Survey on Multi-Access Edge Computing Security and Privacy

The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MEC deployments. In this paper, we analyse the security and privacy of the MEC system. We introduce a thorough investigation of the identification and the analysis of threat vectors in the ETSI standardized MEC architecture. Furthermore, we analyse the vulnerabilities leading to the identified threat vectors and propose potential security solutions to overcome these vulnerabilities. The privacy issues of MEC are also highlighted, and clear objectives for preserving privacy are defined. Finally, we present future directives to enhance the security and privacy of MEC services.

[1]  Donald F. Towsley,et al.  Physical Layer Security in Heterogeneous Cellular Networks , 2016, IEEE Transactions on Communications.

[2]  Ahmed Meddahi,et al.  SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[3]  Yuan Tian,et al.  Privacy Partition: A Privacy-Preserving Framework for Deep Neural Networks in Edge Networks , 2018, 2018 IEEE/ACM Symposium on Edge Computing (SEC).

[4]  Xinyu Yang,et al.  A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.

[5]  Hong Wen,et al.  Impact of Mobility on Physical Layer Security Over Wireless Fading Channels , 2018, IEEE Transactions on Wireless Communications.

[6]  Ilsun You,et al.  Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks , 2017, IEEE Access.

[7]  Zdenek Becvar,et al.  Mobile Edge Computing: A Survey on Architecture and Computation Offloading , 2017, IEEE Communications Surveys & Tutorials.

[8]  Laxmana Rao Battula Network Security Function Virtualization(NSFV) towards Cloud computing with NFV Over Openflow infrastructure: Challenges and novel approaches , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[9]  Kim-Kwang Raymond Choo,et al.  Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? , 2018, IEEE Cloud Computing.

[10]  Yan Zhang,et al.  Mobile Edge Computing: A Survey , 2018, IEEE Internet of Things Journal.

[11]  Salil S. Kanhere,et al.  Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain , 2020, J. Netw. Comput. Appl..

[12]  Chunhua Su,et al.  A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices , 2018, IEEE Access.

[13]  Rui Guo,et al.  Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems , 2018, IEEE Access.

[14]  Victor Chang,et al.  Security modeling and efficient computation offloading for service workflow in mobile edge computing , 2019, Future Gener. Comput. Syst..

[15]  Pawani Porambage,et al.  Performance Analysis of Local 5G Operator Architectures for Industrial Internet , 2020, IEEE Internet of Things Journal.

[16]  Vijay Laxmi,et al.  ETGuard: Detecting D2D Attacks using Wireless Evil Twins , 2019, Comput. Secur..

[17]  Derek Abbott,et al.  Emerging Physical Unclonable Functions With Nanotechnology , 2016, IEEE Access.

[18]  Wenbing Zhao,et al.  SPE: Security and Privacy Enhancement Framework for Mobile Devices , 2017, IEEE Transactions on Dependable and Secure Computing.

[19]  Xianbin Wang,et al.  A Collaborative PHY-Aided Technique for End-to-End IoT Device Authentication , 2018, IEEE Access.

[20]  Eneko Atxutegi,et al.  Exploitation of Mobile Edge Computing in 5G Distributed Mission-Critical Push-to-Talk Service Deployment , 2018, IEEE Access.

[21]  A. Adam Ding,et al.  SCADET: A Side-Channel Attack Detection Tool for Tracking Prime-Probe , 2018, 2018 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[22]  Anca Delia Jurcut,et al.  Realizing Multi-Access Edge Computing Feasibility: Security Perspective , 2019, 2019 IEEE Conference on Standards for Communications and Networking (CSCN).

[23]  Ping Zhang,et al.  Energy Efficient Secure Computation Offloading in NOMA-Based mMTC Networks for IoT , 2019, IEEE Internet of Things Journal.

[24]  Xiaoming Fu,et al.  A Survey on Virtual Machine Migration: Challenges, Techniques, and Open Issues , 2018, IEEE Communications Surveys & Tutorials.

[25]  Sridhar Radhakrishnan,et al.  Towards SDN-based fog computing: MQTT broker virtualization for effective and reliable delivery , 2016, 2016 8th International Conference on Communication Systems and Networks (COMSNETS).

[26]  Long Chen,et al.  A Defense Method against Docker Escape Attack , 2017, ICCSP '17.

[27]  Hongke Zhang,et al.  Smart Collaborative Caching for Information-Centric IoT in Fog Computing , 2017, Sensors.

[28]  Wolfgang Kellerer,et al.  An SDN/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforcement , 2017, IEEE Communications Magazine.

[29]  Guy Pujolle,et al.  Cloudlet- and NFV-based carrier Wi-Fi architecture for a wider range of services , 2016, Ann. des Télécommunications.

[30]  Robail Yasrab,et al.  Mitigating Docker Security Issues , 2018, ArXiv.

