5G Multi-access Edge Computing: a Survey on Security, Dependability, and Performance
نویسندگان
چکیده
The Fifth Generation (5G) of mobile networks offers new and advanced services with stricter requirements. Multi-access Edge Computing (MEC) is a key technology that enables these by deploying multiple devices computing storage capabilities at the edge network, close to end-users. MEC enhances network efficiency reducing latency, enabling real-time awareness local environment, allowing cloud offloading, traffic congestion. New mission-critical applications require high security dependability, which are rarely addressed alongside performance. This survey paper fills this gap presenting 5G MEC’s three aspects: security, provides an overview MEC, introduces taxonomy, state-of-the-art, challenges related each aspect. Finally, presents jointly addressing aspects.
منابع مشابه
Dependability in Edge Computing
Edge computing is the practice of placing computing resources at the edges of the Internet in close proximity to devices and information sources. This, much like a cache on a CPU, increases bandwidth and reduces latency for applications but at a potential cost of dependability and capacity. This is because these edge devices are often not as well maintained, dependable, powerful, or robust as c...
متن کاملMulti-access Edge Computing: The driver behind the wheel of 5G-connected cars
The automotive and telco industries have taken an investment bet on the connected car market, pushing for the digital transformation of the sector by exploiting recent Information and Communication Technology (ICT) progress. As ICT developments continue, it is expected that the technology advancements will be able to fulfill the sophisticated requirements for vehicular use cases, such as low la...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملEdge Computing Aware NOMA for 5G Networks
With the fast development of Internet of things (IoT), the fifth generation (5G) wireless networks need to provide massive connectivity of IoT devices and meet the demand for low latency. To satisfy these requirements, Non-Orthogonal Multiple Access (NOMA) has been recognized as a promising solution for 5G networks to significantly improve the network capacity. In parallel with the development ...
متن کاملA Survey on Cloud Computing Security Issues
Cloud computing is changing businesses and governments. It offers flexible computation resources in a model where customers only pay for resources they use. This leads to cost savings when compared to a situation where organizations manage their own server farms. Very often such servers are running at a very low utilization level, which is partly because of old habits that lead to not placing m...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3288334