Security Context Migration in MEC: Challenges and Use Cases

W Niewolski, TW Nowak, M Sepczuk, Z Kotulski… - Electronics, 2022 - mdpi.com
Modern and future services require ultra-reliable mobile connections with high bandwidth
parameters and proper security protection. It is possible to ensure such conditions by …

Experimental comparison of migration strategies for MEC-assisted 5G-V2X applications

MA Hathibelagal, RG Garroppo, G Nencioni - Computer Communications, 2023 - Elsevier
The introduction of 5G technology enables new V2X services requiring reliable and
extremely low latency communications. To satisfy these requirements computing elements …

Overview of architectural alternatives for the integration of ETSI MEC environments from different administrative domains

LM Contreras, CJ Bernardos - Electronics, 2020 - mdpi.com
Multi-access Edge Computing (MEC) is proposed as a standard framework for the provision
and consumption of applications and services in proximity to the end-users of network …

Verticals in 5G MEC-use cases and security challenges

TW Nowak, M Sepczuk, Z Kotulski, W Niewolski… - IEEE …, 2021 - ieeexplore.ieee.org
5G is the fifth-generation cellular network satisfying the requirements IMT-2020
(International Mobile Telecommunications-2020) of the International Telecommunication …

Toward enabled industrial verticals in 5G: A survey on MEC-based approaches to provisioning and flexibility

F Spinelli, V Mancuso - IEEE Communications Surveys & …, 2020 - ieeexplore.ieee.org
The increasing number of heterogeneous devices connected to the Internet, together with
tight 5G requirements have generated new challenges for designing network infrastructures …

Security constraints for placement of latency sensitive 5G MEC applications

R Artych, K Bocianiak, Y Carlinet… - … on Future Internet of …, 2022 - ieeexplore.ieee.org
Multi-access Edge Computing (MEC) is one of the key enablers in 5G, offering to external
parties computing capabilities very close to the end users. To attain this objective, the 5G …

Multi-access edge computing analysis of risks and security measures

A GLAVAN, D GHEORGHICA… - Revue roumaine des …, 2023 - journal.iem.pub.ro
5G efficiently uses technologies like network slicing (NS), network function virtualization
(NFV), software-defined network (SDN), and multi-access edge computing (MEC). At the …

Framework for trustful handover of M2M devices between security domains

AA Corici, M Corici, E Troudt, B Riemer… - … 23rd Conference on …, 2020 - ieeexplore.ieee.org
The Internet of Things technology and services are becoming ubiquitous in multiple
application domains like Smart Factory and Telecare. Some of the key requirements are …

Offloading personal security applications to the network edge: A mobile user case scenario

D Montero, R Serral-Gracia - 2016 International Wireless …, 2016 - ieeexplore.ieee.org
This paper discusses some challenges that user mobility imposes over the user-centric
protection model against security threats. This model is based on the idea of offloading the …

MEC-enabled 5G use cases: a survey on security vulnerabilities and countermeasures

P Ranaweera, A Jurcut, M Liyanage - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The future of mobile and internet technologies are manifesting advancements beyond the
existing scope of science. The concepts of automated driving, augmented-reality, and …