Journal
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Volume 218, Issue -, Pages -Publisher
ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
DOI: 10.1016/j.jnca.2023.103713
Keywords
MEC; 5G mobile network; Security architecture; Token-based authorization; Path-hidden protocols
Ask authors/readers for more resources
This paper presents a new access control architecture for the 5G MEC network, which meets security requirements in a flexible and lightweight way. It introduces the MEC Enabler as the central element for managing access control security policies and generating access credentials. The paper also describes a method to secure data packets in communication process to prevent unauthorized interception of sessions.
The use of services provided in modern mobile networks using edge servers (5G MEC) requires extended security solutions. One of them is an access control system adapted to the different needs and requirements of end users and service providers. Another, equally important, is the protection against the takeover of the service during its lifetime, which leads to the inevitable leakage of information and economic losses. In this paper, we present a new access control architecture for the 5G MEC network, which meets both security requirements in a flexible and lightweight way. First, we specify the architecture scheme and its central element, MEC Enabler, which manages access control security policies and generates access credentials (tokens). Next, we describe the method of securing data packets in the communication process related to the service provided by the MEC server, preventing the session from being intercepted by an unauthorized user. The countermeasure is designed to protect data identifying packets (node addresses, port numbers) and prevent identification of packets' connection with the protected service. Experiments on the operation of the service with the implemented protection mechanism made in a testbed show that the proposed security solution has a negligible effect on the MEC-hosted application delays.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available