2022 IEEE 19th Annual Consumer Communications &Amp; Networking Conference (CCNC) 2022
DOI: 10.1109/ccnc49033.2022.9700577
|View full text |Cite
|
Sign up to set email alerts
|

Security of Micro MEC in 6G: A Brief Overview

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
3
1

Relationship

5
2

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 47 publications
0
8
0
Order By: Relevance
“…EdgeAI, thus, play a very important role in providing opportunity for redundant resources and distributing important network control functions. The concept of devolving control functions with the help of miniaturizing edge to the extreme edge, as discussed in [38], can improve safety in terms of minimizing the impact of failures and delimiting the consequences. The same is true for communications links, using multiple access technologies to avoid blackout due to failure in one.…”
Section: A Dependability In 6g Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…EdgeAI, thus, play a very important role in providing opportunity for redundant resources and distributing important network control functions. The concept of devolving control functions with the help of miniaturizing edge to the extreme edge, as discussed in [38], can improve safety in terms of minimizing the impact of failures and delimiting the consequences. The same is true for communications links, using multiple access technologies to avoid blackout due to failure in one.…”
Section: A Dependability In 6g Networkmentioning
confidence: 99%
“…Moreover, VLC faces threats coming from attackers that are capable of positioning themselves within lineof-sight of the target. Physical security is also important as the nodes of a highly distributed network can be easily targeted by malicious users and damaged as part of a cyberattack [38]. EdgeAI can help provide timely monitoring and response procedures, such as intrusion detection and prevention systems (IDS/IPS), deployed in the vicinity where the threat originates [19].…”
Section: A Dependability In 6g Networkmentioning
confidence: 99%
“…Task offloading is the primary technology used in MEC and Fog for such kind of NIDS design to secure the IoT system from cyber attacks. Task offloading is employed as a mechanism to reduce energy consumption, latency, and the resource-constraints problems in IoT system [ 112 , 113 , 114 ]. Hence, the proximity of the IoT system from the MEC server during NIDS task offloading is significant.…”
Section: Multi-access Edge Computing As a Resource To Provide Securit...mentioning
confidence: 99%
“…Consequently vulnerabilities originating from Linux, thirdparty components, or on orbit updates must be addressed. The principle of least privilege [119] for third party applications, and role and attribute-based access control [120] must be researched for programmable satellites.…”
Section: E Summary Of Security Solutionsmentioning
confidence: 99%