Abstract

Mobile Edge Computing (MEC) can effectively solve the problem of heavy backhaul link load and the long delay in traditional networks by further extending the telecom cellular network to other wireless access networks. However, because MEC nodes have abundant computing resources, communication resources, and storage resources, they carry the sensitive data storage, communication applications, and computing services of multiple enterprises. Once the attacker controls the edge nodes, they can use the edge nodes for further horizontal or Vertical attacks will seriously damage the confidentiality, availability, and integrity of applications, communications, and data, and will bring a wide range of new security threats to users and society. At the same time, MEC nodes are often deployed in unattended computer rooms, and there are multiple operators and responsible parties in the safety life cycle, which brings more challenges to physical safety protection and safe operation management. Based on the analysis of the security threats faced by mobile edge computing, the key problems, and challenges faced by mobile edge computing are summarized and expounded because of four different security subjects, namely, device security, application security, data security, and management security, and the existing security solutions are summarized.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call