MEC-enabled 5G use cases : a survey on security vulnerabilities and countermeasures
Ranaweera, Pasika; Jurcut, Anca; Liyanage, Madhusanka (2021-10-08)
Pasika Ranaweera, Anca Jurcut, and Madhusanka Liyanage. 2021. MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures. ACM Comput. Surv. 54, 9, Article 186 (October 2021), 37 pages. https://doi.org/10.1145/3474552
© 2021 Association for Computing Machinery. This is the author's version of the work. The definitive Version of Record was published in ACM Computing Surveys, https://doi.org/10.1145/3474552.
https://rightsstatements.org/vocab/InC/1.0/
https://urn.fi/URN:NBN:fi-fe202301112370
Tiivistelmä
Abstract
The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of automated driving, augmented-reality, and machine-type-communication are quite sophisticated and require an elevation of the current mobile infrastructure for launching. The fifth-generation (5G) mobile technology serves as the solution, though it lacks a proximate networking infrastructure to satisfy the service guarantees. Multi-access Edge Computing (MEC) envisages such an edge computing platform. In this survey, we are revealing security vulnerabilities of key 5G-based use cases deployed in the MEC context. Probable security flows of each case are specified, while countermeasures are proposed for mitigating them.
Kokoelmat
- Avoin saatavuus [31657]