Research on 5G network security mechanism and strategy in coal mine
-
Graphical Abstract
-
Abstract
With the continuous advancement of mine intelligent construction, 5G network has deeply integrated into various application scenarios in coal mining, including extraction, production, monitoring, and remote control, significantly enhancing their own security technologies. By implementing refined access control rules, dynamic management of identities, credentials, and access permissions, conducting in-depth analysis of network and security data, and continuously updating trust models and relationships, the security of the SBA architecture has been further strengthened. Additionally, the introduction of NWDAF functionality for machine learning enhances network intelligent security. Adhering to the principles of maximum anonymization, minimal exposure, and data subject authorization has prevented data and privacy leaks. Furthermore, the introduction of NSACF functionality and the establishment of MEC standards have significantly improved the security of private network slicing and edge computing. By establishing a zero-trust access technology model, network security and reliability are ensured. However, as the 5G network evolves in terms of architecture, data storage, device forms, and business scenarios, some new issues have gradually emerged, such as container escapes, microservice injection, device security vulnerabilities, inadequate network isolation, botnets, and orchestration management loopholes, posing serious threats to the safe operation of coal mining enterprises. To address these new challenges, it is essential to establish a comprehensive and systematic 5G security framework for coal mines, research 5G security technologies, conduct 5G security assessments, enhance 5G security operations, and continuously update and improve the 5G network security management system and framework to ensure the stable, efficient, and secure operation of coal mine networks.
-
-