According to the Ministry of Industry and Information Technology's micro-report, the Ministry of Industry and Information Technology recently held a national video and telephone conference in Beijing to deploy and promote 5G security work. The meeting pointed out that the pace of 5G network construction in my country is accelerating, and nearly 850,000 5G base stations have been built, forming the world's largest 5G independent networking network, and there are more than 10,000 5G industry application innovation cases.
The meeting pointed out that, on the one hand, 5G continues the characteristics of 2/3/4G mobile communication networks, inherits the layered and domain-based security architecture of 4G networks, and has stronger security capabilities than 4G in terms of service domain security, unified authentication framework, privacy protection, and inter-network roaming security. On the other hand, as 5G introduces new technologies such as network function virtualization, network slicing, edge computing, as well as typical scenarios of enhanced mobile broadband (eMBB), ultra-reliable and low latency (uRLLC) and massive machine-type communications (mMTC), the network architecture is evolving towards cloud-network integration and cloud-edge collaboration, bringing new security risk challenges to network construction and operation and business applications. |
<<: Do you understand the benefits of 5G? Learn about the pros and cons
>>: How will 6G develop in the future?
In recent years, with the development of electron...
When these three words are mentioned, do many peo...
Liu Yulin said that General Secretary Xi Jinping ...
[[415021]] Hello everyone, I am Xiaolin. Last wee...
[[244105]] Microsoft has scrapped plans to use on...
Recently, with the "Xinzhou Public Trading P...
RAKsmart continued to offer hot flash sales for V...
[Original article from 51CTO.com] According to Bl...
The reporter learned from the interview that my c...
[[276674]] TCP (Transmission Control Protocol) an...
Every industry has created a new normal: if your ...
Today I will share with you some knowledge about ...
In the previous section, we introduced how networ...