2019 IEEE Conference on Standards for Communications and Networking (CSCN) 2019
DOI: 10.1109/cscn.2019.8931357
|View full text |Cite
|
Sign up to set email alerts
|

Realizing Multi-Access Edge Computing Feasibility: Security Perspective

Abstract: Internet of Things (IoT) and 5G are emerging technologies that prompt a mobile service platform capable of provisioning billions of communication devices which enable ubiquitous computing and ambient intelligence. These novel approaches are guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. To achieve these limitations, ETSI has introduced the paradigm of Multi-Access Edge Computing (MEC) for creating efficient data processing architecture extending t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
58
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

3
6

Authors

Journals

citations
Cited by 33 publications
(58 citation statements)
references
References 54 publications
0
58
0
Order By: Relevance
“…The MEC edge level is bound to serve several Mobile Edge Services (MESs) such as AR, video streaming, V2E, in addition to the SECaaS services. Thus, we propose that each MES could be provisioned under a Mobile Edge Host (MEH); which is the main operating entity in the MEC edge level [7]. MEHs are launching Mobile Edge Applications (ME Apps) related to a particular service that interface with a User Equipment Application (UE App) in the UE [19].…”
Section: A Mec Edge Platformmentioning
confidence: 99%
See 1 more Smart Citation
“…The MEC edge level is bound to serve several Mobile Edge Services (MESs) such as AR, video streaming, V2E, in addition to the SECaaS services. Thus, we propose that each MES could be provisioned under a Mobile Edge Host (MEH); which is the main operating entity in the MEC edge level [7]. MEHs are launching Mobile Edge Applications (ME Apps) related to a particular service that interface with a User Equipment Application (UE App) in the UE [19].…”
Section: A Mec Edge Platformmentioning
confidence: 99%
“…In spite of its origin in 2009 (i.e.Cloudlet introduction), even after a decade, EC is still at its early design stages, apart from small scale projects [4]. Various edge computing paradigms as in Multi-Access Edge Computing (MEC), Fog, Mobile Cloud Computing (MCC), and cloudlets are envisaging the deployment of applications such as Internet of Things (IoT), Ultra High Definition (UHD) streaming, Augmented Reality (AR), Tactile internet, Machine Type Communication (MTC), and Vehicle-to-Everything (V2E) [2], [5]- [7].…”
Section: Introductionmentioning
confidence: 99%
“…While a Software-Defined Edge Computing architecture solves several data traffic issues such as latency and jitter in access networks [11], it can also present new vulnerabilities [8], [10], [12], [13], resulting in a larger overall attack surface and potential security threats. Despite the increasing acceptance of MEC as a mechanism to improve the performance of connected smart devices and end-user experience, security remains one of the most significant challenges for the creation of an edge paradigm ecosystem [8], [9], [14].…”
Section: Introductionmentioning
confidence: 99%
“…Multi-Access Edge Computing (MEC) is a leading edge computing paradigm introduced by the European Telecommunications Standards Institute (ETSI) for the purpose of provisioning cloud computing capabilities at the mobile BS in proximity to the accessing User Equipment (UE) [7]. This emerging concept is one of the pillars in pragmatically launching the fifth generation (5G) mobile technology; that reforms the prevailing mobile network architecture towards a softwarized core and a backhaul network.…”
Section: Introductionmentioning
confidence: 99%