Verticals in 5G MEC-Use Cases and Security Challenges

نویسندگان

چکیده

5G is the fifth-generation cellular network satisfying requirements IMT-2020 (International Mobile Telecommunications-2020) of International Telecommunication Union. operators started using it worldwide in 2019. Generally, achieves exceptionally high values performance parameters access and transmission. The application edge servers has been proposed to facilitate implementing such 5G, resulting MEC (Multi-access Edge Computing) technology. Moreover, optimize services for specific business applications, concept vertical industries proposed. In this article, we study how technology affects functioning MEC-based services. We consider twelve representative by presenting their essential characteristics, threats, vulnerabilities, known attacks. Furthermore, analyze functional properties, give efficiency patterns identify effect applying on resultant network's quality determine expected security requirements. As a result research, impact classified threats empowered most sensitive cases focus protection against attacks first place.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions

Blockchain has drawn attention as the next-generation financial technology due to its security that suits the informatization era. In particular, it provides security through the authentication of peers that share virtual cash, encryption, and the generation of hash value. According to the global financial industry, the market for security-based blockchain technology is expected to grow to abou...

متن کامل

5G systems: The mmMAGIC project perspective on use cases and challenges between 6-100 GHz

mmMAGIC (Millimetre-Wave Based Mobile Radio Access Network for Fifth Generation Integrated Communications) is an EU funded 5G-PPP project, whose overall objective is to design and pre-develop a mobile radio access technology (RAT) operating in the 6-100 GHz range, capable of impacting standards and other relevant fora. The focus of the project is on extreme Mobile Broadband, which is expected t...

متن کامل

Security Use Cases

Although use cases are a popular modeling approach for engineering functional requirements, they are often misused when it comes to engineering security requirements because requirements engineers unnecessarily specify security architectural mechanisms instead of security requirements. After discussing the relationships between misuse cases, security use cases, and security mechanisms, this col...

متن کامل

Use Cases, Requirements, and Design Considerations for 5G V2X

Ultimate goal of next generation Vehicle-to-everything (V2X) communication systems is enabling accident-free cooperative automated driving that uses the available roadway efficiently. To achieve this goal, the communication system will need to enable a diverse set of use cases, each with a specific set of requirements. We discuss the main use case categories, analyze their requirements, and com...

متن کامل

MEC-aware Cell Association for 5G Heterogeneous Networks

The need for efficient use of network resources is continuously increasing with the grow of traffic demand, however, current mobile systems have been planned and deployed so far with the mere aim of enhancing radio coverage and capacity. Unfortunately, this approach is not sustainable anymore, as 5G communication systems will have to cope with huge amounts of traffic, heterogeneous in terms of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3088374