MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures (original) (raw)

Verticals in 5G MEC-Use Cases and Security Challenges

IEEE Access, 2021

5G is the fifth-generation cellular network satisfying the requirements IMT-2020 (International Mobile Telecommunications-2020) of the International Telecommunication Union. Mobile network operators started using it worldwide in 2019. Generally, 5G achieves exceptionally high values of performance parameters of access and transmission. The application of edge servers has been proposed to facilitate implementing such requirements of 5G, resulting in 5G MEC (Multi-access Edge Computing) technology. Moreover, to optimize services for specific business applications, the concept of 5G vertical industries has been proposed. In this article, we study how the application of the MEC technology affects the functioning of 5G MEC-based services. We consider twelve representative vertical industries of 5G MEC by presenting their essential characteristics, threats, vulnerabilities, and known attacks. Furthermore, we analyze their functional properties, give efficiency patterns and identify the effect of applying the MEC technology in 5G on the resultant network's quality parameters to determine the expected security requirements. As a result of the research, we identify the impact of classified threats on the 5G empowered vertical industries and identify the most sensitive cases to focus on their protection against network attacks in the first place.

Realizing Multi-Access Edge Computing Feasibility: Security Perspective

2019 IEEE Conference on Standards for Communications and Networking (CSCN), 2019

Internet of Things (IoT) and 5G are emerging technologies that prompt a mobile service platform capable of provisioning billions of communication devices which enable ubiquitous computing and ambient intelligence. These novel approaches are guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. To achieve these limitations, ETSI has introduced the paradigm of Multi-Access Edge Computing (MEC) for creating efficient data processing architecture extending the cloud computing capabilities in the Radio Access Network (RAN). Despite the gained enhancements to the mobile network, MEC is subjected to security challenges raised from the heterogeneity of IoT services, intricacies in integrating virtualization technologies, and maintaining the performance guarantees of the mobile networks (i.e. 5G). In this paper, we are identifying the probable threat vectors in a typical MEC deployment scenario that comply with the ETSI standards. We analyse the identified threat vectors and propose solutions to mitigate them.

Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments

Research on next-generation 5G wireless networks is currently attracting a lot of attention in both academia and industry. While 5G development and standardization activities are still at their early stage, it is widely acknowledged that 5G systems are going to extensively rely on dense small cell deployments, which would exploit infrastructure and network functions virtualization (NFV), and push the network intelligence towards network edges by embracing the concept of mobile edge computing (MEC). As security will be a fundamental enabling factor of small cell as a service (SCaaS) in 5G networks, we present the most prominent threats and vulnerabilities against a broad range of targets. As far as the related work is concerned, to the best of our knowledge, this paper is the rst to investigate security challenges at the intersection of SCaaS, NFV, and MEC. It is also the rst paper that proposes a set of criteria to facilitate a clear and eective taxonomy of security challenges of main elements of 5G networks. Our analysis can serve as a staring point towards the development of appropriate 5G security solutions. These will have crucial eect on legal and regulatory frameworks as well as on decisions of businesses, governments, and end-users. Keywords: Security, small cell as a service, network functions virtual-ization, mobile edge computing, 5G.

An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios

Volume 16, Issue 1, 2024

With the advancement of ICTs, the fifth generation has developed into an emergent communication platform that supports high speed, low-latency, and excellent connectivity to numerous devices with modern radio technology, service-oriented design, and cloud infrastructure. The recent developments in 5G and existing proposed plans are centered on the security model of this study, with authentication, availability, confidentiality, integrity, visibility, and a centralized security policy. However, initiating innovative technologies and enhanced aspects in 5G communication raises new requirements and has presented various security challenges. 5G-based applications face security risks because they use modern technology. This paper presents a study of security attacks and the security risks faced by 5G intelligent applications. This article also investigates the three main 5G usage scenarios (i.e., eMBB, uRLLC, and mMTC). This research recommends reducing the security risks of 5G usage scenarios and intelligent applications.

Security Analysis of Mobile Edge Computing in Virtualized Small Cell Networks

Based upon the context of Mobile Edge Computing (MEC) actual research and within the innovative scope of the SESAME EU-funded research project, we propose and assess a framework for security analysis applied in virtualised Small Cell Networks, with the aim of further extending MEC in the broader 5G environment. More specifically, by applying the fundamental concepts of the SESAME original architecture that aims at providing enhanced multi-tenant MEC services though Small Cells coordination and virtualization, we focus on a realistic 5G-oriented scenario enabling the provision of large multi-tenant enterprise services by using MEC. Then we evaluate several security issues by using a formal methodology, known as Secure Tropos.

