MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures

نویسندگان

چکیده

The future of mobile and internet technologies are manifesting advancements beyond the existing scope science. concepts automated driving, augmented-reality, machine-type-communication quite sophisticated require an elevation current infrastructure for launching. fifth-generation (5G) technology serves as solution, though it lacks a proximate networking to satisfy service guarantees. Multi-access Edge Computing (MEC) envisages such edge computing platform. In this survey, we revealing security vulnerabilities key 5G-based use cases deployed in MEC context. Probable flows each case specified, while countermeasures proposed mitigating them.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wireless Security: Vulnerabilities and Countermeasures

The panel session will cover current issues and problems in wireless security and approaches to dealing with them.

متن کامل

RFID Technology, Security Vulnerabilities, and Countermeasures

Radio frequency identification (RFID) is a means of automatic identification that uses radio waves to detect, track, identify, and thus manage a variety of objects. The purpose of an RFID system is transmitting data from a portable device, called a tag, to an RFID reader to execute a particular application based on the tag provided identification or location information (Graafstra, 2006; O' Bri...

متن کامل

A Survey on Security Issues and Vulnerabilities on Cloud Computing

Cloud computing has gained significant traction for recent years. It is a form of distributed computing whereby resources and application platform are shared over the internet through on demand and pay on utilization basis. Several companies have already built Internet consumer services such as search engine, use of some websites to communicate with other user in websites, E-mail services, and ...

متن کامل

Vulnerabilities and Countermeasures – A Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid

With the increased investment and deployment of embedded computing and communication technologies in the power system – the smart grid vision is shaping up into a reality. The future power grid is a large cyber physical system (CPS) which is vulnerable to cyber security threats. Among the three major subsystems of a power grid – generation, transmission and distribution – this survey focuses on...

متن کامل

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Computing Surveys

سال: 2021

ISSN: ['0360-0300', '1557-7341']

DOI: https://doi.org/10.1145/3474552