5G MEC system security capability deployment scheme
Multi-access edge computing (MEC), as the core differentiated capability of 5G, is the key technology for telecom operators to build private 5G networks for enterprises.With the increase of 5G MEC nodes, security risks and protection schemes are increasingly concerned.Based on the description of 5G...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Beijing Xintong Media Co., Ltd
2022-11-01
|
| Series: | Dianxin kexue |
| Subjects: | |
| Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022265/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1841530768969433088 |
|---|---|
| author | Yunyi LIU Jianmin ZHANG Xiaoli FENG Liwei ZHANG |
| author_facet | Yunyi LIU Jianmin ZHANG Xiaoli FENG Liwei ZHANG |
| author_sort | Yunyi LIU |
| collection | DOAJ |
| description | Multi-access edge computing (MEC), as the core differentiated capability of 5G, is the key technology for telecom operators to build private 5G networks for enterprises.With the increase of 5G MEC nodes, security risks and protection schemes are increasingly concerned.Based on the description of 5G MEC system architecture, the potential security risks were analyzed.On this basis, the security capability deployment architecture and scheme of the 5G MEC system were proposed, and the deployment case was introduced.Finally, the current problems and challenges in the deployment of MEC security capabilities were discussed to provide references for subsequent research and development. |
| format | Article |
| id | doaj-art-aabd1989040d44c9959178b4457bacaa |
| institution | Kabale University |
| issn | 1000-0801 |
| language | zho |
| publishDate | 2022-11-01 |
| publisher | Beijing Xintong Media Co., Ltd |
| record_format | Article |
| series | Dianxin kexue |
| spelling | doaj-art-aabd1989040d44c9959178b4457bacaa2025-01-15T02:59:56ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012022-11-0138143152595756235G MEC system security capability deployment schemeYunyi LIUJianmin ZHANGXiaoli FENGLiwei ZHANGMulti-access edge computing (MEC), as the core differentiated capability of 5G, is the key technology for telecom operators to build private 5G networks for enterprises.With the increase of 5G MEC nodes, security risks and protection schemes are increasingly concerned.Based on the description of 5G MEC system architecture, the potential security risks were analyzed.On this basis, the security capability deployment architecture and scheme of the 5G MEC system were proposed, and the deployment case was introduced.Finally, the current problems and challenges in the deployment of MEC security capabilities were discussed to provide references for subsequent research and development.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022265/5GMECsecurity capabilitydeployment scheme |
| spellingShingle | Yunyi LIU Jianmin ZHANG Xiaoli FENG Liwei ZHANG 5G MEC system security capability deployment scheme Dianxin kexue 5G MEC security capability deployment scheme |
| title | 5G MEC system security capability deployment scheme |
| title_full | 5G MEC system security capability deployment scheme |
| title_fullStr | 5G MEC system security capability deployment scheme |
| title_full_unstemmed | 5G MEC system security capability deployment scheme |
| title_short | 5G MEC system security capability deployment scheme |
| title_sort | 5g mec system security capability deployment scheme |
| topic | 5G MEC security capability deployment scheme |
| url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022265/ |
| work_keys_str_mv | AT yunyiliu 5gmecsystemsecuritycapabilitydeploymentscheme AT jianminzhang 5gmecsystemsecuritycapabilitydeploymentscheme AT xiaolifeng 5gmecsystemsecuritycapabilitydeploymentscheme AT liweizhang 5gmecsystemsecuritycapabilitydeploymentscheme |