Multi-access Edge Computing fundamentals, services, enablers and challenges: A complete survey
Traffic over mobile cellular networks has significantly increased over the past decade, and
with the introduction of 5G there is a growing focus on throughput capacity, reliability, and …
with the introduction of 5G there is a growing focus on throughput capacity, reliability, and …
Verticals in 5G MEC-use cases and security challenges
5G is the fifth-generation cellular network satisfying the requirements IMT-2020
(International Mobile Telecommunications-2020) of the International Telecommunication …
(International Mobile Telecommunications-2020) of the International Telecommunication …
Security Context Migration in MEC: Challenges and Use Cases
Modern and future services require ultra-reliable mobile connections with high bandwidth
parameters and proper security protection. It is possible to ensure such conditions by …
parameters and proper security protection. It is possible to ensure such conditions by …
A pipeline approach for privacy preservation against poisoning attacks in a Mobile Edge Computing environment
Abstract Mobile Edge Computing (MEC) has become increasingly popular due to its ability
to provide real-time data processing and improved user experience. However, it also …
to provide real-time data processing and improved user experience. However, it also …
[HTML][HTML] Security architecture for authorized anonymous communication in 5G MEC
The use of services provided in modern mobile networks using edge servers (5G MEC)
requires extended security solutions. One of them is an access control system adapted to the …
requires extended security solutions. One of them is an access control system adapted to the …
Token-based authentication framework for 5G MEC mobile networks
MEC technology provides a distributed computing environment in 5G mobile networks for
application and service hosting. It allows customers with different requirements and …
application and service hosting. It allows customers with different requirements and …
Improving quality of service and HTTPS DDoS detection in MEC environment with a cyber deception-based architecture
J Kabdjou, N Shinomiya - IEEE Access, 2024 - ieeexplore.ieee.org
Creating a cyber deception framework for 5G networks, particularly in IoT and cellular
applications, is complex due to critical constraints in managing resources, meeting low …
applications, is complex due to critical constraints in managing resources, meeting low …
Privacy-aware access control (PAAC)-based biometric authentication protocol (Bap) for mobile edge computing environment
Since ancient times, privacy is being a greater issue. However, its impact on a subject where
its significance is readily apparent has been relatively limited thus far. In fifth-generation (5G) …
its significance is readily apparent has been relatively limited thus far. In fifth-generation (5G) …
Kee** Verticals' Sovereignty During Application Migration in Continuum
Competing service providers in the cloud environment ensure services are delivered under
the promised security requirements. It is crucial for mobile services where user's movement …
the promised security requirements. It is crucial for mobile services where user's movement …
Low-complexity access control scheme for MEC-based services
The standardized security architecture proposed by ETSI for 5G networks provides six
security domains covering network access and secure implementation of network services …
security domains covering network access and secure implementation of network services …