2021
DOI: 10.1109/comst.2021.3062546
|View full text |Cite
|
Sign up to set email alerts
|

Survey on Multi-Access Edge Computing Security and Privacy

Abstract: The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MEC deployments. In this paper, we analyse the security and privacy of the MEC system. We introduce a thorough investigation of the identification and the analysis of threat vectors in the ETSI standardized MEC architec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
96
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 233 publications
(97 citation statements)
references
References 162 publications
(364 reference statements)
0
96
0
1
Order By: Relevance
“…As emerging applications requires a very high reliability and very low latency, e.g., tele-surgery, massive production, and autonomous decision-making manufacturing, 6G is a potential solution as massive uRLLC solutions will be available in 5G [12], [19]. Since a huge volume of data is generated by industrial robots and sensors, only processing the data at the central cloud is not an effective solution, and this demands a need for coordination with computing nodes at the network edge [137], [138]. Moreover, 6G with many promising technologies such as wireless power transfer, energy harvesting, and backscatter communications will provide sustainable solutions for energylimited sensors and robots in Industry 5.0.…”
Section: F Connected and Autonomous Vehiclementioning
confidence: 99%
“…As emerging applications requires a very high reliability and very low latency, e.g., tele-surgery, massive production, and autonomous decision-making manufacturing, 6G is a potential solution as massive uRLLC solutions will be available in 5G [12], [19]. Since a huge volume of data is generated by industrial robots and sensors, only processing the data at the central cloud is not an effective solution, and this demands a need for coordination with computing nodes at the network edge [137], [138]. Moreover, 6G with many promising technologies such as wireless power transfer, energy harvesting, and backscatter communications will provide sustainable solutions for energylimited sensors and robots in Industry 5.0.…”
Section: F Connected and Autonomous Vehiclementioning
confidence: 99%
“…The smart wearable is another application domain that is comprised with several discussed applications, such as smart healthcare, smart city and AR/VR/gaming. Networking slicing with MEC is recognised as a solution to overcome the critical concerns in wearable communications, such as short battery life and limited computing capability [149], [150]. Smart supply chain is listed in the top ten IoT applications in [151].…”
Section: J Other Applicationsmentioning
confidence: 99%
“…NFV related security issues are attacks targeting Virtual Machines (VM), Virtual Network Functions (VNF), hypervisor, VNF manager, NFV orchestrator [8]. Due to the massively distributed nature of 6G systems, MEC in 6G is subjected to physical security threats, Distributed Denial of Service (DDoS), man-in-the-middle attacks [9]. Potential attacks for network slicing are DoS attacks, information theft via compromised slices [10].…”
Section: A Pre-6g Securitymentioning
confidence: 99%