Wu Jiangxing, academician of the Chinese Academy of Engineering: 6G network must address broad functional security

2022.03.28

Wu Jiangxing, academician of the Chinese Academy of Engineering: 6G network must address broad functional security Wu Jiangxing, an academician of the Chinese Academy of Engineering, said that 6G, as an important supporting technology for intelligent network infrastructure beyond 2030, cannot continue the traditional path of pursuing coverage, bandwidth, delay and other single technical indicators to jump up. Recently, the Future Mobile Forum hosted the Global 6G Technology Conference, which aims to build a global technology cooperation platform and a bridge for collaborative innovation, form relevant proposals to promote 6G research and development, strive to promote the cultivation of a globally consistent 6G concept, cooperate to create a favorable environment for global 6G development, and contribute to the formation of a global unified 6G standard and the sustainable development of the information and communication industry. At the roundtable discussion on "6G wireless network security architecture key technologies" held on March 24, Wu Jiangxing, an academician of the Chinese Academy of Engineering, said that 6G, as an important supporting technology for the intelligent network infrastructure beyond 2030, cannot continue the traditional path of pursuing single technical indicators such as coverage, bandwidth and latency, but must explore and open up new opportunities for sustainable synergy in terms of technical performance, cost investment, energy consumption, safety and reliability, sustainability and efficiency. We must explore and open up a new paradigm of sustainable and coordinated development with multiple objectives such as technical performance, cost investment, energy consumption, safety and reliability, and sustainable efficiency. Wu believes that the endogenous security system is the basic framework, under which other security technologies play the role of filling and reinforcing. "The security framework of 6G network must be endogenous in order to solve the broad functional security. If 6G does not have broad functional security, then other security technologies are like water without a source, without a foundation, like sand and soil mixed with cement and sand, and cannot be called concrete. Since its introduction, the concept of endogenous safety has been slowly accepted and recognized by the industry. In fact, the introduction of the endogenous security paradigm has provided the industry chain with a new way of thinking about solving network security problems. "Endogenous security is based on constructing technology, not on the built-in, embedded nature of existing technology. Wu Jiangxing said that endogenous security can accommodate other security technologies and use a variety of integrated means to jointly deal with a variety of potential risks. In Wu's view, AI is not an endogenous security technology because the analysis results of AI are inexplicable, unrecognizable and non-inferential. Blockchain is also not an endogenous security technology because it relies on blockchain nodes, and there are common vulnerability backdoors in software and hardware nodes with >51% market share. "The essence of broad functional security is the expansion and extension of the traditional functional security (reliability) concept under the conditions of network attacks." Wu Jiangxing said that broad functional security is an enabling technology for cyberspace-related technologies, with wide compatibility and openness, and can be fused horizontally with traditional plug-in security protection technologies or systems to form synergistic defense, and vertically with other security protection technologies or systems on top of the I-NET infrastructure platform to form deep defense. Translated with www.DeepL.com/Translator (free version)