Research on security defense of mobile edge computing
Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capac...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2021-02-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021014 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529914240532480 |
---|---|
author | Lu CHEN Hongbo TANG Wei YOU Yi BAI |
author_facet | Lu CHEN Hongbo TANG Wei YOU Yi BAI |
author_sort | Lu CHEN |
collection | DOAJ |
description | Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed. |
format | Article |
id | doaj-art-c55d7e6882e548b9b30b4e8c25d0ca9e |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2021-02-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-c55d7e6882e548b9b30b4e8c25d0ca9e2025-01-15T03:14:43ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2021-02-01713014259563097Research on security defense of mobile edge computingLu CHENHongbo TANGWei YOUYi BAIMobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021014mobile edge computingsecuritythreatscomputing offloadingcomputing migration |
spellingShingle | Lu CHEN Hongbo TANG Wei YOU Yi BAI Research on security defense of mobile edge computing 网络与信息安全学报 mobile edge computing security threats computing offloading computing migration |
title | Research on security defense of mobile edge computing |
title_full | Research on security defense of mobile edge computing |
title_fullStr | Research on security defense of mobile edge computing |
title_full_unstemmed | Research on security defense of mobile edge computing |
title_short | Research on security defense of mobile edge computing |
title_sort | research on security defense of mobile edge computing |
topic | mobile edge computing security threats computing offloading computing migration |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021014 |
work_keys_str_mv | AT luchen researchonsecuritydefenseofmobileedgecomputing AT hongbotang researchonsecuritydefenseofmobileedgecomputing AT weiyou researchonsecuritydefenseofmobileedgecomputing AT yibai researchonsecuritydefenseofmobileedgecomputing |