Options
MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures
Date Issued
2022-12
Date Available
2024-05-10T15:40:12Z
Abstract
The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of automated driving, augmented-reality, and machine-type-communication are quite sophisticated and require an elevation of the current mobile infrastructure for launching. The fifth-generation (5G) mobile technology serves as the solution, though it lacks a proximate networking infrastructure to satisfy the service guarantees. Multi-access Edge Computing (MEC) envisages such an edge computing platform. In this survey, we are revealing security vulnerabilities of key 5G-based use cases deployed in the MEC context. Probable security flows of each case are specified, while countermeasures are proposed for mitigating them.
Sponsorship
University College Dublin
Other Sponsorship
Academy of Finland
Type of Material
Journal Article
Publisher
ACM
Journal
ACM Computing Surveys
Volume
54
Issue
9
Start Page
1
End Page
37
Copyright (Published Version)
2021 Association for Computing Machinery
Language
English
Status of Item
Peer reviewed
ISSN
0360-0300
This item is made available under a Creative Commons License
File(s)
Loading...
Name
ACM_Computing_Surveys___MEC_Enabled_5G_Use_Cases__A_Survey_on_Security_Vulnerabilities_and_Countermeasures_Final.pdf
Size
14.93 MB
Format
Adobe PDF
Checksum (MD5)
469c57ef67630d62f327b088148b61b0
Owning collection