ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Security Threats in 5G Edge Computing Environments
Cited 15 time in scopus Share share facebook twitter linkedin kakaostory
Authors
Youngsoo Kim, Jong Geun Park, Jong-Hoon Lee
Issue Date
2020-10
Citation
International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.905-907
Publisher
IEEE
Language
English
Type
Conference Paper
DOI
https://dx.doi.org/10.1109/ICTC49870.2020.9289521
Abstract
Multi-access Edge Computing (MEC) technology is a key technology for realizing 5G B2B service, which is a market that domestic and foreign mobile network providers strategically target. Since MEC systems operate as open systems capable of running third-party application programs based on cloud and virtualization technologies, they can be a major target of security threats, and the development of detection and response technologies are required. This paper examines the structure and features of the framework, focusing on ETSI's MEC standards, and presents security threats from several perspectives.
KSP Keywords
Application program, Edge Computing, Key technology, Mobile networks, Multi-access, Security threats, Third-party application, Virtualization technologies, open system