浏览全部资源
扫码关注微信
1. 北京邮电大学网络与交换技术国家重点实验室,北京 100876
2. 紫金山实验室,江苏 南京 211111
[ "谢人超(1984- ),男,福建南平人,博士,北京邮电大学教授、博士生导师,主要研究方向为算力网络、工业互联网和移动边缘计算等" ]
[ "文雯(2001- ),女,安徽宿州人,北京邮电大学博士生,主要研究方向为算力网络、边缘计算、区块链等" ]
[ "唐琴琴(1994- ),女,广西桂林人,博士,北京邮电大学在站博士后,主要研究方向为边缘计算、星地协同网络等" ]
[ "刘云龙(2000- ),男,河南郑州人,北京邮电大学硕士生,主要研究方向为边缘计算、算力网络、任务调度等" ]
[ "谢高畅(1997- ),男,山东泰安人,北京邮电大学博士生,主要研究方向为边缘计算、算力网络等" ]
[ "黄韬(1980- ),男,重庆人,博士,北京邮电大学教授,主要研究方向为路由与交换、软件定义网络" ]
网络出版日期:2023-04,
纸质出版日期:2023-04-25
移动端阅览
谢人超, 文雯, 唐琴琴, 等. 轨道交通移动边缘计算网络安全综述[J]. 通信学报, 2023,44(4):201-215.
Renchao XIE, Wen WEN, Qinqin TANG, et al. Survey on rail transit mobile edge computing network security[J]. Journal on communications, 2023, 44(4): 201-215.
谢人超, 文雯, 唐琴琴, 等. 轨道交通移动边缘计算网络安全综述[J]. 通信学报, 2023,44(4):201-215. DOI: 10.11959/j.issn.1000-436x.2023071.
Renchao XIE, Wen WEN, Qinqin TANG, et al. Survey on rail transit mobile edge computing network security[J]. Journal on communications, 2023, 44(4): 201-215. DOI: 10.11959/j.issn.1000-436x.2023071.
在环境复杂、乘客密集、高速移动的轨道交通场景中引入移动边缘计算(MEC)技术可满足其对低时延、移动性和海量连接等的需求。然而,MEC 在改善轨道交通通信网络性能的同时也带来了安全挑战。首先对轨道交通通信网络和MEC进行了概述;然后讨论了MEC在轨道交通中的价值和轨道交通移动边缘计算网络的架构;接着分析了轨道交通移动边缘计算网络面临的安全威胁并提出了防护方案;最后提出了一些开放性问题,希望对后续的研究提供思路。
The introduction of mobile edge computing (MEC) technology in rail transit which has the characteristics of complex environment
high densities of passengers
and high-speed mobility can meet the low latency
mobility
and massive connection requirements of rail transit.However
MEC not only improves the performance of rail transit communication network but also brings security challenges.Firstly
an overview of rail transit communication network and MEC was given.Then the value of introducing MEC into rail transit and the architecture of rail transit edge computing network were discussed.After that
the security threats faced by rail transit edge computing network was analyzed and protection scheme was proposed.Finally
some open questions were proposed
which was expected to provide ideas for future research.
LIEM M , MENDIRATTA V B . Mission critical communication networks for railways [J ] . Bell Labs Technical Journal , 2011 , 16 ( 3 ): 29 - 46 .
WU H , LI F , DU C X , et al . City urban rail transit train-ground wireless communication network research based on LTE technology [C ] // Proceedings of 2020 IEEE International Conference on Information Technology,Big Data and Artificial Intelligence (ICIBA) . Piscataway:IEEE Press , 2020 : 217 - 220 .
纪艺勇 . LTE技术在地铁专用通信系统中的应用方案 [J ] . 中国科技纵横 , 2016 ( 21 ): 21 - 22 .
JI Y Y . Application research on LTE technology in subway dedicated communication system [J ] . China Science & Technology Overview , 2016 ( 21 ): 21 - 22 .
彭亚枫 . 城轨 CBTC 系统中间人攻击检测与防御方法研究 [D ] . 北京:北京交通大学 , 2018 .
