Page 154 - Kaleidoscope Academic Conference Proceedings 2021
P. 154

2021 ITU Kaleidoscope Academic Conference




              pass through.  The  firewall forwards outgoing  traffic   [4]  Hajisami, Abolfazl, Tran, et al. Collaborative
              through the trust zone, with the destination being the IP   Mobile Edge Computing in 5G Networks: New
              address and port number of the server connected to the   Paradigms, Scenarios, and Challenges[J]. IEEE
              5G  CPE.  This  minimizes  the  attack  surface  and   Communications Magazine Articles News &
              implements refined access control. Logs are generated if   Events of Interest to Communications Engineers,
              there are firewall configuration changes, traffic blocking   2017.
              by security policy, and abnormal traffic blocking. They
              are then sent to the security management center for   [5]  3GPP TS 33.501. Security Architecture and
              compliance and audit purposes. The firewall provides a   Procedures for 5G System[S], 3GPP.
              UI with the read-only permission to read configurations,
              query historical packet loss records and perform primary   [6]  5G-ENSURE_D2.7 Security Architecture[R],
              security troubleshooting.                              5GPPP.
           •   Security management and audit: The log audit system
              deployed at the security  management center collects   [7]  ETSI GS MEC-002. MEC Technical
              system security events, user access records, system run   Requirements[S], ETSI.
              logs, system operating status, and other information from
              the border firewall in a centralized manner. First,  it   [8]  3GPP TS 23.222 Functional architecture and
              standardizes,  filters,  and  merges  data,  as  well  as   information flows to support Common API
              analyzing alarms. Then, the system uniformly stores and   Framework for 3GPP Northbound APIs.
              manages the data in the form of logs. This facilitates the
              comprehensive  auditing  of  information  system  logs,   [9]  GTI 5G Network Security Consideration[R], GTI.
              helps administrators troubleshoot faster, and provides
              objective evidence for fault tracking and recovery.   [10] Jia Z, Li D, Zhang W, et al. 5G MEC Gateway
                                                                     System Design and Application in Industrial
             6.  CONCLUSION                                          Communication[C]// 2020 2nd World Symposium
                                                                     on Artificial Intelligence (WSAI). 2020.
           MEC is a new model to extend computing capabilities to the
           edge, with the support of networks. It involves the network,   [11] Huazhang L V, Zhang Z, Fuchang L I. 5G MEC
           edge cloud, and edge applications, which together provide   Edge Cloud Networking Scheme and Business
           services in close proximity to users to reduce latency, save   Case Analysis[J]. Mobile Communications, 2019.
           bandwidth through local computing, ensure security through
           data  isolation,  and  reduce  costs  through  computing   [12] [ITU-T Y.4085], Recommendation ITU-T
           offloading.  5G offers  native  support for  MEC,  which is   Y.4085(2021), Security Guidelines for 5G Edge
           ultimately  an  effective  means  to  improve  E2E  user   Computing Services.
           experience for new services. In future, as MEC continues to
           gain  popularity,  we  shall  ensure  a  secure  5G  MEC   [13] Nadeem L, Azam M A, Amin Y, et al. Integration
           environment.  On  the  one  hand,  we  need  to  collect  and   of D2D, Network Slicing and MEC in 5G Cellular
           analyze  these  threats  of  5G  MEC  and  take  the  security   Networks: Survey and Challenges[J]. IEEE
           protections to deal with them. On the other hand, we will   Access, 2021, PP(99):1-1.
           make greater contributions to 5G MEC applications in each
           area, such as smart city, smart transportation and so on.   [14] 5G empowering vertical industries, EU 5G PPP.

                             REFERENCES                           [15] MEC Security White Paper, Alliance of Industrial
                                                                     Internet, November 2019.
               [1]  Y. Mao, C. You, J. Zhang, K. Huang and K. B.
                  Letaief, "A Survey on Mobile Edge Computing:    [16] Recommendation ITU-T Y.2420 (2019),
                  The Communication Perspective," in IEEE            Security capabilities of network layer for 5G
                  Communications Surveys & Tutorials, vol. 19, no.   edge computing.
                  4, pp. 2322-2358, Fourthquarter 2017, doi:
                  10.1109/COMST.2017.2745201.                     [17] ISO/IEC 21878, Research on Security Guidelines
                                                                     for Design and Implementation of Virtualized
               [2]  Mao Y, You C , Zhang J , et al. Mobile Edge      Servers,2018.
                  Computing: Survey and Research Outlook. 2017.
                                                                  [18] Recommendation ITU-T Y.4046 (2021),
               [3]  Taleb T, Samdanis K, Mada B, et al. On Multi-    Guideline on edge computing data security.
                  Access Edge Computing: A Survey of the
                  Emerging 5G Network Edge Cloud Architecture
                  and Orchestration[J]. IEEE Communications
                  Surveys & Tutorials, 2017, 19(3):1657-1681.





                                                           – 92 –
   149   150   151   152   153   154   155   156   157   158   159