KEYWORDS: Computer security, Information security, Data transmission, Network security, Data communications, Telecommunications, Symmetric-key encryption, Engineering, Defense and security
With the widespread use of micro-application-based architecture for power mobility, ensuring secure authentication of users has become one of the challenges that cannot be ignored. Based on this, this paper first analyses the primary process and problems of the existing token authentication scheme. Then it proposes the overall architecture and model of secure authentication under this scheme for the security of token communication in the authentication process and uses an improved hybrid encryption algorithm for key agreement to solve the limitations of a single encryption algorithm for encrypting tokens. Finally, it can resist network attacks such as frequent replay and man-in-the-middle after security analysis. Experiments also verify that the scheme can guarantee users’ secure authentication.
This paper proposes an abnormal behavior detection technology of power 5G terminal based on the characteristics of business interaction mode. First, the abnormal behavior detection framework of power 5G terminal is designed. Secondly, considering various security factors of the basic operating environment, a 5G security monitoring indicator system is established around the terminal side security indicators, network side security indicators and API side security indicators. Then, study the automatic learning and construction technology of normal behavior benchmark model, establish a normal benchmark model based on multiple RBM neural networks, study the normal behavior baseline of 5G terminal operation behavior benchmark, the same type of equipment benchmark, specific communication line benchmark and other normal behavior baselines, and build the security baseline indicators of the normal behavior model of 5G terminal. On this basis, abnormal behavior detection technology based on normal benchmark model is studied.
This paper proposes an abnormal behavior detection technology of power 5G terminal based on the characteristics of business interaction mode. First, the abnormal behavior detection framework of power 5G terminal is designed. Secondly, considering various security factors of the basic operating environment, a 5G security monitoring indicator system is established around the terminal side security indicators, network side security indicators and API side security indicators. Then, study the automatic learning and construction technology of normal behavior benchmark model, establish a normal benchmark model based on multiple RBM neural networks, study the normal behavior baseline of 5G terminal operation behavior benchmark, the same type of equipment benchmark, specific communication line benchmark and other normal behavior baselines, and build the security baseline indicators of the normal behavior model of 5G terminal. On this basis, abnormal behavior detection technology based on normal benchmark model is studied.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.