MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures
نویسندگان
چکیده
The future of mobile and internet technologies are manifesting advancements beyond the existing scope science. concepts automated driving, augmented-reality, machine-type-communication quite sophisticated require an elevation current infrastructure for launching. fifth-generation (5G) technology serves as solution, though it lacks a proximate networking to satisfy service guarantees. Multi-access Edge Computing (MEC) envisages such edge computing platform. In this survey, we revealing security vulnerabilities key 5G-based use cases deployed in MEC context. Probable flows each case specified, while countermeasures proposed mitigating them.
منابع مشابه
Wireless Security: Vulnerabilities and Countermeasures
The panel session will cover current issues and problems in wireless security and approaches to dealing with them.
متن کاملRFID Technology, Security Vulnerabilities, and Countermeasures
Radio frequency identification (RFID) is a means of automatic identification that uses radio waves to detect, track, identify, and thus manage a variety of objects. The purpose of an RFID system is transmitting data from a portable device, called a tag, to an RFID reader to execute a particular application based on the tag provided identification or location information (Graafstra, 2006; O' Bri...
متن کاملA Survey on Security Issues and Vulnerabilities on Cloud Computing
Cloud computing has gained significant traction for recent years. It is a form of distributed computing whereby resources and application platform are shared over the internet through on demand and pay on utilization basis. Several companies have already built Internet consumer services such as search engine, use of some websites to communicate with other user in websites, E-mail services, and ...
متن کاملVulnerabilities and Countermeasures – A Survey on the Cyber Security Issues in the Transmission Subsystem of a Smart Grid
With the increased investment and deployment of embedded computing and communication technologies in the power system – the smart grid vision is shaping up into a reality. The future power grid is a large cyber physical system (CPS) which is vulnerable to cyber security threats. Among the three major subsystems of a power grid – generation, transmission and distribution – this survey focuses on...
متن کاملA survey on RPL attacks and their countermeasures
RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Computing Surveys
سال: 2021
ISSN: ['0360-0300', '1557-7341']
DOI: https://doi.org/10.1145/3474552