Security Context Migration in MEC: Challenges and Use Cases

Author:

Niewolski WojciechORCID,Nowak Tomasz W.ORCID,Sepczuk Mariusz,Kotulski Zbigniew,Artych Rafal,Bocianiak Krzysztof,Wary Jean-Philippe

Abstract

Modern and future services require ultra-reliable mobile connections with high bandwidth parameters and proper security protection. It is possible to ensure such conditions by provisioning services in the Multi-Access Edge Computing system integrated with fifth-generation mobile networks. However, the main challenge in the mentioned architecture is providing a secure service migration with all related data and security requirements to another edge computing host area when the user changes its physical location. This article aims to present the state of research on the migration of the security context between service instances in Edge/MEC servers, specify steps of the migration procedure, and identify new security challenges inspired by use cases of 5G vertical industries. For this purpose, the analysis of the security context’s structure and basic concept of the Security Service Level Agreement was performed and presented in the document. Next, a further investigation of the security context was conducted, including requirements for its reliable migration between edge serves instances. The study mainly focused on crucial migration challenges and possible solutions to resolve them. Finally, the authors presented how the proposed solution can be used to protect 5G vertical industries services based on several mobile use cases.

Funder

EU Inspire-5Gplus

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering

Reference86 articles.

1. International Communication Union (2022, September 10). Minimum Requirements Related to Technical Performance for IMT-2020 Radio Interface(s). Report ITU-R M.2410-0. Available online: https://www.itu.int/dms_pub/itu-r/opb/rep/R-REP-M.2410-2017-PDF-E.pdf.

2. Putz, S., and Schmitz, R. (2000, January 27–29). Secure interoperation between 2G and 3G mobile radio networks. Proceedings of the First International Conference on 3G Mobile Communication Technologies, London, UK.

3. Wang, H., and Prasad, A.R. (2003, January 7–10). Security context transfer in vertical handover. Proceedings of the 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, Beijing, China.

4. Kempf, J. (2022, September 10). Problem Description: Reasons for Performing Context Transfers between Nodes in an IP Access Network. Request for Comments 3374. September 2002. Available online: https://datatracker.ietf.org/doc/html/rfc3374.

5. Georgiades, M., Wang, H., and Tafazolli, R. (2004, January 4–5). Security of Context Transfer in Future Wireless Communications. Proceedings of the Wireless World Research Forum (WWRF), Toronto, ON, Canada. Available online: https://www.researchgate.net/publication/239551980_Security_of_Context_Transfer_in_Future_Wireless_Communications.

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3