当前位置: X-MOL 学术ACM Comput. Surv. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures
ACM Computing Surveys ( IF 16.6 ) Pub Date : 2021-10-08 , DOI: 10.1145/3474552
Pasika Ranaweera 1 , Anca Jurcut 1 , Madhusanka Liyanage 2
Affiliation  

The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of automated driving, augmented-reality, and machine-type-communication are quite sophisticated and require an elevation of the current mobile infrastructure for launching. The fifth-generation (5G) mobile technology serves as the solution, though it lacks a proximate networking infrastructure to satisfy the service guarantees. Multi-access Edge Computing (MEC) envisages such an edge computing platform. In this survey, we are revealing security vulnerabilities of key 5G-based use cases deployed in the MEC context. Probable security flows of each case are specified, while countermeasures are proposed for mitigating them.

中文翻译:

支持 MEC 的 5G 用例:安全漏洞和对策调查

移动和互联网技术的未来正在展现超越现有科学范围的进步。自动驾驶、增强现实和机器类型通信的概念非常复杂,需要提升当前的移动基础设施才能启动。第五代 (5G) 移动技术作为解决方案,尽管它缺乏满足服务保证的邻近网络基础设施。多接入边缘计算 (MEC) 设想了这样一个边缘计算平台。在本次调查中,我们揭示了部署在 MEC 环境中的基于 5G 的关键用例的安全漏洞。指定了每种情况的可能安全流程,同时提出了缓解它们的对策。
更新日期:2021-10-08
down
wechat
bug