4.6 Article

Security Context Migration in MEC: Challenges and Use Cases

Journal

ELECTRONICS
Volume 11, Issue 21, Pages -

Publisher

MDPI
DOI: 10.3390/electronics11213512

Keywords

5G mobile communication; communication system security; MEC; mobile computing; security context; SLA; security context migration; vertical industries

Funding

  1. European Union [871808]

Ask authors/readers for more resources

This article presents the research status and new security challenges of the migration of the security context between service instances in Edge/MEC servers. It specifies the steps of the migration procedure and provides possible solutions. The authors also demonstrate how the proposed solution can be used to protect 5G vertical industry services based on mobile use cases.
Modern and future services require ultra-reliable mobile connections with high bandwidth parameters and proper security protection. It is possible to ensure such conditions by provisioning services in the Multi-Access Edge Computing system integrated with fifth-generation mobile networks. However, the main challenge in the mentioned architecture is providing a secure service migration with all related data and security requirements to another edge computing host area when the user changes its physical location. This article aims to present the state of research on the migration of the security context between service instances in Edge/MEC servers, specify steps of the migration procedure, and identify new security challenges inspired by use cases of 5G vertical industries. For this purpose, the analysis of the security context's structure and basic concept of the Security Service Level Agreement was performed and presented in the document. Next, a further investigation of the security context was conducted, including requirements for its reliable migration between edge serves instances. The study mainly focused on crucial migration challenges and possible solutions to resolve them. Finally, the authors presented how the proposed solution can be used to protect 5G vertical industries services based on several mobile use cases.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available