4.6 Article

Verticals in 5G MEC-Use Cases and Security Challenges

Journal

IEEE ACCESS
Volume 9, Issue -, Pages 87251-87298

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3088374

Keywords

5G mobile communication; Security; Industries; Edge computing; Communication system security; Cloud computing; Network function virtualization; 5G mobile communication; communication system security; MEC; mobile computing; network servers; next generation networking; performance parameters; software protection; telecommunication computing; telecommunication services; vertical industries

Funding

  1. European Union [871808]
  2. Warsaw University of Technology

Ask authors/readers for more resources

5G is the fifth-generation cellular network that satisfies IMT-2020 requirements. The application of MEC technology has a significant impact on the functioning of 5G MEC-based services, highlighting the need to focus on protecting vertical industries from network attacks.
5G is the fifth-generation cellular network satisfying the requirements IMT-2020 (International Mobile Telecommunications-2020) of the International Telecommunication Union. Mobile network operators started using it worldwide in 2019. Generally, 5G achieves exceptionally high values of performance parameters of access and transmission. The application of edge servers has been proposed to facilitate implementing such requirements of 5G, resulting in 5G MEC (Multi-access Edge Computing) technology. Moreover, to optimize services for specific business applications, the concept of 5G vertical industries has been proposed. In this article, we study how the application of the MEC technology affects the functioning of 5G MEC-based services. We consider twelve representative vertical industries of 5G MEC by presenting their essential characteristics, threats, vulnerabilities, and known attacks. Furthermore, we analyze their functional properties, give efficiency patterns and identify the effect of applying the MEC technology in 5G on the resultant network's quality parameters to determine the expected security requirements. As a result of the research, we identify the impact of classified threats on the 5G empowered vertical industries and identify the most sensitive cases to focus on their protection against network attacks in the first place.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available