Page 154 - Kaleidoscope Academic Conference Proceedings 2021
P. 154
2021 ITU Kaleidoscope Academic Conference
pass through. The firewall forwards outgoing traffic [4] Hajisami, Abolfazl, Tran, et al. Collaborative
through the trust zone, with the destination being the IP Mobile Edge Computing in 5G Networks: New
address and port number of the server connected to the Paradigms, Scenarios, and Challenges[J]. IEEE
5G CPE. This minimizes the attack surface and Communications Magazine Articles News &
implements refined access control. Logs are generated if Events of Interest to Communications Engineers,
there are firewall configuration changes, traffic blocking 2017.
by security policy, and abnormal traffic blocking. They
are then sent to the security management center for [5] 3GPP TS 33.501. Security Architecture and
compliance and audit purposes. The firewall provides a Procedures for 5G System[S], 3GPP.
UI with the read-only permission to read configurations,
query historical packet loss records and perform primary [6] 5G-ENSURE_D2.7 Security Architecture[R],
security troubleshooting. 5GPPP.
• Security management and audit: The log audit system
deployed at the security management center collects [7] ETSI GS MEC-002. MEC Technical
system security events, user access records, system run Requirements[S], ETSI.
logs, system operating status, and other information from
the border firewall in a centralized manner. First, it [8] 3GPP TS 23.222 Functional architecture and
standardizes, filters, and merges data, as well as information flows to support Common API
analyzing alarms. Then, the system uniformly stores and Framework for 3GPP Northbound APIs.
manages the data in the form of logs. This facilitates the
comprehensive auditing of information system logs, [9] GTI 5G Network Security Consideration[R], GTI.
helps administrators troubleshoot faster, and provides
objective evidence for fault tracking and recovery. [10] Jia Z, Li D, Zhang W, et al. 5G MEC Gateway
System Design and Application in Industrial
6. CONCLUSION Communication[C]// 2020 2nd World Symposium
on Artificial Intelligence (WSAI). 2020.
MEC is a new model to extend computing capabilities to the
edge, with the support of networks. It involves the network, [11] Huazhang L V, Zhang Z, Fuchang L I. 5G MEC
edge cloud, and edge applications, which together provide Edge Cloud Networking Scheme and Business
services in close proximity to users to reduce latency, save Case Analysis[J]. Mobile Communications, 2019.
bandwidth through local computing, ensure security through
data isolation, and reduce costs through computing [12] [ITU-T Y.4085], Recommendation ITU-T
offloading. 5G offers native support for MEC, which is Y.4085(2021), Security Guidelines for 5G Edge
ultimately an effective means to improve E2E user Computing Services.
experience for new services. In future, as MEC continues to
gain popularity, we shall ensure a secure 5G MEC [13] Nadeem L, Azam M A, Amin Y, et al. Integration
environment. On the one hand, we need to collect and of D2D, Network Slicing and MEC in 5G Cellular
analyze these threats of 5G MEC and take the security Networks: Survey and Challenges[J]. IEEE
protections to deal with them. On the other hand, we will Access, 2021, PP(99):1-1.
make greater contributions to 5G MEC applications in each
area, such as smart city, smart transportation and so on. [14] 5G empowering vertical industries, EU 5G PPP.
REFERENCES [15] MEC Security White Paper, Alliance of Industrial
Internet, November 2019.
[1] Y. Mao, C. You, J. Zhang, K. Huang and K. B.
Letaief, "A Survey on Mobile Edge Computing: [16] Recommendation ITU-T Y.2420 (2019),
The Communication Perspective," in IEEE Security capabilities of network layer for 5G
Communications Surveys & Tutorials, vol. 19, no. edge computing.
4, pp. 2322-2358, Fourthquarter 2017, doi:
10.1109/COMST.2017.2745201. [17] ISO/IEC 21878, Research on Security Guidelines
for Design and Implementation of Virtualized
[2] Mao Y, You C , Zhang J , et al. Mobile Edge Servers,2018.
Computing: Survey and Research Outlook. 2017.
[18] Recommendation ITU-T Y.4046 (2021),
[3] Taleb T, Samdanis K, Mada B, et al. On Multi- Guideline on edge computing data security.
Access Edge Computing: A Survey of the
Emerging 5G Network Edge Cloud Architecture
and Orchestration[J]. IEEE Communications
Surveys & Tutorials, 2017, 19(3):1657-1681.
– 92 –