5G MEC system security capability deployment scheme

Multi-access edge computing (MEC), as the core differentiated capability of 5G, is the key technology for telecom operators to build private 5G networks for enterprises.With the increase of 5G MEC nodes, security risks and protection schemes are increasingly concerned.Based on the description of 5G...

Full description

Saved in:
Bibliographic Details
Main Authors: Yunyi LIU, Jianmin ZHANG, Xiaoli FENG, Liwei ZHANG
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2022-11-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/thesisDetails#10.11959/j.issn.1000-0801.2022265
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850212639334989824
author Yunyi LIU
Jianmin ZHANG
Xiaoli FENG
Liwei ZHANG
author_facet Yunyi LIU
Jianmin ZHANG
Xiaoli FENG
Liwei ZHANG
author_sort Yunyi LIU
collection DOAJ
description Multi-access edge computing (MEC), as the core differentiated capability of 5G, is the key technology for telecom operators to build private 5G networks for enterprises.With the increase of 5G MEC nodes, security risks and protection schemes are increasingly concerned.Based on the description of 5G MEC system architecture, the potential security risks were analyzed.On this basis, the security capability deployment architecture and scheme of the 5G MEC system were proposed, and the deployment case was introduced.Finally, the current problems and challenges in the deployment of MEC security capabilities were discussed to provide references for subsequent research and development.
format Article
id doaj-art-8024c2f75f5e4768a0dcdf83647ecd61
institution OA Journals
issn 1000-0801
language zho
publishDate 2022-11-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-8024c2f75f5e4768a0dcdf83647ecd612025-08-20T02:09:18ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012022-11-0138143152595756235G MEC system security capability deployment schemeYunyi LIUJianmin ZHANGXiaoli FENGLiwei ZHANGMulti-access edge computing (MEC), as the core differentiated capability of 5G, is the key technology for telecom operators to build private 5G networks for enterprises.With the increase of 5G MEC nodes, security risks and protection schemes are increasingly concerned.Based on the description of 5G MEC system architecture, the potential security risks were analyzed.On this basis, the security capability deployment architecture and scheme of the 5G MEC system were proposed, and the deployment case was introduced.Finally, the current problems and challenges in the deployment of MEC security capabilities were discussed to provide references for subsequent research and development.http://www.telecomsci.com/thesisDetails#10.11959/j.issn.1000-0801.20222655G;MEC;security capability;deployment scheme
spellingShingle Yunyi LIU
Jianmin ZHANG
Xiaoli FENG
Liwei ZHANG
5G MEC system security capability deployment scheme
Dianxin kexue
5G;MEC;security capability;deployment scheme
title 5G MEC system security capability deployment scheme
title_full 5G MEC system security capability deployment scheme
title_fullStr 5G MEC system security capability deployment scheme
title_full_unstemmed 5G MEC system security capability deployment scheme
title_short 5G MEC system security capability deployment scheme
title_sort 5g mec system security capability deployment scheme
topic 5G;MEC;security capability;deployment scheme
url http://www.telecomsci.com/thesisDetails#10.11959/j.issn.1000-0801.2022265
work_keys_str_mv AT yunyiliu 5gmecsystemsecuritycapabilitydeploymentscheme
AT jianminzhang 5gmecsystemsecuritycapabilitydeploymentscheme
AT xiaolifeng 5gmecsystemsecuritycapabilitydeploymentscheme
AT liweizhang 5gmecsystemsecuritycapabilitydeploymentscheme