[31]  Marja Matinmikko-Blue,et al.  Micro-Operator driven Local 5G Network Architecture for Industrial Internet , 2018, 2019 IEEE Wireless Communications and Networking Conference (WCNC).

[32]  Vishal Sharma,et al.  Security of 5G-Mobile Backhaul Networks: A Survey , 2018, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[33]  Shunliang Zhang,et al.  An Overview of Network Slicing for 5G , 2019, IEEE Wireless Communications.

[34]  Andrei V. Gurtov,et al.  Improving the tunnel management performance of secure VPLS architectures with SDN , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[35]  Rose Qingyang Hu,et al.  Security for 5G Mobile Wireless Networks , 2018, IEEE Access.

[36]  Ashraf Matrawy,et al.  Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).

[37]  Roch H. Glitho,et al.  A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges , 2017, IEEE Communications Surveys & Tutorials.

[38]  Lei Shu,et al.  Survey of Fog Computing: Fundamental, Network Applications, and Research Challenges , 2018, IEEE Communications Surveys & Tutorials.

[39]  Masahiro Yoshida,et al.  Multi-access Edge Computing: A Survey , 2018, J. Inf. Process..

[40]  Rajiv Ranjan,et al.  Osmotic Computing: A New Paradigm for Edge/Cloud Integration , 2016, IEEE Cloud Computing.

[41]  Ruhul Amin,et al.  Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment , 2018, Future Gener. Comput. Syst..

[42]  Hai Jiang,et al.  Managing Physical Layer Security in Wireless Cellular Networks: A Cyber Insurance Approach , 2018, IEEE Journal on Selected Areas in Communications.

[43]  Ann Cavoukian,et al.  Privacy by Design [Leading Edge] , 2012, IEEE Technol. Soc. Mag..

[44]  Xiaoyan Wang,et al.  Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things , 2018, IEEE Communications Magazine.

[45]  Jin Cao,et al.  Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks , 2019, IEEE Access.

[46]  Jason P. Jue,et al.  All One Needs to Know about Fog Computing and Related Edge Computing Paradigms , 2019 .

[47]  Dusit Niyato,et al.  Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks , 2018, IEEE Transactions on Parallel and Distributed Systems.

[48]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[49]  Xiaodong Lin,et al.  Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT , 2018, IEEE Journal on Selected Areas in Communications.

[50]  D. JaidharC.,et al.  Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor , 2017, Digit. Investig..

[51]  Sunghyun Choi,et al.  3GPP SA2 architecture and functions for 5G mobile communication system , 2017, ICT Express.

[52]  Madhusanka Liyanage,et al.  Novel MEC Based Approaches for Smart Hospitals to Combat COVID-19 Pandemic , 2020, IEEE Consumer Electronics Magazine.

[53]  Jin Cao,et al.  Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).

[54]  Stuart S. Shapiro,et al.  Privacy by design , 2010, Commun. ACM.

[55]  Nezer Zaidenberg,et al.  Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot , 2019, ICISSP.

[56]  Andrei V. Gurtov,et al.  Software defined VPLS architectures: Opportunities and challenges , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[57]  Lilian Bossuet,et al.  Implementation and Characterization of a Physical Unclonable Function for IoT: A Case Study With the TERO-PUF , 2018, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[58]  Ioannis Sfyrakis,et al.  A Survey on Hardware Approaches for Remote Attestation in Network Infrastructures , 2020, ArXiv.

[59]  David Hutchison,et al.  Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends , 2017, IEEE Communications Surveys & Tutorials.

[60]  Huaglory Tianfield,et al.  Virtual Machine Introspection , 2014, SIN.

[61]  Eddie Li,et al.  An Overview of Cloud Based Content Delivery Networks: Research Dimensions and State-of-the-Art , 2015, Trans. Large Scale Data Knowl. Centered Syst..

[62]  Tarik Taleb,et al.  Virtual security as a service for 5G verticals , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[63]  Rabih Bashroush,et al.  Towards a More Representative Definition of Cyber Security , 2017, J. Digit. Forensics Secur. Law.

[64]  M. Shamim Hossain,et al.  Towards a Secure Mobile Edge Computing Framework for Hajj , 2017, IEEE Access.

[65]  Bernd Jäger,et al.  Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference Architecture , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[66]  Seungjoon Lee,et al.  Network function virtualization: Challenges and opportunities for innovations , 2015, IEEE Communications Magazine.

[67]  Deven Shah,et al.  Understanding Perception of Cache-Based Side-Channel Attack on Cloud Environment , 2018 .

[68]  David Hausheer,et al.  A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts , 2017, AIMS.

[69]  Dijiang Huang,et al.  Mobile Cloud Computing: Foundations and Service Models , 2017 .

[70]  Martin Knahl,et al.  Software Defined Privacy , 2016, 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW).

