Research and application of 5G cloud-network-edge-end integrated in-depth security protection system

A 5G cloud-network-edge-end integrated in-depth security protection implementation scheme was innovatively proposed, the network security protection system of 5G customized network was explored, and the basic architecture, characteristics, implementation scheme and application effect of the system w...

Full description

Saved in:
Bibliographic Details
Main Author: Guoxin ZHANG
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2022-10-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022276/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530686019731456
author Guoxin ZHANG
author_facet Guoxin ZHANG
author_sort Guoxin ZHANG
collection DOAJ
description A 5G cloud-network-edge-end integrated in-depth security protection implementation scheme was innovatively proposed, the network security protection system of 5G customized network was explored, and the basic architecture, characteristics, implementation scheme and application effect of the system were introduced.In the implementation plan, two key points were emphasized.Firstly, by deploying the security system of the four aspects of the 5G cloud network, the edge and the end, the multi-level and multi-dimensional security protection capability was formed.Secondly, the operation process of the adaptation system, including one-key reinforcement, security defense, situational awareness and one-key emergency response was established.Finally, the practical application effect of the 5G cloud-network-edge-end integrated in-depth security protection system was given.
format Article
id doaj-art-971dc6e07dc24668a3416e7185b5da1b
institution Kabale University
issn 1000-0801
language zho
publishDate 2022-10-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-971dc6e07dc24668a3416e7185b5da1b2025-01-15T03:00:04ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012022-10-013817317959576708Research and application of 5G cloud-network-edge-end integrated in-depth security protection systemGuoxin ZHANGA 5G cloud-network-edge-end integrated in-depth security protection implementation scheme was innovatively proposed, the network security protection system of 5G customized network was explored, and the basic architecture, characteristics, implementation scheme and application effect of the system were introduced.In the implementation plan, two key points were emphasized.Firstly, by deploying the security system of the four aspects of the 5G cloud network, the edge and the end, the multi-level and multi-dimensional security protection capability was formed.Secondly, the operation process of the adaptation system, including one-key reinforcement, security defense, situational awareness and one-key emergency response was established.Finally, the practical application effect of the 5G cloud-network-edge-end integrated in-depth security protection system was given.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022276/5Gcloud-network-edge-endintegrationtrusted terminalend-to-end
spellingShingle Guoxin ZHANG
Research and application of 5G cloud-network-edge-end integrated in-depth security protection system
Dianxin kexue
5G
cloud-network-edge-end
integration
trusted terminal
end-to-end
title Research and application of 5G cloud-network-edge-end integrated in-depth security protection system
title_full Research and application of 5G cloud-network-edge-end integrated in-depth security protection system
title_fullStr Research and application of 5G cloud-network-edge-end integrated in-depth security protection system
title_full_unstemmed Research and application of 5G cloud-network-edge-end integrated in-depth security protection system
title_short Research and application of 5G cloud-network-edge-end integrated in-depth security protection system
title_sort research and application of 5g cloud network edge end integrated in depth security protection system
topic 5G
cloud-network-edge-end
integration
trusted terminal
end-to-end
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022276/
work_keys_str_mv AT guoxinzhang researchandapplicationof5gcloudnetworkedgeendintegratedindepthsecurityprotectionsystem