What is it about?

Cloud-network integration is the mainstream technology route for next-generation wireless networks. Traditional wireless network security belongs to the portion security that cannot address the systematic security requirements of the next-generation wireless networks. This paper establishes a Cloud-Network-End collaborative security architecture, forms a systematic security protection mechanism, and constitutes a security paradigm for next-generation wireless networks.

Featured Image

Why is it important?

Combined with advanced computing such as cloud computing and AI, it is an important way for next-generation wireless networks to break through the Shannon capacity limit and improve communication capabilities, forming a computing-based communication paradigm. The integration of wireless networks and cloud computing produces a Cloud-Network-End collaborative service architecture, which is based on End(or Cloud)-End non-interactive collaborative computing and supports task-driven End(or Cloud)-End communication. Information services have become a typical data-sharing mode for next-generation wireless networks. Traditional wireless network security is centered on communication security that is portion security, which cannot address the systematic security requirements of next-generation wireless networks. A Cloud-Network-End collaborative security architecture is proposed focusing on the communication security and computing security issues of next-generation wireless networks, based on the one-time pad security principle and adopting the zero-trust security strategy. The architecture established semantic communication security and service computing security mechanisms to support information service security. Finally, a systematic security mechanism and a security paradigm for next-generation wireless networks emerged.

Read the Original

This page is a summary of: Cloud-Network-End Collaborative Security for Wireless Networks: Architecture, Mechanisms, and Applications, Tsinghua Science & Technology, February 2025, Tsinghua University Press,
DOI: 10.26599/tst.2023.9010158.
You can read the full text:

Read

Contributors

The following have contributed to this page