[1] 5G应用产业方阵. 5G行业虚拟专网网络架构[EB/OL]. 2020(2020-07-29)[2020-12-03]. http://www.chuangze.cn/third_1.asp?txtid=2148. [2] 王欣. 拥抱5G新世界[EB/OL]. 2019(2019-05-28)[2020-12-03]. https://www.rolandberger.com/zh/Publications/%E6%8B%A5%E6%8A%B15G%E6%96%B0%E4%B8%96%E7%95%8C.html. [3] Han Shujun, Xu Xiaodong, Fang Sisai, et al. Energy efficient secure computation offloading in NOMA-based mMTC networks for IoT[J]. IEEE Internet of Things Journal, 2019, 6(3):5674-5690. [4] Feng Daquan, She Changyang, Ying Kai, et al. Towards ultra-reliable low-latency communications:typical scenarios, possible solutions, and open issues[J]. IEEE Vehicular Technology Magazine, 2019, 14(2):94-102. [5] Tao Xiaofeng, Han Yan, Xu Xiaodong, et al. Recent advances and future challenges for mobile network virtualization[J]. Science China Information Sciences, 2017, 60(4):040301. [6] Du Shuxing, Liu Bo, Ma Huixun, et al. ⅡOT-based intelligent control and management system for motorcycle endurance test[J]. IEEE Access, 2018, 6:30567-30576. [7] 王卫斌, 朱进国, 王全. 5G核心网演进需求及关键技术[J]. 中兴通讯技术, 2020, 26(1):67-72. Wang Weibin, Zhu Jinguo, Wang Quan. Evolution requirements and key technologies of 5G core network[J]. ZTE Technology Journal, 2020, 26(1):67-72. [8] 马立川, 裴庆祺, 肖慧子. 万物互联背景下的边缘计算安全需求与挑战[J]. 中兴通讯技术, 2019, 25(3):37-42. Ma Lichuan, Pei Qingqi, Xiao Huizi. Security requirements and challenges in edge computing for Internet of everything[J]. ZTE Technology Journal, 2019, 25(3):37-42. [9] Omoniwa B, Hussain R, Javed M A, et al. Fog/edge computing-based IoT (FECIoT):architecture, applications, and research issues[J]. IEEE Internet of Things Journal, 2019, 6(3):4118-4149. [10] Fu Junsong, Liu Yun, Chao H C, et al. Secure data storage and searching for industrial IoT by integrating fog computing and cloud computing[J]. IEEE Transactions on Industrial Informatics, 2018, 14(10):4519-4528. [11] Xiong Jinbo, Ma Rong, Chen Lei, et al. A personalized privacy protection framework for mobile crowdsensing in ⅡoT[J]. IEEE Transactions on Industrial Informatics, 2020, 16(6):4231-4241. [12] Esfahani A, Mantas G, Matischek R, et al. A lightweight authentication mechanism for M2M communications in industrial IoT environment[J]. IEEE Internet of Things Journal, 2019, 6(1):288-296. [13] ITU-R R12-SG05. IMT vision-framework and overall objectives of the future development of IMT for 2020 and beyond [R/OL]. 2015(2015-09-16)[2020-12-03]. https://www.itu.int/rec/R-REC-M. 2083/en. [14] 杜滢, 朱浩, 杨红梅, 等. 5G移动通信技术标准综述[J]. 电信科学, 2018, 34(8):2-9. Du Ying, Zhu Hao, Yang Hongmei, et al. Review of 5G mobile communication technology standard[J]. Telecommunications Science, 2018, 34(8):2-9. [15] Gabriel B. Private 5G mobile networks for industrial IoT, a heavy reading white paper produced for Qualcomm [EB/OL]. 2019(2019-07-26)[2020-12-03]. https://www.qualcomm.com/media/documents/files/private-5g-networks-for-industrial-iot.pdf. [16] 张平, 牛凯, 田辉, 等. 6G移动通信技术展望[J]. 通信学报, 2019, 40(1):141-148. Zhang Ping, Niu Kai, Tian Hui, et al. Technology prospect of 6G mobile communications[J]. Journal on Communications, 2019, 40(1):141-148. [17] Xu Wenjun, Xu Yue, Lee C H, et al. Data-cognition-empowered intelligent wireless networks:data, utilities, cognition brain, and architecture[J]. IEEE Wireless Communications, 2018, 25(1):56-63. [18] Zhang Ping, Xu Xiaodong, Qin Xiaoqi, et al. Evolution toward artificial intelligence of things under 6G ubiquitous X[J]. Journal of Harbin Institute of Technology (New Series), 2020, 27(3):116-135. [19] 张平, 张建华, 戚琦, 等. Ubiquitous-X:构建未来6G网络[J]. 中国科学:信息科学, 2020, 50(6):913-930. Zhang Ping, Zhang Jianhua, Qi Qi, et al. Ubiquitous-X:constructing the future 6G networks[J]. Scientia Sinica (Informationis), 2020, 50(6):913-930. [20] Chen Shanzhi, Liang Yingchang, Sun Shaohui, et al. Vision, requirements, and technology trend of 6G:how to tackle the challenges of system coverage, capacity, user data-rate and movement speed[J]. IEEE Wireless Communications, 2020, 27(2):218-228. [21] Sun Wen, Liu Jiajia, Yue Yanlin. AI-enhanced offloading in edge computing:when machine learning meets industrial IoT[J]. IEEE Network, 2019, 33(5):68-74. [22] FG-NET-2030. Network 2030:a blueprint of technology applications and market drivers and prospects [EB/OL]. 2018(2018-10-01)[2020-12-03]. https://www.researchgate.net/publication/334655833_Network_2030_A_Blueprint_of_Technology_Applications_and_Market_Drivers_Towards_the_Year_2030_and_Beyond. [23] Balfe S, Gallery E, Mitchell C J, et al. Challenges for trusted computing[J]. IEEE Security & Privacy Magazine, 2008, 6(6):60-66. [24] Liu Mengting, Yu F R, Teng Yinglei, et al. Performance optimization for blockchain-enabled industrial internet of things (ⅡoT) systems:a deep reinforcement learning approach[J]. IEEE Transactions on Industrial Informatics, 2019, 15(6):3559-3570. [25] Veugen T, de Haan R, Cramer R, et al. A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendations[J]. IEEE Transactions on Information Forensics and Security, 2015, 10(3):445-457. [26] Gu Zhifang, Chen He, Xu Pingping, et al. Physical layer authentication for non-coherent massive SIMO-enabled industrial IoT communications[J]. IEEE Transactions on Information Forensics and Security, 2020, 15:3722-3733. |