Page 147 - Kaleidoscope Academic Conference Proceedings 2021
P. 147
COLLABORATIVE 5G MULTIACCESS COMPUTING SECURITY: THREATS,
PROTECTION REQUIREMENTS AND SCENARIOS
Gang Zhao, Feng Zhang, Le Yu, Hongyang Zhang, Qin Qiu, Sijia Xu
China Mobile, China
ABSTRACT indicates that the 5G public network based on WAN MEC
has the capacity to offer 5G network services to a variety of
5G MEC is a new model for 5G network architecture that vertical industries. The MEC deployment in aggregation
moves cloud computing capabilities and IT service equipment rooms with security control is the mainstream
environments to the edge of mobile communication networks, WAN MEC solution for operators, considering factors such
providing nearby services for users. This establishes a as application interconnection, O&M complexity, and device
carrier-class service environment with high performance, costs. WAN MEC mainly applies to OTT connections on
low latency, and high bandwidth. 5G MEC enables new public networks, group connections on public networks,
applications by moving core network functions to the network URLLC private networks, and private line connections.
edge. However, it also brings new security challenges and
increases security supervision difficulty. This paper proposes
5G MEC security protection policies for operators and 5G
industry customers by drawing on successful industry
practices. The goal of these policies is to help industry
customers implement the three sync requirements
(synchronous planning, synchronous construction, and
synchronous maintenance) on security while developing 5G
MEC applications, as well as guiding the industry to improve
MEC security capabilities.
Figure 2 – WAN MEC scenario
Keywords – 5G, MEC, security
1.2 LAN MEC scenarios
1. INTRODUCTION
For industries that are highly sensitive to security and
5G MEC provides nearby MEC services near to the source privacy protection, MEC can be deployed on campus to
of user service data, meeting the industry's basic ensure data within campus. Typical LAN MEC scenarios
requirements on low latency, high bandwidth, security, and include manufacturing, petrochemicals, education,
privacy protection. MEC is mainly deployed in aggregation healthcare campuses and factories. LAN MEC deployment is
equipment rooms and on campuses due to the latency, cost, suitable for URLLC services. It can also support local traffic
and enterprise data security requirements of different offload of enterprise service data, providing local network
services. This means that there are two typical MEC pipes for campus customers. In addition, enhancing isolation
deployment scenarios: WAN MEC and LAN MEC. and authentication capabilities can prevent unauthorized
access to the enterprise intranet from public networks, helping
build 5G private networks for enterprises.
Figure 1 – MEC deployment scenarios
1.1 WAN MEC scenarios
Figure 3 – LAN MEC scenario
WAN MEC ensures low latency services through two-way
latency below 1 ms over 100 km of transmission. This
978-92-61-33881-7/CFP2168P @ ITU 2021 – 85 – Kaleidoscope