2021
DOI: 10.1145/3474552
|View full text |Cite
|
Sign up to set email alerts
|

MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures

Abstract: The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of automated driving, augmented-reality, and machine-type-communication are quite sophisticated and require an elevation of the current mobile infrastructure for launching. The fifth-generation (5G) mobile technology serves as the solution, though it lacks a proximate networking infrastructure to satisfy the service guarantees. Multi-access Edge Computing (MEC) envisages such an edge c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4
1

Relationship

2
8

Authors

Journals

citations
Cited by 58 publications
(34 citation statements)
references
References 118 publications
0
14
0
Order By: Relevance
“…Since wireless terminals are bound to user identities, privileged users will authorize signatures to other terminals in order to complete the signatures together more efficiently [6]. How to protect the privacy of the wireless terminal's identity while completing the data transmission between the wireless terminal and the MEC, which has essential research significance [7,8]. At present, the common methods mainly include group signature, ring signature, proxy signature, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Since wireless terminals are bound to user identities, privileged users will authorize signatures to other terminals in order to complete the signatures together more efficiently [6]. How to protect the privacy of the wireless terminal's identity while completing the data transmission between the wireless terminal and the MEC, which has essential research significance [7,8]. At present, the common methods mainly include group signature, ring signature, proxy signature, etc.…”
Section: Introductionmentioning
confidence: 99%
“…They introduce a technique to select the proximal MEC platform with unique selection criteria. Ranaweera et al [ 127 ] highlighted some security flaws in 5 G-based IoT use cases that have been implemented in the MEC setting. They suggested solutions to mitigate the security flaws that they identified.…”
Section: Multi-access Edge Computing As a Resource To Provide Securit...mentioning
confidence: 99%
“…In addition to performance degradations due to the virtualization environment, security and privacy concerns are raised when the resources on a hardware computing platform are shared [211].…”
Section: D: Securitymentioning
confidence: 99%