1、1/45ContentsPreface.3I.Wireless Physical Layer Security Technology.51.1 Scenarios and Security Requirements.51.2 Technical Principles.51.3 Technology Application Concepts.61.4 Challenges and Suggestions.7II.Distributed Trust Technology.72.1 Scenarios and Security Requirements.72.2 Technical Principl
2、es.82.3 Technology Application Concepts.92.4 Challenges and Suggestions.11III.Ubiquitous Trust Technology.73.1 Scenarios and Security Requirements.133.2 Technical Principles.133.3 Technology Application Concepts.143.4 Challenges and Suggestions.15IV.Quantum Security Technology.134.1 Scenarios and Se
3、curity Requirements.164.2 Technical Principles.164.3 Technology Application Concepts.184.4 Challenges and Suggestions.19V.Privacy Protection Technology.205.1 Scenarios and Security Requirements.205.2 Technical Principles.205.3 Technology Application Concepts.225.4 Challenges and Suggestions.23VI.Sec
4、urity Capability Service-Oriented Technology.256.1 Scenarios and Security Requirements.256.2 Technical Principles.256.3 Technology Application Concepts.266.4 Challenges and Suggestions.27VII.Mimic Defense Technology.257.1 Scenarios and Security Requirements.297.2 Technical Principles.297.3 Technolog
5、y Application Concepts.307.4 Challenges and Suggestions.31VIII.AI Security Management and Decision-Making Technology.328.1 Scenarios and Security Requirements.328.2 Technical Principles.328.3 Technology Application Concepts.348.4 Challenges and Suggestions.352/45IX.DTN Security Deduction Technology.
6、379.1 Scenarios and Security Requirements.379.2 Technical Principles.389.3 Technology Application Concepts.389.4 Challenges and Suggestions.39Summary.41References.42Abbreviations.43Writing Organization.453/45Preface6G networks are evolving towards complexity and diversity,with increasing opennesslea