Multi-access Edge Computing fundamentals, services, enablers and challenges: A complete survey

B Liang, MA Gregory, S Li - Journal of Network and Computer Applications, 2022 - Elsevier
Traffic over mobile cellular networks has significantly increased over the past decade, and
with the introduction of 5G there is a growing focus on throughput capacity, reliability, and …

Verticals in 5G MEC-use cases and security challenges

TW Nowak, M Sepczuk, Z Kotulski, W Niewolski… - IEEE …, 2021 - ieeexplore.ieee.org
5G is the fifth-generation cellular network satisfying the requirements IMT-2020
(International Mobile Telecommunications-2020) of the International Telecommunication …

Security Context Migration in MEC: Challenges and Use Cases

W Niewolski, TW Nowak, M Sepczuk, Z Kotulski… - Electronics, 2022 - mdpi.com
Modern and future services require ultra-reliable mobile connections with high bandwidth
parameters and proper security protection. It is possible to ensure such conditions by …

A pipeline approach for privacy preservation against poisoning attacks in a Mobile Edge Computing environment

J Kabdjou, EF Tagne, DB Rawat, J Acosta, C Kamhoua - Ad Hoc Networks, 2024 - Elsevier
Abstract Mobile Edge Computing (MEC) has become increasingly popular due to its ability
to provide real-time data processing and improved user experience. However, it also …

[HTML][HTML] Security architecture for authorized anonymous communication in 5G MEC

W Niewolski, TW Nowak, M Sepczuk… - Journal of Network and …, 2023 - Elsevier
The use of services provided in modern mobile networks using edge servers (5G MEC)
requires extended security solutions. One of them is an access control system adapted to the …

Token-based authentication framework for 5G MEC mobile networks

W Niewolski, TW Nowak, M Sepczuk, Z Kotulski - Electronics, 2021 - mdpi.com
MEC technology provides a distributed computing environment in 5G mobile networks for
application and service hosting. It allows customers with different requirements and …

Improving quality of service and HTTPS DDoS detection in MEC environment with a cyber deception-based architecture

J Kabdjou, N Shinomiya - IEEE Access, 2024 - ieeexplore.ieee.org
Creating a cyber deception framework for 5G networks, particularly in IoT and cellular
applications, is complex due to critical constraints in managing resources, meeting low …

Privacy-aware access control (PAAC)-based biometric authentication protocol (Bap) for mobile edge computing environment

G Reshma, BT Prasanna, HSN Murthy, TSN Murthy… - Soft Computing, 2023 - Springer
Since ancient times, privacy is being a greater issue. However, its impact on a subject where
its significance is readily apparent has been relatively limited thus far. In fifth-generation (5G) …

Kee** Verticals' Sovereignty During Application Migration in Continuum

Z Kotulski, T Nowak, M Sepczuk, K Bocianiak… - Journal of Network and …, 2024 - Springer
Competing service providers in the cloud environment ensure services are delivered under
the promised security requirements. It is crucial for mobile services where user's movement …

Low-complexity access control scheme for MEC-based services

M Sepczuk, Z Kotulski, W Niewolski… - 2022 17th Conference …, 2022 - ieeexplore.ieee.org
The standardized security architecture proposed by ETSI for 5G networks provides six
security domains covering network access and secure implementation of network services …