当前位置: X-MOL 学术Complex Intell. Syst. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Threat analysis for space information network based on network security attributes: a review
Complex & Intelligent Systems ( IF 5.8 ) Pub Date : 2022-11-28 , DOI: 10.1007/s40747-022-00899-z
Xuesong Wu , Ye Du , Tao Fan , Junyan Guo , Jie Ren , Runfang Wu , Tianshuai Zheng

Space Information Network (SIN) is a multi-purpose heterogeneous network. Due to the large-scale of SIN, its secure and stable operation is vulnerable to various threats. Much of current threat analysis for SIN is based on the network function or architecture. However, this approach cannot clearly divide the relation between threats and secure communication measures for a highly integrated network. Furthermore, it will lead to overlapping in segregation of secure duties. This paper presents a comprehensive review of threats and corresponding solutions in SIN from the perspective of network security attributes. In order to make the analysis applicable to more scenarios, the following three most essential attributes, confidentiality, integrity and availability, are selected as the threatened objectives. At the same time, for cross-reference with the analysis based on network function or architecture, this paper relates network layers to network security attributes through secure communication mechanisms. Specifically, the confidentiality includes confidential information-exchange and Authentication and Key Agreement (AKA), the integrity includes information identification and information restoration, and the availability includes link establishment, routing mechanism, and mobility management. According to above framework, this paper provides a cross-layer perspective for analyzing threat and enhancing the security and stability of SIN. Finally, this paper concludes with a summary of challenges and future work in SIN.



中文翻译:

基于网络安全属性的空间信息网络威胁分析:综述

空间信息网络(SIN)是一个多用途的异构网络。由于SIN规模庞大,其安全稳定运行容易受到各种威胁。当前对 SIN 的大部分威胁分析都是基于网络功能或架构。然而,这种方法不能清楚地划分高度集成网络的威胁与安全通信措施之间的关系。此外,这将导致安全职责分离的重叠。本文从网络安全属性的角度全面梳理了SIN中存在的威胁及相应的解决方案。为了使分析适用于更多的场景,选取以下三个最本质的属性:机密性、完整性和可用性作为威胁目标。同时,为了与基于网络功能或体系结构的分析相互参照,本文通过安全通信机制将网络层次与网络安全属性联系起来。具体来说,机密性包括机密信息交换和认证与密钥协商(AKA),完整性包括信息识别和信息恢复,可用性包括链路建立、路由机制和移动性管理。根据上述框架,本文为分析威胁和增强SIN的安全性和稳定性提供了一个跨层的视角。最后,本文总结了 SIN 面临的挑战和未来的工作。本文通过安全通信机制将网络层与网络安全属性联系起来。具体来说,机密性包括机密信息交换和认证与密钥协商(AKA),完整性包括信息识别和信息恢复,可用性包括链路建立、路由机制和移动性管理。根据上述框架,本文为分析威胁和增强SIN的安全性和稳定性提供了一个跨层的视角。最后,本文总结了 SIN 面临的挑战和未来的工作。本文通过安全通信机制将网络层与网络安全属性联系起来。具体来说,机密性包括机密信息交换和认证与密钥协商(AKA),完整性包括信息识别和信息恢复,可用性包括链路建立、路由机制和移动性管理。根据上述框架,本文为分析威胁和增强SIN的安全性和稳定性提供了一个跨层的视角。最后,本文总结了 SIN 面临的挑战和未来的工作。可用性包括链路建立、路由机制和移动性管理。根据上述框架,本文为分析威胁和增强SIN的安全性和稳定性提供了一个跨层的视角。最后,本文总结了 SIN 面临的挑战和未来的工作。可用性包括链路建立、路由机制和移动性管理。根据上述框架,本文为分析威胁和增强SIN的安全性和稳定性提供了一个跨层的视角。最后,本文总结了 SIN 面临的挑战和未来的工作。

更新日期:2022-11-28
down
wechat
bug