Shen Changxiang, academician of Chinese Academy of Engineering: network must be safe and reliable 5g lack of security and credibility

category:Internet
 Shen Changxiang, academician of Chinese Academy of Engineering: network must be safe and reliable 5g lack of security and credibility


Cyberspace is extremely fragile, which mainly embodies three major problems

Shen Changxiang said that the virus killing and firewall we usually understand are not scientific concepts of network security. Only cybersecurity laws interpret cybersecurity most accurately. Shen stressed. On November 7, 2016, the network security law of the peoples Republic of China was issued and implemented on June 1, 2017. Article 16 clearly stipulates that the State Council and the peoples governments of provinces, autonomous regions and municipalities directly under the central government shall make overall plans, increase investment, support key network security technology industries and projects, support the research, development and application of network security technology, promote safe and reliable network products and services, protect the intellectual property rights of network technology, and support the participation of enterprises, research institutions and colleges and universities National network security technology innovation project. In addition, the strategic task of the national cyberspace security strategy is to lay a solid foundation for Cyberspace Security, emphasizing make breakthroughs in core technologies as soon as possible, and accelerate the promotion and application of safe and reliable products.

According to Shen Changxiang, cyberspace is extremely fragile. There are three main problems: computing science, architecture and computing model.

The Internet must be credible, Chinese people need confidence in innovation

Trusted computing is the mainstream technology of network security in the world. In 2003, TCG initiated by IBM, Intel and Microsoft has more than 190 members. The trusted computing represented by windows 10 has become the focus of the industry. In the early 1990s, academician Shen Changxiang of Chinese Academy of engineering successfully developed immune trusted computing, and founded Zhongguancun trusted computing industry alliance on the basis of wide application. Under the guidance of the scientific and technological steering committee composed of 18 academicians, more than 200 industry, University, research and application members worked together to contribute to the technical innovation and application promotion of trusted computing.

When it comes to the essence of security risk, academician Shen Changxiang said that the essence of security risk is that the design of IT system cannot exhaust all logical combinations, and there must be defects of incomplete logic. It is the eternal proposition of network security to exploit the defects to attack. The security goal of active immunity is to ensure that the logical combination of computing tasks is not tampered with and destroyed, and to achieve correct computing.

Shen Changxiang said that the traditional blocking and killing is out of date. The traditional three ways of killing viruses, firewalls and intrusion detection are difficult to deal with human attacks, and easy to be used by attackers. The traditional idea of finding loopholes and patching is not conducive to overall security. Active immune trusted computing is to recognize self and non self components in a timely manner by using passwords as genes for identity recognition, state measurement, confidential storage and other functions, so as to destroy and repel harmful substances entering the body, which is equivalent to cultivating immune ability for network information system.

Before that, China revolutionized the creation of trusted computing 3.0 marked by active immunity. It used cryptography, trust root chip, trusted basic software and other components to build a new trusted computing architecture framework. It built a set of host trust two nodes on the computing node, and used the trusted computing subsystem which is logically independent of the traditional system parallel to form a trusted immune architecture, Each trusted node is connected to a complete trusted system. Relying on the active immune trusted technology system, it has laid a solid foundation for network security and credibility in traditional application fields, industrial control system, cloud computing, Internet of things, big data, mobile intelligent network and other modern information systems.

However, at present, the loss of domestic innovative safe and reliable technology is serious, and Shen Changxiang also expressed his concern about this situation. Chinese people need confidence in innovation, Shen said.

5g network without immune system without security

When it comes to 5g, especially after the Ministry of industry and information technology of China officially announced 5g commercial use, the first thing we think about is undoubtedly the advantages of 5g network: high-speed rate, large bandwidth, and low latency. However, the thinking about 5g network security seems not very profound.

Academician Shen Changxiang said that due to the characteristics of 5g and the fact that 5g network is defined as software, its network is extremely fragile, and the security problem is not a traditional firewall that can be solved. The correct solution to the problem is to add core and trusted software to the chip layer, work and check while working, and make all malicious attacks useless. 5g network introduces nfv / SDN and other technologies on the basis of traditional telecom cloud for ICT integration, which makes mobile communication network cloud, virtualization and software, and makes the network more flexible, agile and open. But without credible security, none of this will exist. Shen Changxiang said that the normal operation of smart city, smart transportation, smart energy and smart medical care can be guaranteed only by building a safe and reliable Internet of things with 5g as the core. Among them, the hierarchical protection framework can well solve the 5g network security problem. Through the triple defense system framework of the trusted computing environment cloud core network platform, the trusted carrier access edge computing and the trusted base station access network supported by the trusted security management center, as well as the system policy management, it can actively immune against various malicious attacks, and finally form a healthy intelligent society Meeting. Source: 5g + editor in charge: Liao ziyao, nbjs10040

Academician Shen Changxiang said that due to the characteristics of 5g and the fact that 5g network is defined as software, its network is extremely fragile, and the security problem is not a traditional firewall that can be solved. The correct solution to the problem is to add core and trusted software to the chip layer, work and check while working, and make all malicious attacks useless. 5g network introduces nfv / SDN and other technologies on the basis of traditional telecom cloud for ICT integration, which makes mobile communication network cloud, virtualization and software, and makes the network more flexible, agile and open. But without credible security, none of this will exist.

Shen Changxiang said that the normal operation of smart city, smart transportation, smart energy and smart medical care can be guaranteed only by building a safe and reliable Internet of things with 5g as the core. Among them, the hierarchical protection framework can well solve the 5g network security problem. Through the triple defense system framework of the trusted computing environment cloud core network platform, the trusted carrier access edge computing and the trusted base station access network supported by the trusted security management center, as well as the system policy management, it can actively immune against various malicious attacks, and finally form a healthy intelligent society Meeting.