ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술대회 Security Threats in 5G Edge Computing Environments
Cited 11 time in scopus Download 3 time Share share facebook twitter linkedin kakaostory
저자
김영수, 박종근, 이종훈
발행일
202010
출처
International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.905-907
DOI
https://dx.doi.org/10.1109/ICTC49870.2020.9289521
협약과제
20HR5600, 5G+ 서비스 안정성 보장을 위한 엣지 시큐리티 기술 개발, 박종근
초록
Multi-access Edge Computing (MEC) technology is a key technology for realizing 5G B2B service, which is a market that domestic and foreign mobile network providers strategically target. Since MEC systems operate as open systems capable of running third-party application programs based on cloud and virtualization technologies, they can be a major target of security threats, and the development of detection and response technologies are required. This paper examines the structure and features of the framework, focusing on ETSI's MEC standards, and presents security threats from several perspectives.
KSP 제안 키워드
Application program, Key technology, Mobile networks, Multi-access, Open system, Third-party application, Virtualization technologies, edge computing, security threats