PENG Y F . Research on detection and defense method of man-in-the-middle attack in CBTC system of urban rail transit [D ] . Beijing:Beijing Jiaotong University , 2018 .
熊桢 . 轨道交通无线通信系统业务类型及技术方案探析 [J ] . 智能城市 , 2020 , 6 ( 12 ): 172 - 173 .
XIONG Z . Analysis on the service type and technical scheme of rail transit wireless communication system [J ] . Intelligent City , 2020 , 6 ( 12 ): 172 - 173 .
毛磊 , 翟浩杰 , 尹尚国 . 5G在轨道交通行业的应用探讨 [J ] . 移动通信 , 2020 , 44 ( 1 ): 63 - 70 .
MAO L , ZHAI H J , YIN S G . Discussion on the application of 5G in the rail transportation industry [J ] . Mobile Communications , 2020 , 44 ( 1 ): 63 - 70 .
丁超 , 陈英 , 鉴纪凯 , 等 . 城市轨道交通列车网络安全研究 [J ] . 现代城市轨道交通 , 2022 ( 9 ): 81 - 86 .
DING C , CHEN Y , JIAN J K , et al . Research on network security of urban rail transit trains [J ] . Modern Urban Transit , 2022 ( 9 ): 81 - 86 .
刘魁 . 城市轨道交通网络安全集中管控防护方案 [J ] . 都市快轨交通 , 2022 , 35 ( 2 ): 85 - 90 .
LIU K . Centralized control and protection scheme for urban rail transit network security [J ] . Urban Rapid Rail Transit , 2022 , 35 ( 2 ): 85 - 90 .
WANG Y , ZHANG W F , WANG X M , et al . Improving the security of LTE-R for high-speed railway:from the access authentication view [J ] . IEEE Transactions on Intelligent Transportation Systems , 2022 , 23 ( 2 ): 1332 - 1346 .
XU T , GAO D Y , DONG P , et al . Improving the security of wireless communications on high-speed trains by efficient authentication in SCN-R [J ] . IEEE Transactions on Vehicular Technology , 2019 , 68 ( 8 ): 7283 - 7295 .
HEI X H , GAO W , WANG Y C , et al . Railway key exchange scheme for improving communication efficiency of RSSP-II protocol [C ] // Proceedings of 2019 IEEE Globecom Workshops (GC Wkshps) . Piscataway:IEEE Press , 2020 : 1 - 6 .
WU P W , WU Z D , LI L Y . Research on MAC verification code of railway signal security communication protocol [J ] . Journal of Physics:Conference Series , 2021 :doi.org/10.1088/1742-6596/1757/1/012166.
LI J , WU H . Localisation algorithm for security access control in railway communications [J ] . IET Intelligent Transport Systems , 2020 , 14 ( 14 ): 2151 - 2159 .
CHENG J F , KANG R W , ZHAO X Q . Role based access control and its application in high speed railway [C ] // Proceedings of 2013 Sixth International Conference on Advanced Computational Intelligence (ICACI) . Piscataway:IEEE Press , 2014 : 362 - 364 .
PARICHEHREH A , SPAGNOLINI U . Seamless LTE connectivity in high speed trains [C ] // Proceedings of 2014 IEEE Wireless Communications and Networking Conference (WCNC) . Piscataway:IEEE Press , 2014 : 2067 - 2072 .
WANG J R , YANG X J , ZHAO S Y , et al . Handover performance improvement for ultra dense network of high-speed railway [C ] // Proceedings of 2017 IEEE 85th Vehicular Technology Conference (VTC Spring) . Piscataway:IEEE Press , 2017 : 1 - 5 .
ETSI . Mobile-edge computing:introductory technical white paper [R ] . 2014 .
谢人超 , 廉晓飞 , 贾庆民 , 等 . 移动边缘计算卸载技术综述 [J ] . 通信学报 , 2018 , 39 ( 11 ): 138 - 155 .
XIE R C , LIAN X F , JIA Q M , et al . Survey on computation offloading in mobile edge computing [J ] . Journal on Communications , 2018 , 39 ( 11 ): 138 - 155 .
边缘计算产业联盟和工业互联网产业联盟 . 边缘计算安全白皮书 [R ] . 2019 .
