Visible to the public Realizing Multi-Access Edge Computing Feasibility: Security Perspective

TitleRealizing Multi-Access Edge Computing Feasibility: Security Perspective
Publication TypeConference Paper
Year of Publication2019
AuthorsRanaweera, Pasika, Jurcut, Anca Delia, Liyanage, Madhusanka
Conference Name2019 IEEE Conference on Standards for Communications and Networking (CSCN)
Keywords5G, 5G mobile communication, Ambient intelligence, cloud computing, cloud computing capabilities, communication devices, efficient data processing architecture, ETSI standards, gigabit-level bandwidth, human factors, Internet of Things, Internet of Things (IoT), IoT services, MEC, Metrics, mobile network, mobile service platform, Multi-Access Edge Computing (MEC), multi-access systems, multiaccess edge computing feasibility, pubcrawl, Radio Access Network, radio access networks, RAN, Resiliency, Scalability, security, security challenges, security perspective, telecommunication computing, telecommunication security, threat vectors, typical MEC deployment scenario, ubiquitous computing, Ubiquitous Computing Security, ultra-high storage capacity, ultra-low latency, virtualisation, virtualization technologies
AbstractInternet of Things (IoT) and 5G are emerging technologies that prompt a mobile service platform capable of provisioning billions of communication devices which enable ubiquitous computing and ambient intelligence. These novel approaches are guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. To achieve these limitations, ETSI has introduced the paradigm of Multi-Access Edge Computing (MEC) for creating efficient data processing architecture extending the cloud computing capabilities in the Radio Access Network (RAN). Despite the gained enhancements to the mobile network, MEC is subjected to security challenges raised from the heterogeneity of IoT services, intricacies in integrating virtualization technologies, and maintaining the performance guarantees of the mobile networks (i.e. 5G). In this paper, we are identifying the probable threat vectors in a typical MEC deployment scenario that comply with the ETSI standards. We analyse the identified threat vectors and propose solutions to mitigate them.
DOI10.1109/CSCN.2019.8931357
Citation Keyranaweera_realizing_2019