Abstract

With the coming of 5G network, it is possible for energy Internet to achieve high bandwidth and low delay interconnection. At the same time, it also brings new security problems. The core elements of 5G - virtualization, cloud migration, network slicing, Internet of Things, 5G gateway and even related software development may become security vulnerabilities. Aiming at the possible security problems in the application of 5G in the energy Internet, including the overall security architecture, industry security subdivision, Internet of Things security operation and maintenance, and the application of new security mechanisms, this paper expounds the relevant concepts and threats. This paper puts forward that in security architecture, we should make full use of security mechanisms such as logical isolation and access control to achieve in-depth defense; in industry segmentation, we should have customized security capability response for different application scenarios of different industries; in the security operation and maintenance of the Internet of Things, we should aim at the complex network environment and topology of mass terminals. In the new security mechanism, it should be combined with large data analysis and AI intelligent processing to enhance the ability of security early warning. Finally, combined with the application scenario of the energy internet, this paper proposes a comprehensive solution to the energy Internet Security in the 5G.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.