[71]  Thar Baker,et al.  AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes , 2020, Journal of Ambient Intelligence and Humanized Computing.

[72]  Mika Ylianttila,et al.  Survey on blockchain based smart contracts: Applications, opportunities and challenges , 2021, J. Netw. Comput. Appl..

[73]  Yong Zhao,et al.  Communication-Constrained Mobile Edge Computing Systems for Wireless Virtual Reality: Scheduling and Tradeoff , 2018, IEEE Access.

[74]  Rajkumar Buyya,et al.  Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.

[75]  Zhiyuan Hu,et al.  A framework for security on demand , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[76]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[77]  Nhien-An Le-Khac,et al.  Security Considerations for Internet of Things: A Survey , 2020, SN Computer Science.

[78]  Pawani Porambage,et al.  Securing Gadget-Free Digital Services , 2018, Computer.

[79]  Liang Xiao,et al.  IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security? , 2018, IEEE Signal Processing Magazine.

[80]  Ubaidullah Alias Kashif,et al.  Architectural Design of Trusted Platform for IaaS Cloud Computing , 2018, Int. J. Cloud Appl. Comput..

[81]  Mounir Hamdi,et al.  A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things , 2020, IEEE Internet of Things Journal.

[82]  Yonggang Fang,et al.  MEC in an Enterprise Setting : A Solution Outline , 2018 .

[83]  Mahabub Hasan Mahalat,et al.  A PUF based Light Weight Protocol for Secure WiFi Authentication of IoT devices , 2018, 2018 8th International Symposium on Embedded Computing and System Design (ISED).

[84]  Yong-Sung Jeon,et al.  Design of an LPWAN communication module based on secure element for smart parking application , 2018, 2018 IEEE International Conference on Consumer Electronics (ICCE).

[85]  Richeng Jin,et al.  Deep PDS-Learning for Privacy-Aware Offloading in MEC-Enabled IoT , 2019, IEEE Internet of Things Journal.

[86]  June-Koo Kevin Rhee,et al.  Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system , 2016, Quantum Inf. Process..

[87]  Jiabin Wang,et al.  A Survey on Mobile Edge Computing: Focusing on Service Adoption and Provision , 2018, Wirel. Commun. Mob. Comput..

[88]  Guy Gogniat,et al.  Run-time Detection of Prime + Probe Side-Channel Attack on AES Encryption Algorithm , 2018, 2018 Global Information Infrastructure and Networking Symposium (GIIS).

[89]  Ahmed Meddahi,et al.  A First Step Towards Security Extension for NFV Orchestrator , 2017, SDN-NFV@CODASPY.

[90]  Yong-Yuan Deng,et al.  A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing , 2020, Wirel. Pers. Commun..

[91]  Jie Xu,et al.  Exploiting Physical-Layer Security for Multiuser Multicarrier Computation Offloading , 2018, IEEE Wireless Communications Letters.

[92]  Zheng Yan,et al.  Adaptive security-related data collection with context awareness , 2019, J. Netw. Comput. Appl..

[93]  Tarik Taleb,et al.  Traffic Steering for Service Function Chaining , 2019, IEEE Communications Surveys & Tutorials.

[94]  Timothy W. Finin,et al.  Preserving User Privacy and Security in Context-Aware Mobile Platforms , 2016 .

[95]  Emre Gündüzhan,et al.  Narrowband Satellite Communications : Challenges and Emerging Solutions , 2015 .

[96]  Jong-Hyouk Lee Secure authentication with dynamic tunneling in distributed IP mobility management , 2016, IEEE Wireless Communications.

[97]  Dario Sabella,et al.  Mobile-Edge Computing Architecture: The role of MEC in the Internet of Things , 2016, IEEE Consumer Electronics Magazine.

[98]  Yong Ren,et al.  Energy-Efficient Computation Offloading for Secure UAV-Edge-Computing Systems , 2019, IEEE Transactions on Vehicular Technology.

[99]  Zhiwei Zhao,et al.  Towards Fast and Reliable WiFi Authentication by Utilizing Visible Light Diversity , 2019, 2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[100]  Thanh Bui,et al.  Analysis of Docker Security , 2015, ArXiv.

[101]  Westley Weimer,et al.  Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage , 2017, RAID.

[102]  Yin Chen,et al.  On-Device Mobile Phone Security Exploits Machine Learning , 2017, IEEE Pervasive Computing.

[103]  Hai Jin,et al.  CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection , 2017, IEEE Access.

[104]  Andrei Gurtov,et al.  Leveraging LTE security with SDN and NFV , 2015, 2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS).

[105]  Cataldo Basile,et al.  A novel approach for integrating security policy enforcement with dynamic network virtualization , 2015, Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft).

[106]  An Braeken,et al.  Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks , 2019, IEEE Access.

