Page 148 - Kaleidoscope Academic Conference Proceedings 2021
P. 148

2021 ITU Kaleidoscope Academic Conference



              Table 1 – Table of acronyms and abbreviations
                                                                         2.  RELATED WORK
            Acronyms and              Full Name
            Abbreviations                                     5G  MEC  has  gained  intensive  discussions  and  wide
                                                              investigations in recent  years [1-4]. In fact, conventional
            AMF           Access and Mobility management Function   security protection solutions  do not cover edge scenarios,
            AUSF          Authentication Server Function      while 3GPP and other international standards organizations
            API           Application Programming Interface   are still  working on edge computing standards [5-9]. For
            AKA           Authentication and Key Agreement    better  understanding  the  MEC  security,  there  is  some
            AAA           Authentication, Authorization, Accounting   research  on  MEC system deployment, edge cloud, MEC
            BBU           Building Base band Unit             performance and so on. In [10], a 5G MEC gateway system
            CGN           Carrier Grade Network address translation   is proposed to realize local  wireless communication  in a
            CDN           Content Delivery Network            factory. The work of [11] introduces the implementation of
                                                              the basic platform capability streaming technology of edge
            C-RAN         Centralized Radio Access Network    cloud at present, and  gives  a practical case analysis and
            CPE           Customer Premises Equipment         architecture description of the common application scenarios
            CE            Customer Equipment                  of edge cloud, such as security  monitoring and industrial
            DC            Data Center                         Internet. The study of [12] analyses the  potential deployment
            DDoS          Distributed Denial of Service       scheme and typical application scenarios of edge computing
            EMS           Element Management System           services,  specifies  the  security  threats  and  requirements
            EAS           Edge Application Server             specific to the edge computing services in 5G  and thus
            eMBB          enhanced Mobile Broadband           provides the security guidelines for the operator to safeguard
            E2E           End-to-End                          its applications.  The  study of [13]  proposes to  design the
                                                              future 5G networks by the integration of all three
            FlexE         Flex Ethernet                       technologies. It is believed that spectrum efficiency, energy
            GE            General Equipment                   efficiency, and overall throughput will be greatly improved
            IoT           Internet of Things                  by using device-to-device which is a technology that allows
            LCS           Live Communications Server          terminals to communicate directly by reusing cell resources
            MEC           Multiaccess Edge Computing          under the control of the system. The study of [14] explains
            MEP           Multiaccess Edge computing Platform   5G uses MEC to deploy applications to the data instead of
            mMTC          massive Machine Type Communication   sending all data to a centralized data center, thereby ensuring
            LAN           Local Area Network                  real-time applications.  According to [15], MEC offers
            NRF           Network Repository Function         resource-constrained, distributed, and real-time performance.
                                                              Therefore,  analyzing  MEC  threats  and  proposing  MEC
            NFV           Network Functions Virtualization    security protection should consider these factors.
            O&M           Operation and Maintenance
            OTT           Over-The-Top                                 3.  5G MEC SECURITY THREATS
            OS            Operating Systems
            PCF           Policy Control Function             5G MEC has an abundant of computing, communication, and
            RAN           Radio Access Network                storage  resources.  It  can  therefore  provide  sensitive  data
            RHUB          Remote radio unit Hub               storage,  communication  applications,  and  computing
            pRRU          pico Remote Radio Unit              services for many enterprises. However, once the attackers
            URLLC         Ultra-Reliable Low Latency Communication   control the edge nodes and perform lateral or vertical attacks,
                                                              it will seriously damage the confidentiality, availability and
            UPF           User Plane Function                 integrity of applications, communications, and data. This
            UDM           Unified Data Management             signals new security threats to users and our society. At the
            SMF           Session Management Function         same time, MEC nodes are usually deployed in unattended
            SPN           Slicing Packet Network              equipment  rooms  with  multiple  operators  and  owners
            TDM           Time Division Multiplexing          throughout the  security life  cycle  that also  brings  further
            VM            Virtual Machine                     challenges  to  physical  security  protection  and  security
            V2X           Vehicle to Everything               operation and management.
            VNF           Virtual Network Function
            WAN           Wide Area Network                   3.1   Threats to network service security
            5GC           5G Core network                     In  mobile edge architecture, there are a large number and
            3GPP          3rd Generation Partnership Project   various types of access devices, along with multiple security
                                                              zones [16]. This increases security risks, exposing networks
                                                              to DDoS attacks. Since 5G MEC is deployed at the network
                                                              edge, it is easier for attackers to access MEC node hardware.
                                                              Attackers can access  network ports through  unauthorized
                                                              connections and obtain data transmitted over the network. In
                                                              addition,  MEC  systems  are  still  under  the  threat  of
                                                              conventional network attacks.

                                                           – 86 –
   143   144   145   146   147   148   149   150   151   152   153