Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2023, Vol. 49 ›› Issue (12): 40-47.doi: 10.12267/j.issn.2096-5931.2023.12.005

Previous Articles     Next Articles

Endogenous security and trust architecture of Network 5.0

MA Zheng1, YAN Xincheng2, ZHOU Jihua2, JIANG Lintao3   

  1. 1. Research Institute of China United Network Communications Corporation Limited, Beijing 100048, China
    2. Security Platform Department, ZTE Corporation, Shenzhen 518057, China
    3. China Academy of Information and Communications Technology, Beijing 100191, China
  • Received:2023-11-10 Online:2023-12-25 Published:2024-01-04

Abstract:

Network 5.0 is a future-oriented data network communication architecture. One of the most basic features of this network architecture is the ability of ensuring endogenous security and trust. Based on this technical feature, this paper first discusses the current situation of network security threats and the shortcomings of traditional network security protection models. Then, it analyzes and sorts out the security requirements of major application scenarios of Network 5.0. It also proposes the security and trust architecture and implementation mechanism for Network 5.0, and discusses the typical key technologies for security of Network 5.0. Finally, it introduces the relevant practices carried out in the field of Network 5.0, and proposes suggestions for future research directions.

Key words: Network 5.0, endogenous security, trusted access, trusted identity

CLC Number: