5G MEC system security capability deployment scheme

Multi-access edge computing (MEC), as the core differentiated capability of 5G, is the key technology for telecom operators to build private 5G networks for enterprises.With the increase of 5G MEC nodes, security risks and protection schemes are increasingly concerned.Based on the description of 5G...

Full description

Saved in:
Bibliographic Details
Main Authors: Yunyi LIU, Jianmin ZHANG, Xiaoli FENG, Liwei ZHANG
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2022-11-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022265/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530768969433088
author Yunyi LIU
Jianmin ZHANG
Xiaoli FENG
Liwei ZHANG
author_facet Yunyi LIU
Jianmin ZHANG
Xiaoli FENG
Liwei ZHANG
author_sort Yunyi LIU
collection DOAJ
description Multi-access edge computing (MEC), as the core differentiated capability of 5G, is the key technology for telecom operators to build private 5G networks for enterprises.With the increase of 5G MEC nodes, security risks and protection schemes are increasingly concerned.Based on the description of 5G MEC system architecture, the potential security risks were analyzed.On this basis, the security capability deployment architecture and scheme of the 5G MEC system were proposed, and the deployment case was introduced.Finally, the current problems and challenges in the deployment of MEC security capabilities were discussed to provide references for subsequent research and development.
format Article
id doaj-art-aabd1989040d44c9959178b4457bacaa
institution Kabale University
issn 1000-0801
language zho
publishDate 2022-11-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-aabd1989040d44c9959178b4457bacaa2025-01-15T02:59:56ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012022-11-0138143152595756235G MEC system security capability deployment schemeYunyi LIUJianmin ZHANGXiaoli FENGLiwei ZHANGMulti-access edge computing (MEC), as the core differentiated capability of 5G, is the key technology for telecom operators to build private 5G networks for enterprises.With the increase of 5G MEC nodes, security risks and protection schemes are increasingly concerned.Based on the description of 5G MEC system architecture, the potential security risks were analyzed.On this basis, the security capability deployment architecture and scheme of the 5G MEC system were proposed, and the deployment case was introduced.Finally, the current problems and challenges in the deployment of MEC security capabilities were discussed to provide references for subsequent research and development.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022265/5GMECsecurity capabilitydeployment scheme
spellingShingle Yunyi LIU
Jianmin ZHANG
Xiaoli FENG
Liwei ZHANG
5G MEC system security capability deployment scheme
Dianxin kexue
5G
MEC
security capability
deployment scheme
title 5G MEC system security capability deployment scheme
title_full 5G MEC system security capability deployment scheme
title_fullStr 5G MEC system security capability deployment scheme
title_full_unstemmed 5G MEC system security capability deployment scheme
title_short 5G MEC system security capability deployment scheme
title_sort 5g mec system security capability deployment scheme
topic 5G
MEC
security capability
deployment scheme
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2022265/
work_keys_str_mv AT yunyiliu 5gmecsystemsecuritycapabilitydeploymentscheme
AT jianminzhang 5gmecsystemsecuritycapabilitydeploymentscheme
AT xiaolifeng 5gmecsystemsecuritycapabilitydeploymentscheme
AT liweizhang 5gmecsystemsecuritycapabilitydeploymentscheme