Ranaweera, PasikaPasikaRanaweeraJurcut, Anca DeliaAnca DeliaJurcutLiyanage, MadhusankaMadhusankaLiyanage2024-05-102024-05-102021 Assoc2022-12ACM Computing Surveys0360-0300http://hdl.handle.net/10197/25912The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of automated driving, augmented-reality, and machine-type-communication are quite sophisticated and require an elevation of the current mobile infrastructure for launching. The fifth-generation (5G) mobile technology serves as the solution, though it lacks a proximate networking infrastructure to satisfy the service guarantees. Multi-access Edge Computing (MEC) envisages such an edge computing platform. In this survey, we are revealing security vulnerabilities of key 5G-based use cases deployed in the MEC context. Probable security flows of each case are specified, while countermeasures are proposed for mitigating them.en© ACM, 2022. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ACM Computing Surveys, Volume 54, Issue 9, (December 2022) Article No.: 186 https://doi.org/10.1145/34745525GUse casesMECSecurityITSV2EARVRUAVmMTCeMBBMEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and CountermeasuresJournal Article54913710.1145/34745522022-03-19318927https://creativecommons.org/licenses/by-nc-nd/3.0/ie/