6G信任基础:统一自我主权身份系统Primer for Trustworthy 6G: Unified Self-Sovereign Identifier System
李灏洋,肖少荷,曹傧,彭木根,李丽香,刘欣然
摘要(Abstract):
6G架构从集中式向多方协作乃至去中心化演进,传统集中式安全基础的有效性面临挑战,信任体系需要重新构建。其中,去中心化的自我主权身份(SSI)被认为是构建6G信任必要且有前景的解决方案。为了在6G中顺利部署SSI,提出了一种多方信任架构(MTA)。该架构提供了一种可信方法,在整个通信系统的各个层次上建立统一自我主权身份(U-SSI)管理系统。MTA由全局链和多个本地链构成,服务于6G系统中的所有利益相关方,其中全局链负责SSI管理,本地链提供网络服务。最后给出了使用案例与实验,基于开源空口软件平台(OAI)与多分区并行区块链平台(DP-Chain)完成了MTA架构与U-SSI技术的搭建实现。实验结果表明,MTA方案带来的时延、中央处理器(CPU)利用率、MEM(内存)开销均在5%以内,验证了MTA架构与U-SSI技术的功能与可行性,展示了所提出的信任框架的设计可行性。
关键词(KeyWords): 6G;信任;自我主权身份
基金项目(Foundation): 国家重点研发计划青年科学家项目(2021YFB1714100);; 国家自然科学基金项目(U22B2006)
作者(Author): 李灏洋,肖少荷,曹傧,彭木根,李丽香,刘欣然
参考文献(References):
- [1] ITU-R. Overview timeline for IMT towards the year 2030 and beyond[EB/OL].[2025-04-25]. https://www.itu.int/dms_pub/itur/oth/0a/06/R0A060000C80001PDFE.pdf
- [2] 3GPP. Security architecture and procedures for 5G system release 15:TS 33.501[S]. 2018
- [3] TOTH K C, ANDERSON-PRIDDY A. Self-sovereign digital identity:a paradigm shift for identity[J]. IEEE security&privacy,2019, 17(3):17-27. DOI:10.1109/MSEC.2018.2888782
- [4] World Wide Web Consortium(W3C). Decentralized identifiers(DIDs)v1.0[EB/OL].[2025-04-25]. https://www. w3.org/TR/didcore/
- [5] GARZON S R, YILDIZ H, KüPPER A. Decentralized identifiers and self-sovereign identity in 6G[J]. IEEE network, 2022, 36(4):142-148. DOI:10.1109/MNET.009.2100736
- [6] Sovrin. Homepage[EB/OL].[2025-04-25]. https://sovrin.org
- [7] uPort. Homepage[EB/OL].[2025-04-25]. https://www.uport.me/
- [8] ITU-T. The directory:public-key and attribute certificate frameworks[EB/OL].[2025-04-25]. https://www. itu. int/rec/TREC-X.509-201910-I/en
- [9] National Institute of Standards and Technology(NIST). Framework gaithersburg[EB/OL].[2025-04-25]. https://nvlpubs. nist. gov/nistpubs/
- [10] TONG W, ZHU P. 6G:the next horizon:from connected people and things to connected intelligence[M]. Cambridge:Cambridge University Press, 2021
- [11] NGMN Alliance. 6G trustworthiness considerations vl.0[EB/OL].[2025-04-25]. https://www. ngmn. org/wp-content/uploads/NGMN_6G_Trustworthiness.pdf
- [12] Evernym. Self-sovereign identity:transforming customer experience and creating competitive advantage[EB/OL].[2025-04-25]. https://www. itu. int/en/ITU-T/Workshops-andSeminars/201912/Documents/Part%201%20-%20Andy%20Tobin%20-%20Digital%20Credentials%20Overview%2020191014.pdf
- [13] CAO B, WANG Z X, ZHANG L, et al. Blockchain systems,technologies, and applications:a methodology perspective[J].IEEE communications surveys&tutorials, 2023, 25(1):353-385.DOI:10.1109/COMST.2022.3204702
- [14] WANG Z X, CAO B, LIU C X, et al. Blockchain-based fog radio access networks:architecture, key technologies, and challenges[J]. Digital communications and networks, 2022, 8(5):720-726.DOI:10.1016/j.dcan.2021.12.006
- [15] World Wide Web Consortium(W3C). Verifiable credentials data model v1.1[EB/OL].[2025-04-25]. https://www.w3.org/TR/vcdata-model/
- [16] Gitlab. CN5G-gitlab[EB/OL].[2025-04-25]. https://gitlab.eurecom.fr/oai/cn5g/oai-cn5g-fed
- [17] Gitlab. Openairinterface5G[EB/OL].[2025-04-25]. https://gitlab.eurecom.fr/oai/openairinterface5g
- [18] Github. DP-Chain for MTA and U-SSI[EB/OL].[2025-04-25].https://github.com/SuperGaric/DP-Chain
- [19] National Institute of Standards and Technology. Migration to post-quantum cryptography[EB/OL].[2025-04-25]. https://www.nccoe.nist.gov/sites/default/files/2023-12/pqc-migrationnist-sp-1800-38b-preliminary-draft.pdf