Research on security defense of mobile edge computing

Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capac...

Full description

Saved in:
Bibliographic Details
Main Authors: Lu CHEN, Hongbo TANG, Wei YOU, Yi BAI
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2021-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021014
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529914240532480
author Lu CHEN
Hongbo TANG
Wei YOU
Yi BAI
author_facet Lu CHEN
Hongbo TANG
Wei YOU
Yi BAI
author_sort Lu CHEN
collection DOAJ
description Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed.
format Article
id doaj-art-c55d7e6882e548b9b30b4e8c25d0ca9e
institution Kabale University
issn 2096-109X
language English
publishDate 2021-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-c55d7e6882e548b9b30b4e8c25d0ca9e2025-01-15T03:14:43ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2021-02-01713014259563097Research on security defense of mobile edge computingLu CHENHongbo TANGWei YOUYi BAIMobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021014mobile edge computingsecuritythreatscomputing offloadingcomputing migration
spellingShingle Lu CHEN
Hongbo TANG
Wei YOU
Yi BAI
Research on security defense of mobile edge computing
网络与信息安全学报
mobile edge computing
security
threats
computing offloading
computing migration
title Research on security defense of mobile edge computing
title_full Research on security defense of mobile edge computing
title_fullStr Research on security defense of mobile edge computing
title_full_unstemmed Research on security defense of mobile edge computing
title_short Research on security defense of mobile edge computing
title_sort research on security defense of mobile edge computing
topic mobile edge computing
security
threats
computing offloading
computing migration
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021014
work_keys_str_mv AT luchen researchonsecuritydefenseofmobileedgecomputing
AT hongbotang researchonsecuritydefenseofmobileedgecomputing
AT weiyou researchonsecuritydefenseofmobileedgecomputing
AT yibai researchonsecuritydefenseofmobileedgecomputing