Edge Computing Consortium and Alliance of Industrial Internet . White paper on edge computing security [R ] . 2019 .
GUO S Y , HU X , ZHOU Z Q , et al . Trust access authentication in vehicular network based on blockchain [J ] . China Communications , 2019 , 16 ( 6 ): 18 - 30 .
NI J B , LIN X D , SHEN X S . Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT [J ] . IEEE Journal on Selected Areas in Communications , 2018 , 36 ( 3 ): 644 - 657 .
JIA Y Z , ZHONG F T , ALRAWAIS A , et al . FlowGuard:an intelligent edge defense mechanism against IoT DDoS attacks [J ] . IEEE Internet of Things Journal , 2020 , 7 ( 10 ): 9552 - 9562 .
CHOI J , AHN B , BERE G , et al . Blockchain-based man-in-the-middle (MITM) attack detection for photovoltaic systems [C ] // Proceedings of 2021 IEEE Design Methodologies Conference (DMC) . Piscataway:IEEE Press , 2021 : 1 - 6 .
LI X , LIU S P , WU F , et al . Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications [J ] . IEEE Internet of Things Journal , 2019 , 6 ( 3 ): 4755 - 4763 .
ZHAO J H , LIU J , YANG L H , et al . Future 5G-oriented system for urban rail transit:opportunities and challenges [J ] . China Communications , 2021 , 18 ( 2 ): 1 - 12 .
谢高畅 , 卢华 , 唐琴琴 , 等 . 区块链在轨道交通移动边缘计算网络中的应用 [J ] . 电信科学 , 2021 , 37 ( 10 ): 117 - 125 .
XIE G C , LU H , TANG Q Q , et al . Application of blockchain in rail transit edge computing network [J ] . Telecommunications Science , 2021 , 37 ( 10 ): 117 - 125 .
LIU X , ZHANG M J , ZOU C M , et al . Edge intelligence for smart metro systems:architecture and enabling technologies [J ] . IEEE Network , 2022 , 36 ( 1 ): 136 - 143 .
ROMAN R , LOPEZ J ,, MAMBO M.Mobile edge computing , fog et al . :a survey and analysis of security threats and challenges [J ] . Future Generation Computer Systems , 2018 , 78 ( 2 ): 680 - 698 .
ALI B , GREGORY M A , LI S . Multi-access edge computing architecture,data security and privacy:a review [J ] . IEEE Access , 2021 , 9 : 18706 - 18721 .
RANAWEERA P , JURCUT A , LIYANAGE M . MEC-enabled 5G use cases:a survey on security vulnerabilities and countermeasures [J ] . ACM Computing Surveys , 2022 , 54 ( 9 ): 1 - 37 .
XIAO Y H , JIA Y Z , LIU C C , et al . Edge computing security:state of the art and challenges [J ] . Proceedings of the IEEE , 2019 , 107 ( 8 ): 1608 - 1631 .
RANAWEERA P , JURCUT A D , LIYANAGE M . Survey on multi-access edge computing security and privacy [J ] . IEEE Communications Surveys & Tutorials , 2021 , 23 ( 2 ): 1078 - 1124 .
叶润国 , 蔡磊 , 栾尚聪 . 虚拟机逃逸漏洞分析和安全对策研究 [J ] . 信息技术与标准化 , 2015 ( 12 ): 30 - 34 .
YE R G , CAI L , LUAN S C . Analysis and research on VM escaping and associated countermeasures [J ] . Information Technology & Standardization , 2015 ( 12 ): 30 - 34 .
LIYANAGE M , PORAMBAGE P , DING A Y . Five driving forces of multi-access edge computing [J ] . arXiv Preprint,arXiv:1810.00827 , 2018 .
SUN S , DU R , CHEN S D , et al . Blockchain-based IoT access control system:towards security,lightweight,and cross-domain [J ] . IEEE Access , 2021 , 9 : 36868 - 36878 .
彭维平 , 熊长可 , 贺军义 , 等 . 边缘计算场景下车联网身份隐私保护方案研究 [J ] . 小型微型计算机系统 , 2020 , 41 ( 11 ): 2399 - 2406 .
