2021
DOI: 10.48550/arxiv.2107.13374
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

5G Multi-access Edge Computing: Security, Dependability, and Performance

Gianfranco Nencioni,
Rosario G. Garroppo,
Ruxandra F. Olimid

Abstract: The main innovation of the Fifth Generation (5G) of mobile networks is the ability to provide novel services with new and stricter requirements. One of the technologies that enable the new 5G services is the Multi-access Edge Computing (MEC). MEC is a system composed of multiple devices with computing and storage capabilities that are deployed at the edge of the network, i.e., close to the end users. MEC reduces latency and enables contextual information and real-time awareness of the local environment. MEC al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(14 citation statements)
references
References 134 publications
(349 reference statements)
0
14
0
Order By: Relevance
“…The survey [ 8 ] reviews key research areas, technological advancements, and areas of future research in MEC Beyond 5G/6G. The survey [ 13 ] examines the security, dependability, and performance aspects of 5G MECs. A brief overview of background knowledge on MEC is provided by referring to current standardization efforts.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The survey [ 8 ] reviews key research areas, technological advancements, and areas of future research in MEC Beyond 5G/6G. The survey [ 13 ] examines the security, dependability, and performance aspects of 5G MECs. A brief overview of background knowledge on MEC is provided by referring to current standardization efforts.…”
Section: Related Workmentioning
confidence: 99%
“…MEC’s ultra-low-latency solution accelerates data flow and delivers real-time information collection for various applications [ 11 ]. There are multiple factors that should be considered such as the infrastructure of the edge, compute applications, the support of real-time communications, the desired time delay, server capacity, and population coverage [ 12 , 13 ].…”
Section: Introductionmentioning
confidence: 99%
“…European Telecommunications Standards Institute (ETSI) initiated MEC standardization in 2014 [16]. The framework of MEC is illustrated in Figure 1 and it consists of three levels [6]: MEC system, MEC host, and network.…”
Section: Mec Frameworkmentioning
confidence: 99%
“…The MEC system level includes the MEC orchestrator (MEO) and user application. MEO has an overview of the MEC system, selects a new host for relocation, and initiates the transfer from the source MEC host to the target MEC host [6,16].…”
Section: Mec Frameworkmentioning
confidence: 99%
“…MEC will likely help satisfy demands for 5G requirements regarding expected throughput, latency, scalability, availability, and automation [4]. Additionally, MEC promises enhanced security and privacy by preventing data from arriving at centralized servers and thus avoiding a centralized point of trust [6].…”
mentioning
confidence: 99%