I. Introduction
The advent of the 5G era [1] has laid the foundation for expanding consumer-oriented applications to industry-oriented applications and brought great convenience to industry and commerce. However, the introduction of new technologies has brought unknown security risks to the network. Among them, the security challenge brought by the large connection feature in 5G is particularly prominent [2] –[4]. In addition, the number of Internet of things terminals has increased significantly, which is always online, making the data more accessible to be hijacked [5], stolen, or invaded by Trojans, making it a springboard for distributed denial of service attacks (DDoS) [6].