PENG W P , XIONG C K , HE J Y , et al . Research on the identity privacy protection scheme of Internet of vehicles in edge computing scenario [J ] . Journal of Chinese Computer Systems , 2020 , 41 ( 11 ): 2399 - 2406 .
XIANG Y , LI K , ZHOU W L . Low-rate DDoS attacks detection and traceback by using new information metrics [J ] . IEEE Transactions on Information Forensics and Security , 2011 , 6 ( 2 ): 426 - 437 .
WU W F , HUANG Y Z , KURACHI R , et al . Sliding window optimized information entropy analysis method for intrusion detection on In-vehicle networks [J ] . IEEE Access , 2018 , 6 : 45233 - 45245 .
HU L R , BU B . Intrusion detection methods in communication-based train control systems based on relative entropy and trust evaluation [C ] // Proceedings of 2021 IEEE International Intelligent Transportation Systems Conference (ITSC) . Piscataway:IEEE Press , 2021 : 3939 - 3944 .
LI Y , ZHU L , WANG H W , et al . A cross-layer defense scheme for edge intelligence-enabled CBTC systems against MitM attacks [J ] . IEEE Transactions on Intelligent Transportation Systems , 2021 , 22 ( 4 ): 2286 - 2298 .
GAO B , BU B . A novel intrusion detection method in train-ground communication system [J ] . IEEE Access , 2019 , 7 : 178726 - 178743 .
刘艺璇 , 陈红 , 刘宇涵 , 等 . 联邦学习中的隐私保护技术 [J ] . 软件学报 , 2022 , 33 ( 3 ): 1057 - 1092 .
LIU Y X , CHEN H , LIU Y H , et al . Privacy-preserving techniques in federated learning [J ] . Journal of Software , 2022 , 33 ( 3 ): 1057 - 1092 .
LIANG K , AU M H , LIU J K , et al . A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing [J ] . Future Generation Computer Systems , 2015 , 52 : 95 - 108 .
MA L , PEI Q , XIAO H , et al . Edge computing enhanced privacy preserving for location based services [C ] // Proceedings of IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS) . Piscataway:IEEE Press , 2019 : 1 - 6 .
刘庆祥 , 许小龙 , 张旭云 , 等 . 基于联邦学习的边缘智能协同计算与隐私保护方法 [J ] . 计算机集成制造系统 , 2021 , 27 ( 9 ): 2604 - 2610 .
LIU Q X , XU X L , ZHANG X Y , et al . Federated learning based method for intelligent computing with privacy preserving in edge computing [J ] . Computer Integrated Manufacturing Systems , 2021 , 27 ( 9 ): 2604 - 2610 .
GARFINKEL T , ROSENBLUM M . A virtual machine introspection based architecture for intrusion detection [C ] // Proceedings of Network and Distributed System Security Symposium . Piscataway:IEEE Press , 2003 : 191 - 206 .
林昆 , 黄征 . 基于 Intel VT-d 技术的虚拟机安全隔离研究 [J ] . 信息安全与通信保密 , 2011 , 9 ( 5 ): 101 - 103 .
LIN K , HUANG Z . Study on virtual machine security isolation based on Intel VT-d [J ] . Information Security and Communications Privacy , 2011 , 9 ( 5 ): 101 - 103 .
KALKAN K , ZEADALLY S . Securing Internet of things with software defined networking [J ] . IEEE Communications Magazine , 2018 , 56 ( 9 ): 186 - 192 .
BHUNIA S S , GURUSAMY M . Dynamic attack detection and mitigation in IoT using SDN [C ] // Proceedings of 2017 27th International Telecommunication Networks and Applications Conference (ITNAC) . Piscataway:IEEE Press , 2017 : 1 - 6 .
曹扬晨 , 朱国胜 , 孙文和 , 等 . 未知网络攻击识别关键技术研究 [J ] . 计算机科学 , 2022 , 49 ( S1 ): 581 - 587 .
CAO Y C , ZHU G S , SUN W H , et al . Study on key technologies of unknown network attack identification [J ] . Computer Science , 2022 , 49 ( S1 ): 581 - 587 .
0
浏览量
779
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构