Abstract

5G is the fifth-generation cellular network satisfying the requirements IMT-2020 (International Mobile Telecommunications-2020) of the International Telecommunication Union. Mobile network operators started using it worldwide in 2019. Generally, 5G achieves exceptionally high values of performance parameters of access and transmission. The application of edge servers has been proposed to facilitate implementing such requirements of 5G, resulting in 5G MEC (Multi-access Edge Computing) technology. Moreover, to optimize services for specific business applications, the concept of 5G vertical industries has been proposed. In this article, we study how the application of the MEC technology affects the functioning of 5G MEC-based services. We consider twelve representative vertical industries of 5G MEC by presenting their essential characteristics, threats, vulnerabilities, and known attacks. Furthermore, we analyze their functional properties, give efficiency patterns and identify the effect of applying the MEC technology in 5G on the resultant network's quality parameters to determine the expected security requirements. As a result of the research, we identify the impact of classified threats on the 5G empowered vertical industries and identify the most sensitive cases to focus on their protection against network attacks in the first place.

Highlights

  • C ONTEMPORARY networks offered by Mobile Network Operators (MNOs), based on 5G wireless communications technologies and supported by MEC network architecture, requires coordinating and adapting new security capabilities for themselves and Mobile Virtual Network Operators (MVNOs)

  • We identify the impact of classified threats on the 5G empowered vertical industries and identify the most sensitive cases to focus on their protection against network attacks in the first place

  • To provide adequate network functionalities for a vertical, one can use the standardized types of 5G networks, e.g., suitable for realtime and other Fixed Wireless Access (FWA) services, the enhanced Mobile Broadband, which needs to support large payloads and high bandwidth and which can use to the greatest extent the protection offer of edge devices [8], Ultra- Reliable and Low-Latency Communication (URLLC), which supports use cases with very low latency for services that require short response times, or massive Machine Type Communication for Machine-to-Machine (M2M), which should support many devices in a base station, see [9], [10]

Read more

Summary

INTRODUCTION

C ONTEMPORARY networks offered by Mobile Network Operators (MNOs), based on 5G wireless communications technologies and supported by MEC network architecture, requires coordinating and adapting new security capabilities for themselves and Mobile Virtual Network Operators (MVNOs). Mobile-to-Insurance Machine-to-Machine Mobility-as-a-Service Multi-access Edge Computing Multi-Factor Authentication Million Instructions Per Second Machine learning/ Artificial Intelligence-based Mobile Network Operators Mobile Virtual Network Enabler Mobile Virtual Network Operators Mobility-as-a-Service Narrow-band Internet of Things Near Field Communication Network Function Virtualization National Institute of Standards and Technology Open Authorization 2 Open Platform Communications United Architecture One-way Trip Time Open Web Application Security Project Payment Card Industry Data Security Standard Peak data rate Protected Health Information Public Key Infrastructure Property Owner Progressive Web App Quality of Experience Quality of Service Responsibility Assignment Matrix Reliability Radio-Frequency Identification Routing Protocol for Low-Power and Lossy Networks Round Trip Time Software Defined Networking Smart e-commerce Systems Security Service Level Agreement Total Cost of Ownership Tactile Internet Transport Layer Security Trust to MEC platform Transport-as-a-Service Unmanned Aerial System Unmanned Aerial Vehicles User Equipment Ultra-Reliable Low-Latency Communication United States Cybersecurity and Infrastructure Security Agency User Experience Vehicle-to-Infrastructure Vehicle-to-Network Vehicle-to-Pedestrian Vehicle-to-Vehicle Vehicle-to-everything Virtual Network Function Virtual Reality/Augmented Reality Vertical Engagement Task Force Wide Area Network World Health Organization World Wide Web Wireless Fidelity pillars of 5G is proposed.

BACKGROUND
MANUFACTURING INDUSTRY
HEALTHCARE
TELECOMMUNICATIONS
SMART CITY
MEC FOR MANUFACTURING INDUSTRY
MEC FOR FINANCIAL SECTOR
MEC FOR THE HEALTHCARE SECTOR
MEC FOR THE RETAIL SECTOR
MEC FOR TELECOMMUNICATIONS
MEC FOR AUTHORITIES
MEC FOR MEDIA AND ENTERTAINMENT
C C N NCCCC C NN N NC C
CONCLUSIONS AND MAIN SECURITY
H H H MH MH H MH H H
Findings
SUMMARY AND FUTURE WORK
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call