Overview of 5G & Beyond Security

EAI Endorsed Transactions on Internet of Things

Network security is a crucial concern when it comes to computation, concerns like threats can have high consequences, and critical information will be shared with unauthorized persons. This paper presents a detailed survey on Fifth Generation (5G) and security aspect. This is more predictable since the core technology; the synonymous approach is possible with Fifth Generation (5G) and Beyond Technologies though with limited access. Many incidents have shown that the possibility of a hacked wireless network, not just impacts privacy and security worries, but also hinders the diverse dynamics of the ecosystem. Security attacks have grown in frequency and severity throughout the near past, making detection mechanisms harder.

Security Issues in 5G

2021

5G will give broadband access all over the place, engage higher client mobility, and empower connectivity of countless gadgets in a reliable and affordable way. However with every new technology comes certain challenges like security of the end user.5G is a much more vulnerable network and a number of different attacks can be launched on this network like DDoS attack on infrastructure and end-user, man in the middle attack, Hydra attack etc. With this research paper we will address various security issues with 5G and comparison with 4G and provide few solutions. Keywords— 4g, 5g,security, networking, privacy

IJERT-Multi-Access EDGE Computing (MEC): A Mainstay of 5G

International Journal of Engineering Research and Technology (IJERT), 2019

https://www.ijert.org/multi-access-edge-computing-mec-a-mainstay-of-5g https://www.ijert.org/research/multi-access-edge-computing-mec-a-mainstay-of-5g-IJERTCONV7IS12012.pdf The proliferation of Internet of Things (IoT) and the success of rich cloud services have pushed the horizon of a new computing paradigm, edge computing, which calls for processing the data at the edge of the network. Edge computing has the potential to address the concerns of response time requirement, battery life constraint, bandwidth cost saving, as well as data safety and privacy. Multi-access edge computing (MEC) is an emerging ecosystem, which aims at converging telecommunication and IT services, providing a cloud computing platform at the edge of the radio access network. MEC offers storage and computational resources at the edge, reducing latency for mobile end users and utilizing more efficiently the mobile backhaul and core networks. This paper introduces a survey on MEC and focuses on the fundamental key enabling technologies. This paper will review Multi-access edge computing in context to 5G. In addition, this paper analyzes the MEC reference architecture along with its pros and cons.

Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review

IEEE Access

Multi-Access Edge Computing (MEC) is an extension of cloud computing that aims to provide computation, storage, and networking capabilities at the edge of the network in close proximity to end-users. The MEC architecture supports applications and services that bridge between cloud computing and endusers. The architecture includes devices and systems that are interconnected, layered, and flexibly deployed. As a result of the technological advancements, MEC is facing a myriad of highly sophisticated threats. This paper provides a review of MEC Architecture, use cases, conceptual guidelines for MEC security architecture, security and privacy techniques, and identifies current and future challenges, their implications, and approaches to overcome the challenges. This research examined significant threats, described the MEC architecture, identified the susceptible functional layers, the different categories of threats, and the potential security safeguards. The research recommends that MEC providers should implement multiple layers of security controls to mitigate targeted attacks.

Scrutinizing 5G Security Systems for V2X (Iot) Applications

2019

1Aishwarya Kshirsagar – Mtech Information security, VIT Vellore 2Dr.K.Rajakumar, Associate Professor, SCOPE, VIT Vellore, Tamil Nadu, India ------------------------------------------------------------------***-------------------------------------------------------------------Abstract The Internet of Things (IoT), uses a set of technologies permitting sensors, actuators, people, and alternative virtual entities to connect to the web. conjointly denotes a dynamic world network infrastructure with self-configuring capabilities, wherever users, data, processes, and things have identities, physical attributes, abstract personalities, intelligence, and network interfaces. Security could be a primary concern for the networks aiming at the employment of Cellular (C) services for connecting Vehicles to Everything (V2X). At present, C-V2X is perceptive a paradigm shift from long-run Evolution (LTE) – Evolved Universal Terrestrial Radio Access Network (E-UTRAN) to Fifth Generation (5G) primari...