Study on Security of 5G and Satellite Converged Communication Network
YAN Xincheng, TENG Huiyun, PING Li, JIANG Zhihong, ZHOU Na
Table 1 Catalogue of security protection technology
Network LayerSecurity AttributesCategories of Security TechnologySub-Categories of Security Technology
Network application layerCommunication securityData communication securityUser data communication security
Network function layerAuthenticityIdentity authenticityTerminal access authentication
Authentication between network nodes
AvailabilityNetwork availabilityAnti-DDoS attack
Anti-UE random access attack
Communication securityNetwork resource sharingRAN slice isolation
Core network slice isolation
Data communication securityNetwork function communication security
Network transmission layerCommunication securityNetwork resource sharingBearer network slice isolation
Data communication securityBearer network communication security
AvailabilityNetwork availabilityAnti-DDoS attack
AuthenticityIdentity authenticityAuthentication between network nodes
Infrastructure layerAvailabilityNetwork availabilityAnti-wireless communication interference
AuthenticityIdentity authenticityTrusted boot of satellite nodes