Wu Jiangxing, Academician of the Chinese Academy of Engineering: 6G networks must address generalized functional safety

Wu Jiangxing, Academician of the Chinese Academy of Engineering: 6G networks must address generalized functional safety

Recently, the Future Mobile Communications Forum hosted the "Global 6G Technology Conference" with the aim of building a global scientific and technological cooperation platform and a bridge for collaborative innovation, forming relevant recommendations for promoting 6G research and development, and striving to promote the cultivation of a globally consistent 6G concept. Together, we will create a good environment for global 6G development and contribute to the formation of a globally unified 6G standard and the sustainable development of the information and communication industry.

At the roundtable forum on "Key Technologies of 6G Wireless Network Security Architecture" held on March 24, Wu Jiangxing, an academician of the Chinese Academy of Engineering, stated that as an important supporting technology for intelligent connected infrastructure after 2030, 6G can no longer continue the traditional path of pursuing leaps in single technical indicators such as coverage, bandwidth, and latency. Instead, it is necessary to explore and open up a new paradigm for sustainable and coordinated development of multiple objectives such as technical performance, cost investment, energy consumption, safety and reliability, and continuous efficiency.

Wu Jiangxing believes that the endogenous security system is the basic architecture, and other security technologies play a role in filling and reinforcing this architecture. "The security architecture of the 6G network must be endogenous to solve the problem of generalized functional safety. If 6G does not have generalized functional safety, then other security technologies are useless, just like sand and soil mixed with cement and sand, which cannot be called concrete."

Since the concept of endogenous security was first proposed, it has been gradually accepted and recognized by the industry. In fact, the proposal of the endogenous security paradigm provides the industry chain with a new way of thinking to solve network security problems. "Endogenous security is based on construction technology, rather than built-in or embedded in existing technology." Wu Jiangxing said that endogenous security can accommodate other security technologies and use a variety of integrated means to jointly deal with a variety of potential risks.

In Wu Jiangxing's view, AI is not an intrinsic security technology because the analysis results of AI are unexplainable, unidentifiable and unreasonable. Blockchain is not an intrinsic security technology either because it relies on blockchain nodes, and common-mode vulnerabilities and backdoors exist in software and hardware nodes with a market share of >51%.

"The essence of generalized functional safety is the expansion and extension of the traditional functional safety (reliability) concept under network attack conditions." Wu Jiangxing said that generalized functional safety is an enabling technology for cyberspace-related technologies, with broad compatibility and openness. It can be integrated with traditional external security protection technologies or systems to form a coordinated defense horizontally, and can be integrated with other security protection technologies or systems on the intelligent network infrastructure platform to form a deep defense vertically.

<<:  Ruijie Networks launches a new solution for Ethernet all-optical network construction to tailor campus networks for multiple industries

>>:  The U.S. military attaches great importance to it! 5G private network is about to be implemented at the U.S. Navy base

Blog    
Blog    

Recommend

Node.js knowledge - How to set cookie information in HTTP request and response

[[398674]] HTTP Cookie[1] is a small piece of dat...

80% of the country's fiber optic access 100M broadband can't open web pages

According to data released by the Ministry of Ind...

How to avoid the pitfalls of integrated wiring?

There is a lot of knowledge involved in integrate...

A brief analysis of traffic management of Istio component Envoy

Background The development convenience brought by...

New optical spiral technology can increase information transmission rate tenfold

A new optical-based communications tool can trans...

What is the difference between FTP and SFTP?

In actual project development, the most commonly ...

Taming your WAN: Applying SDN to the WAN

The network should respond to the needs of users ...

5G is here, where will the next explosion point of the Internet be?

In the long run, the goal is not to build 5G well...

Outlook on the Next Generation of Enterprise Wireless Technology - CBRS

The shortage of wireless spectrum has always been...

How to choose the best flash storage for your data center?

The all-flash data center is a futuristic concept...