Survey on rail transit mobile edge computing network security
The introduction of mobile edge computing (MEC) technology in rail transit which has the characteristics of complex environment, high densities of passengers, and high-speed mobility can meet the low latency, mobility, and massive connection requirements of rail transit.However, MEC not only improve...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2023-04-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023071/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539986833276928 |
---|---|
author | Renchao XIE Wen WEN Qinqin TANG Yunlong LIU Gaochang XIE Tao HUANG |
author_facet | Renchao XIE Wen WEN Qinqin TANG Yunlong LIU Gaochang XIE Tao HUANG |
author_sort | Renchao XIE |
collection | DOAJ |
description | The introduction of mobile edge computing (MEC) technology in rail transit which has the characteristics of complex environment, high densities of passengers, and high-speed mobility can meet the low latency, mobility, and massive connection requirements of rail transit.However, MEC not only improves the performance of rail transit communication network but also brings security challenges.Firstly, an overview of rail transit communication network and MEC was given.Then the value of introducing MEC into rail transit and the architecture of rail transit edge computing network were discussed.After that, the security threats faced by rail transit edge computing network was analyzed and protection scheme was proposed.Finally, some open questions were proposed, which was expected to provide ideas for future research. |
format | Article |
id | doaj-art-a08570d54a4a4f14aa4065b98cbbea5b |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2023-04-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-a08570d54a4a4f14aa4065b98cbbea5b2025-01-14T06:28:30ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2023-04-014420121559390552Survey on rail transit mobile edge computing network securityRenchao XIEWen WENQinqin TANGYunlong LIUGaochang XIETao HUANGThe introduction of mobile edge computing (MEC) technology in rail transit which has the characteristics of complex environment, high densities of passengers, and high-speed mobility can meet the low latency, mobility, and massive connection requirements of rail transit.However, MEC not only improves the performance of rail transit communication network but also brings security challenges.Firstly, an overview of rail transit communication network and MEC was given.Then the value of introducing MEC into rail transit and the architecture of rail transit edge computing network were discussed.After that, the security threats faced by rail transit edge computing network was analyzed and protection scheme was proposed.Finally, some open questions were proposed, which was expected to provide ideas for future research.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023071/edge computingrail transitcybersecurityprotection |
spellingShingle | Renchao XIE Wen WEN Qinqin TANG Yunlong LIU Gaochang XIE Tao HUANG Survey on rail transit mobile edge computing network security Tongxin xuebao edge computing rail transit cybersecurity protection |
title | Survey on rail transit mobile edge computing network security |
title_full | Survey on rail transit mobile edge computing network security |
title_fullStr | Survey on rail transit mobile edge computing network security |
title_full_unstemmed | Survey on rail transit mobile edge computing network security |
title_short | Survey on rail transit mobile edge computing network security |
title_sort | survey on rail transit mobile edge computing network security |
topic | edge computing rail transit cybersecurity protection |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2023071/ |
work_keys_str_mv | AT renchaoxie surveyonrailtransitmobileedgecomputingnetworksecurity AT wenwen surveyonrailtransitmobileedgecomputingnetworksecurity AT qinqintang surveyonrailtransitmobileedgecomputingnetworksecurity AT yunlongliu surveyonrailtransitmobileedgecomputingnetworksecurity AT gaochangxie surveyonrailtransitmobileedgecomputingnetworksecurity AT taohuang surveyonrailtransitmobileedgecomputingnetworksecurity |