ICC 2020 - 2020 IEEE International Conference on Communications (ICC) 2020
DOI: 10.1109/icc40277.2020.9148660
|View full text |Cite
|
Sign up to set email alerts
|

Security as a Service Platform Leveraging Multi-Access Edge Computing Infrastructure Provisions

Abstract: The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In spite of the variety of applications plausible with the envisaged technologies, security is a demanding objective that should be applied beyond the design stages. Thus, Security as a Service (SECaaS) is an initiative for a service model that enable mobile and IoT consumers with diverse security functions such as Intrusion Detection and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(21 citation statements)
references
References 21 publications
0
20
0
1
Order By: Relevance
“…Slice isolation in 5G to mitigate DDoS attacks [239] is a potential technique to enhance the security of MAR systems. With the MEC enabled 5G UDN, the complex security algorithms can be offloaded to the network edge, providing Security as a Service (SECaaS) [240]. For example, input security mechanisms for MAR can be implemented at the MEC instead of executing on each device.…”
Section: F Securitymentioning
confidence: 99%
“…Slice isolation in 5G to mitigate DDoS attacks [239] is a potential technique to enhance the security of MAR systems. With the MEC enabled 5G UDN, the complex security algorithms can be offloaded to the network edge, providing Security as a Service (SECaaS) [240]. For example, input security mechanisms for MAR can be implemented at the MEC instead of executing on each device.…”
Section: F Securitymentioning
confidence: 99%
“…Both genetic algorithms [142] and PLS models [143] have been studied for solving the offloading problem as in SEECO context. Security architectures have been proposed for securing orchestration functions [147], [148], [177], [185], while docker containerization based solutions have also been studied [149], [150].…”
Section: ) Other Threat Vectorsmentioning
confidence: 99%
“…This directive dispenses security mechanisms to be employed at the edge level of MEC, specifically to deploy an autonomous security function in MEHs for detecting anomalous behaviour among ME Apps from security parameters derived of contextual information. The Security as a Service (SECaaS) initiatives proposed for edge level infrastructures are standardizing the deployability of security, as an autonomous and intelligent function to strengthen the context-awareness [185]. The patent described in [199] demonstrates different applicable scenarios of context aware security in the MEC deployments.…”
Section: B Mec Privacymentioning
confidence: 99%
“…Security in MEC is another open challenge that has been studied in [43]. Ranaweera, P., et al propose MEC to enable security-as-a-service features.…”
Section: A Overviewmentioning
confidence: 99%
“…Scalability (C2) has been tackled in the revised literature, starting from different points of view. Novel architectures Mobility (C1) [37], [38], [40], [42], [45], [46], [49], [50], [69], [71], [84], [100], [103], [107], [117], [118], [119], [122], [128], [130], [135], [136], [170], [174], [183] 25 (20.8%) Scalability (C2) [43], [45], [46], [49], [48], [47], [52], [53], [54], [55], [56], [57], [58], [71], [73], [75], [78], [79], [80], [81], [85], [86], [87], [88] [89...…”
Section: Open Challenges and Future Directionsmentioning
confidence: 99%