5G applications face security risks due to the new technology used and the performance requirements of the specific application scenario. This paper analyzes the security requirements and presents hierarchical solutions for stakeholders to build secure 5G applications. First, we summarize the technical characteristics and typical usage scenarios of 5G. Then, we analyze the security and privacy risks faced by 5G applications and related security standards and research work. Next, we give the system reference architecture and overall security and privacy solutions for 5G applications. Based on the three major application scenarios of eMBB, uRLLC, and mMTC, we also provide specific suggestions for coping with security and privacy risks. Finally, we present a use case of industrial terminal access control and make conclusions of this paper.
Email has been one of the most common medium for online communication. Directly proportional to this situation is the significant financial loss or privacy disclosure resulting from the unprotected emails. We need a secure email system to protect email wherever it goes. However, most existing secure email solutions can only achieve security during email transmission. After an encrypted email is received and downloaded on the recipient's computer, the email will lose protection. In this paper, we propose a copy protection method for email based on "client-to-client" architecture. The foundation of our method is a password based key negotiation protocol between two clients. Moreover, devicebound technology and commutative symmetric encryption are applied in our method to achieve persistent copy protection. Our method balances flexibility and security by allowing users to receive and use email on any of their devices.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.