvironment.
Sensitive/privatedataistransmittedencryptedandprocessedinanisolatedmemoryareabya
secureapplicationdevelopedbythedataprovider.Thistechnica
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025-2030中国木薯行业市场发展现状及竞争格局与投资前景研究报告
- 2025-2030中国有色金属压延加工行业市场现状分析及竞争格局与投资发展研究报告
- 2025-2030中国有机早餐谷物市场现状趋势与前景战略分析研究报告
- 2025-2030中国月饼行业市场现状供需分析及投资评估规划分析研究报告
- 2025-2030中国智能视频行业市场发展分析及发展前景与投资研究报告
- 2025-2030中国智能手机控制台行业市场发展趋势与前景展望战略研究报告
- 2025-2030中国智能坐便器行业发展分析及发展趋势预测报告
- 2025-2030中国晕车药行业市场发展现状及发展趋势与投资风险研究报告
- 2025-2030中国易切削铜市场营销发展趋势与未来前景展望报告
- 2025-2030中国日晒产品行业市场发展趋势与前景展望战略研究报告
- 同时性结直肠癌肝转移治疗进展
- 总监理工程师代表安全监理职责
- 钢筋安装施工技术交底
- GB/T 44990-2024激光熔覆修复层界面结合强度试验方法
- 《伤逝》介绍课件
- 《电梯维保规则》课件
- 华为错混料预防管理
- 5.1 人民代表大会:我国的国家权力机关 课件-高中政治统编版必修三政治与法治-1
- 热处理作业指导书范文
- DB14-T 2826-2023 地下水监测系统运行维护规范
- 高三冲刺毕业家长会课件2024-2025学年
评论
0/150
提交评论