New Security Architecture of Access Control in 5G MEC
Authors:
- Zbigniew Kotulski,
- Wojciech Niewolski,
- Tomasz Nowak,
- Mariusz Sepczuk
Abstract
The currently developed 5G networks using MEC technology (5G MEC) allow for the harmonious cooperation of many areas of the economy (called the vertical industries) within an integrated information network. Providing the necessary security in such a complex configuration of business partners requires the design of consistent and effective security architecture. In this paper, we present a new concept of an access control architecture for the 5G MEC network in line with the 5G network model and MEC architecture proposed by international standardization organizations. We give an overview of the high-level security architecture of 5G MEC networks, which provides security solutions for the network's components and establishes secure access to all cooperating entities. Next, we introduce the MEC Enabler, a new network's module, which manages security credentials required to access resources of MEC-hosted services. We consider a series of several use cases with increasing demands on network data resources and computing power. Finally, we present a sample protocol diagram for gaining access to resources (authentication in a service using MEC technology) in our access control architecture
- Record ID
- WUTad16e3c0ff614a8385f75e6a7e510dfd
- Author
- Pages
- 77-91
- Publication size in sheets
- 0.30
- Article number
- first online
- Book
- Thampi Sabu M., Sabu M. Thampi Wang Guojun, Guojun Wang Rawat Danda B. Danda B. Rawat [et al.] (eds.): Security in Computing and Communications. Proceedings of the 8th International Symposium on Security in Computing and Communications - SSCC'2020, Communications in Computer and Information Science, vol. 1364, 2021, Singapore, Springer, 305 p., ISBN 978-981-16-0422-5. DOI:10.1007/978-981-16-0422-5 Opening in a new tab
- Keywords in English
- 5G mobile networks, MEC, Access control, Security architecture, MEC Enabler
- ASJC Classification
- ;
- DOI
- DOI:10.1007/978-981-16-0422-5_6 Opening in a new tab
- Language
- (en) English
- File
-
- File: 1
- 2020 Kotulski New Security Architecture of Access SSCC20.pdf
-
- Score (nominal)
- 20
- Score source
- publisherList
- Score
- = 20.0, 27-05-2022, ChapterFromConference
- Publication indicators
- = 3; = 3; : 2018 = 0.385
- Citation count
- 4
- Uniform Resource Identifier
- https://repo.pw.edu.pl/info/article/WUTad16e3c0ff614a8385f75e6a7e510dfd/
- URN
urn:pw-repo:WUTad16e3c0ff614a8385f75e6a7e510dfd
* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or PerishOpening in a new tab system.