2021 31st International Telecommunication Networks and Applications Conference (ITNAC) 2021
DOI: 10.1109/itnac53136.2021.9652141
|View full text |Cite
|
Sign up to set email alerts
|

Uplifting Healthcare Cyber Resilience with a Multi-access Edge Computing Zero-Trust Security Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 15 publications
0
15
0
Order By: Relevance
“…There are consistent message flows between the eNodeB and UEs. We have discussed the details in our previous work 34 . Our PoC experiments aim to evaluate the practicality and promise of our proposal in upholding the ZTS guiding principles for offloading tasks between trusted and reliable MEC servers.…”
Section: Trust‐aware Authentication and Task Load Balancing In Mecmentioning
confidence: 99%
See 1 more Smart Citation
“…There are consistent message flows between the eNodeB and UEs. We have discussed the details in our previous work 34 . Our PoC experiments aim to evaluate the practicality and promise of our proposal in upholding the ZTS guiding principles for offloading tasks between trusted and reliable MEC servers.…”
Section: Trust‐aware Authentication and Task Load Balancing In Mecmentioning
confidence: 99%
“…Therefore, the user needs access to a specific service from the MEC server to meet its stringent performance requirements via computational offloading. The computational model can be defined in three steps following the models introduced in related works 9,25,34 . First the UE requests access by uploading a specific size of data that needs to be processed by the MEC server through the radio access network.…”
Section: Trust‐aware Authentication and Task Load Balancing In Mecmentioning
confidence: 99%
“…e proposed model is constructed in three layers: UE, edge, and cloud, as depicted in Figure 2. e layers and their capabilities are discussed in our previous work [3]. e MEC ZTS architecture consists of the following entities:…”
Section: Proposed Systemmentioning
confidence: 99%
“…In [3], we have incorporated the fundamental ZTS model into the MEC reference architecture. e ZTS model in the MEC host layer is not supposed to trust any user due to increasing insider threats.…”
Section: Proposed Systemmentioning
confidence: 99%
See 1 more Smart Citation