Gang Zhao, Feng Zhang, Le Yu, Hongyang Zhang, Qin Qiu, Sijia Xu
{"title":"Collaborative 5G Multiaccess Computing Security: Threats, Protection Requirements and Scenarios","authors":"Gang Zhao, Feng Zhang, Le Yu, Hongyang Zhang, Qin Qiu, Sijia Xu","doi":"10.23919/ITUK53220.2021.9662088","DOIUrl":null,"url":null,"abstract":"5G MEC is a new model for 5G network architecture that moves cloud computing capabilities and IT service environments to the edge of mobile communication networks, providing nearby services for users. This establishes a carrier-class service environment with high performance, low latency, and high bandwidth. 5G MEC enables new applications by moving core network functionsto the network edge. However, it also brings new security challenges and increases security supervision difficulty. Thispaper proposes 5G MEC security protection policies for operators and 5G industry customers by drawing on successful industry practices. The goal of these policies is to help industry customers implement the three sync requirements (synchronous planning, synchronous construction, and synchronous maintenance) on securitywhile developing 5G MEC applications, as well as guiding the industry to improve MEC security capabilities.","PeriodicalId":423554,"journal":{"name":"2021 ITU Kaleidoscope: Connecting Physical and Virtual Worlds (ITU K)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 ITU Kaleidoscope: Connecting Physical and Virtual Worlds (ITU K)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ITUK53220.2021.9662088","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
5G MEC is a new model for 5G network architecture that moves cloud computing capabilities and IT service environments to the edge of mobile communication networks, providing nearby services for users. This establishes a carrier-class service environment with high performance, low latency, and high bandwidth. 5G MEC enables new applications by moving core network functionsto the network edge. However, it also brings new security challenges and increases security supervision difficulty. Thispaper proposes 5G MEC security protection policies for operators and 5G industry customers by drawing on successful industry practices. The goal of these policies is to help industry customers implement the three sync requirements (synchronous planning, synchronous construction, and synchronous maintenance) on securitywhile developing 5G MEC applications, as well as guiding the industry to improve MEC security capabilities.