Pub. Date | : Aprill, 2022 |
---|---|
Product Name | : The IUP Journal of Computer Sciences |
Product Type | : Article |
Product Code | : IJCS010422 |
Author Name | : Malik Zaib Alam, Sarfaraz Ahmed, Haneef Khan, Md Imran Alam, Mohammad Rafeek Khan and Shams Tabrez Siddiqui |
Availability | : YES |
Subject/Domain | : Management |
Download Format | : PDF Format |
No. of Pages | : 09 |
Mobile Edge Computing (MEC) is a novel technology that provides fast data processing with efficiency on 5G networks. It can be propitious in Internet of Things (IoT)-based contexts, as it renders a cloud-computing and IT services environment. Moreover, MEC has no terminal servers, as it is often deployed near the network's edge. However, the unique features and working principles of MEC will lead to a number of new security and privacy-related concerns. In this paper, the security issues are discussed along with their multiple solutions. Finally, suggestions to strengthen the security of MEC services are offered.
Mobile Edge Computing (MEC) was presented in 2013 when Nokia Siemens and IBM collaborated to establish an MEC platform on which applications could be executed directly. Later, the European Telecommunications Standards Institute (ETSI) and the Industry Specification Group (ISG) standardized MEC (ISG). As previously stated, the European 5G Infrastructure Public Private Partnership (PPP) considers MEC to be a leading emerging technology (Abbas et al., 2017). The use of sensors and a large number of IoT devices such as gadgets has grown rapidly in recent years. According to an Ericsson's study, it is anticipated that 32 billion devices would be linked to the mobile network by 2030, representing a doubling of the current number. The ETSI
Mobile Edge Computing (MEC), Security, Cloud computing, Cellular network, Internet of Things (IoT)
Click here to upload your Articles |
Journals
Magazines