Survey on Multi-Access Edge Computing Security and Privacy
read more
Citations
Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research
Survey on Network Slicing for Internet of Things Realization in 5G Networks
Security and privacy for 6G: A survey on prospective technologies and challenges
The Roadmap to 6G Security and Privacy
Future smart cities: requirements, emerging technologies, applications, challenges, and future aspects
References
Reinforcement Learning: An Introduction
The Case for VM-Based Cloudlets in Mobile Computing
A Survey on Mobile Edge Computing: The Communication Perspective
Mobile Edge Computing: A Survey on Architecture and Computation Offloading
Mobile Edge Computing: A Survey
Related Papers (5)
Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review
Frequently Asked Questions (16)
Q2. What are the future works mentioned in the paper "Survey on multi-access edge computing security and privacy" ?
Moreover, the future directives that extend to diverse avenues of MECenabled technologies were also presented.
Q3. What are the requirements for a system where cyber-security is applicable?
Factors such as traceability, authentication, authorization, anonymization, granularity, localization, and trust are novel requirements for systems where cyber-security is applicable.
Q4. What is the key requirement for realizing the MEC paradigm?
Summary: Standardizing traffic steering policies for the MEC system via the 5G-based PCF AF is a key requirement for realizing the MEC paradigm.
Q5. What is the key requirement for the system level entities to monitor anomalous processes?
hypervisor introspection is a key requirement for the system level entities to monitor anomalous processes occurring at both edge and system levels.
Q6. What are the main aspects of the MEC system that are impacting it?
The vulnerabilities in terms of softwarized, migration, offloading, networking, VMs, container, hypervisor, and orchestration aspects are inevitably impacting the MEC system, due to its reliance on virtualization technologies.
Q7. What are the methods used for improving authentication of Wi-Fi networks?
Methods such as PUF [62], accelerometer data [63], and visible light (referred as Li-Fi) [64] are explored for improving authentication of Wi-Fi networks.
Q8. What are the main problems of offloading?
The offloading problems are not only related to security, but also deal with energy, computational, and networking costs that improve the efficiency of the process.
Q9. What is the potential for traffic steering management?
In terms of security, SoftVPMS–based adaptation to the networking infrastructure of the MEC system represents great potential for traffic steering management.
Q10. What is the practice for encrypting and signing VNF images?
• Encrypting and signing VNF images: Encrypting the VNF-based hard disk volumes is the best practice for mitigating the confidentiality threat of the MEC edge level.
Q11. How has ShadowNet been used to prevent DDoS attacks?
ShadowNet has been employed for preventing application-level IoT based DDoS attacks, which proves better early detection (10 times faster) and enables 82% of traffic to ingress during an active DDoS operation.
Q12. Why are container technologies becoming the directive for launching dynamic virtual platforms in edge computing scenarios?
Due to the cumbersome nature of the VMs, container technologies are becoming the directive for launching dynamic virtual platforms in edge computing scenarios.
Q13. What are the common threats directed toward the network slicing technique?
Most of the threats directed toward the network slicing technique exist through the network’s vulnerabilities; these include the non-existent mutual authentication schemes between the entities in different slices; insecure communication among Network Slice Instances (NSIs) and Network Slice Managers (NSMs); incompatibility of diverse security protocols and policies at different slices; different security levels at different slices which could permit an attacker to exhaust the resources a secure slice gaining the access from a low security slice; and attachment of UE to multiple slices which increases the tendency for blending of information flaws in case of an infected UE App [125].•
Q14. How is the proposed framework adaptable to both MEC and fog paradigms?
the deployment of network slices in the proposed framework is adaptable to both fog and MEC paradigms considering the resem-23blance in the service structure in the access network entities, while the core network is served by the 5G technology for both cases.
Q15. What is the main reason for the opaqueness of MBoxes?
The opaqueness attributed to MBoxes through modification of packet headers leads to inconsistencies in steering with altered addressing parameters.
Q16. What is the importance of confidentiality, integrity, and availability?
meeting confidentiality, integrity, and availability requirements is paramount to forming security protocols in the access technologies.