信息通信技术与政策

信息通信技术与政策

信息通信技术与政策 ›› 2025, Vol. 51 ›› Issue (1): 52-55.doi: 10.12267/j.issn.2096-5931.2025.01.008

专题:网络安全 上一篇    下一篇

6G安全需求和关键技术探讨

Discussion on 6G security requirements and key technologies

卢丹, 崔颖, 何异舟, 韩文婷   

  1. 中国信息通信研究院安全研究所,北京 100191
  • 收稿日期:2024-07-01 出版日期:2025-01-25 发布日期:2025-02-14
  • 作者简介:
    卢丹, 中国信息通信研究院安全研究所重要通信部主任,主要负责移动通信网重要通信、5G/6G安全等领域的研究工作;
    崔颖, 中国信息通信研究院安全研究所重要通信部副主任,主要负责移动通信网重要通信、5G/6G安全等领域的研究工作;
    何异舟, 中国信息通信研究院安全研究所副总工程师,高级工程师,主要负责5G/6G安全、卫星通信网等领域的研究工作;
    韩文婷, 中国信息通信研究院安全研究所重要通信部工程师,主要负责5G/6G安全研究工作。

LU Dan, CUI Ying, HE Yizhou, HAN Wenting   

  1. Security Research Institute, China Academy of Information and Communications Technology, Beijing 100191, China
  • Received:2024-07-01 Online:2025-01-25 Published:2025-02-14

摘要:

当前,全球6G研究处在高度活跃期,各方都在持续推动6G安全工作。首先,梳理了国际上6G安全标准化以及在6G安全关键技术研究上的进展;然后,从国际电信联盟发布的6G典型应用场景出发,分析了6G网络的安全需求;最后,结合6G安全需求,探讨了6G安全需要重点研究的关键技术,并对6G安全未来发展及研究方向进行了展望。

关键词: 6G安全, 后量子密码算法, 隐私保护技术

Abstract:

Currently, global 6G research is in a highly active period, and all parties are continuously promoting 6G security work. This article firstly reviews the international standardization of 6G security and the progress about key technologies of 6G security. Then, starting from the typical application scenarios of 6G released by the International Telecommunication Union, the security requirements of 6G networks are analyzed. Finally, based on the security requirements of 6G, the key technologies that need to be studied in 6G security are discussed, and the future development and research directions of 6G security are proposed.

Key words: 6G security, post-quantum cryptography algorithm, privacy protection technology

中图分类号: