Page 148 - Kaleidoscope Academic Conference Proceedings 2021
P. 148
2021 ITU Kaleidoscope Academic Conference
Table 1 – Table of acronyms and abbreviations
2. RELATED WORK
Acronyms and Full Name
Abbreviations 5G MEC has gained intensive discussions and wide
investigations in recent years [1-4]. In fact, conventional
AMF Access and Mobility management Function security protection solutions do not cover edge scenarios,
AUSF Authentication Server Function while 3GPP and other international standards organizations
API Application Programming Interface are still working on edge computing standards [5-9]. For
AKA Authentication and Key Agreement better understanding the MEC security, there is some
AAA Authentication, Authorization, Accounting research on MEC system deployment, edge cloud, MEC
BBU Building Base band Unit performance and so on. In [10], a 5G MEC gateway system
CGN Carrier Grade Network address translation is proposed to realize local wireless communication in a
CDN Content Delivery Network factory. The work of [11] introduces the implementation of
the basic platform capability streaming technology of edge
C-RAN Centralized Radio Access Network cloud at present, and gives a practical case analysis and
CPE Customer Premises Equipment architecture description of the common application scenarios
CE Customer Equipment of edge cloud, such as security monitoring and industrial
DC Data Center Internet. The study of [12] analyses the potential deployment
DDoS Distributed Denial of Service scheme and typical application scenarios of edge computing
EMS Element Management System services, specifies the security threats and requirements
EAS Edge Application Server specific to the edge computing services in 5G and thus
eMBB enhanced Mobile Broadband provides the security guidelines for the operator to safeguard
E2E End-to-End its applications. The study of [13] proposes to design the
future 5G networks by the integration of all three
FlexE Flex Ethernet technologies. It is believed that spectrum efficiency, energy
GE General Equipment efficiency, and overall throughput will be greatly improved
IoT Internet of Things by using device-to-device which is a technology that allows
LCS Live Communications Server terminals to communicate directly by reusing cell resources
MEC Multiaccess Edge Computing under the control of the system. The study of [14] explains
MEP Multiaccess Edge computing Platform 5G uses MEC to deploy applications to the data instead of
mMTC massive Machine Type Communication sending all data to a centralized data center, thereby ensuring
LAN Local Area Network real-time applications. According to [15], MEC offers
NRF Network Repository Function resource-constrained, distributed, and real-time performance.
Therefore, analyzing MEC threats and proposing MEC
NFV Network Functions Virtualization security protection should consider these factors.
O&M Operation and Maintenance
OTT Over-The-Top 3. 5G MEC SECURITY THREATS
OS Operating Systems
PCF Policy Control Function 5G MEC has an abundant of computing, communication, and
RAN Radio Access Network storage resources. It can therefore provide sensitive data
RHUB Remote radio unit Hub storage, communication applications, and computing
pRRU pico Remote Radio Unit services for many enterprises. However, once the attackers
URLLC Ultra-Reliable Low Latency Communication control the edge nodes and perform lateral or vertical attacks,
it will seriously damage the confidentiality, availability and
UPF User Plane Function integrity of applications, communications, and data. This
UDM Unified Data Management signals new security threats to users and our society. At the
SMF Session Management Function same time, MEC nodes are usually deployed in unattended
SPN Slicing Packet Network equipment rooms with multiple operators and owners
TDM Time Division Multiplexing throughout the security life cycle that also brings further
VM Virtual Machine challenges to physical security protection and security
V2X Vehicle to Everything operation and management.
VNF Virtual Network Function
WAN Wide Area Network 3.1 Threats to network service security
5GC 5G Core network In mobile edge architecture, there are a large number and
3GPP 3rd Generation Partnership Project various types of access devices, along with multiple security
zones [16]. This increases security risks, exposing networks
to DDoS attacks. Since 5G MEC is deployed at the network
edge, it is easier for attackers to access MEC node hardware.
Attackers can access network ports through unauthorized
connections and obtain data transmitted over the network. In
addition, MEC systems are still under the threat of
conventional network attacks.
– 86 –