What is it about?
Cloud-network integration is the mainstream technology route for next-generation wireless networks. Traditional wireless network security belongs to the portion security that cannot address the systematic security requirements of the next-generation wireless networks. This paper establishes a Cloud-Network-End collaborative security architecture, forms a systematic security protection mechanism, and constitutes a security paradigm for next-generation wireless networks.
Featured Image
Photo by Nastya Dulhiier on Unsplash
Why is it important?
Combined with advanced computing such as cloud computing and AI, it is an important way for next-generation wireless networks to break through the Shannon capacity limit and improve communication capabilities, forming a computing-based communication paradigm. The integration of wireless networks and cloud computing produces a Cloud-Network-End collaborative service architecture, which is based on End(or Cloud)-End non-interactive collaborative computing and supports task-driven End(or Cloud)-End communication. Information services have become a typical data-sharing mode for next-generation wireless networks. Traditional wireless network security is centered on communication security that is portion security, which cannot address the systematic security requirements of next-generation wireless networks. A Cloud-Network-End collaborative security architecture is proposed focusing on the communication security and computing security issues of next-generation wireless networks, based on the one-time pad security principle and adopting the zero-trust security strategy. The architecture established semantic communication security and service computing security mechanisms to support information service security. Finally, a systematic security mechanism and a security paradigm for next-generation wireless networks emerged.
Read the Original
This page is a summary of: Cloud-Network-End Collaborative Security for Wireless Networks: Architecture, Mechanisms, and Applications, Tsinghua Science & Technology, February 2025, Tsinghua University Press,
DOI: 10.26599/tst.2023.9010158.
You can read the full text:
Contributors
The following have contributed to this page