[107]  Ning Zhang,et al.  A Survey on Service Migration in Mobile Edge Computing , 2018, IEEE Access.

[108]  Gang Feng,et al.  On Robustness of Network Slicing for Next-Generation Mobile Networks , 2019, IEEE Transactions on Communications.

[109]  Andres Garcia-Saavedra,et al.  5G-Crosshaul: An SDN/NFV Integrated Fronthaul/Backhaul Transport Network Architecture , 2017, IEEE Wireless Communications.

[110]  Kin K. Leung,et al.  Live Service Migration in Mobile Edge Clouds , 2017, IEEE Wireless Communications.

[111]  Mugen Peng,et al.  Network Slicing in Fog Radio Access Networks: Issues and Challenges , 2017, IEEE Communications Magazine.

[112]  Mubashir Husain Rehmani,et al.  Mobile Edge Computing: Opportunities, solutions, and challenges , 2017, Future Gener. Comput. Syst..

[113]  Andreas Kunz,et al.  Overview of 5G security in 3GPP , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[114]  Mimoza Durresi,et al.  Mobile Privacy Protection Enhanced with Multi-access Edge Computing , 2018, 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA).

[115]  Talal Alharbi,et al.  Virtualized Network Functions security attacks and vulnerabilities , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[116]  Samee Ullah Khan,et al.  Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .

[117]  Mugen Peng,et al.  Edge computing technologies for Internet of Things: a primer , 2017, Digit. Commun. Networks.

[118]  Madhusanka Liyanage,et al.  Dynamic Orchestration of Security Services at Fog Nodes for 5G IoT , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).

[119]  Taufik Abrao,et al.  A Game Theoretical Based System Using Holt-Winters and Genetic Algorithm With Fuzzy Logic for DoS/DDoS Mitigation on SDN Networks , 2017, IEEE Access.

[120]  Yuqiong Sun,et al.  Security-as-a-Service for Microservices-Based Cloud Applications , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).

[121]  Lei Zhao,et al.  Optimal Placement of Cloudlets for Access Delay Minimization in SDN-Based Internet of Things Networks , 2018, IEEE Internet of Things Journal.

[122]  L. Javier García-Villalba,et al.  Adaptive artificial immune networks for mitigating DoS flooding attacks , 2018, Swarm Evol. Comput..

[123]  Cong Shen,et al.  Designing Security-Aware Incentives for Computation Offloading via Device-to-Device Communication , 2016, IEEE Transactions on Wireless Communications.

[124]  Ioannis G. Askoxylakis,et al.  A Reactive Security Framework for operational wind parks using Service Function Chaining , 2017, 2017 IEEE Symposium on Computers and Communications (ISCC).

[125]  Pasquale Pace,et al.  Securing the IoT world: Issues and perspectives , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[126]  Patrick Bours,et al.  Studying WiFi and Accelerometer Data Based Authentication Method on Mobile Phones , 2018, ICBEA '18.

[127]  Anca Delia Jurcut,et al.  Introduction to IoT Security , 2020 .

[128]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[129]  Dushantha Nalin K. Jayakody,et al.  A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions , 2020, IEEE Communications Surveys & Tutorials.

[130]  Andrei V. Gurtov,et al.  Fast Transmission Mechanism for Secure VPLS Architectures , 2017, 2017 IEEE International Conference on Computer and Information Technology (CIT).

[131]  Tarik Taleb,et al.  Survey on Multi-Access Edge Computing for Internet of Things Realization , 2018, IEEE Communications Surveys & Tutorials.

[132]  Gavin Brown,et al.  Deep learning-based classification and anomaly detection of side-channel signals , 2018, Defense + Security.

[133]  Ting He,et al.  Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach , 2017, IEEE Journal on Selected Areas in Communications.

[134]  Antonio F. Gómez-Skarmeta,et al.  Towards provisioning of SDN/NFV-based security enablers for integrated protection of IoT systems , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).

[135]  Weizhe Zhang,et al.  Resource allocation and computation offloading with data security for mobile edge computing , 2019, Future Gener. Comput. Syst..

[136]  Tarik Taleb,et al.  On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration , 2017, IEEE Communications Surveys & Tutorials.

[137]  Yacine Challal,et al.  Security in device-to-device communications: a survey , 2018, IET Networks.

[138]  Dario Pompili,et al.  Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges , 2016, IEEE Communications Magazine.

[139]  Ruby B. Lee,et al.  CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds , 2016, RAID.

[140]  Manuel Díaz,et al.  On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[141]  Pawani Porambage,et al.  Convergence of ICN and MEC for 5G: Opportunities and Challenges , 2020, IEEE Communications Standards Magazine.

[142]  Ching-Hsien Hsu,et al.  Edge server placement in mobile edge computing , 2019, J. Parallel Distributed Comput..

[143]  Keke Gai,et al.  Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks , 2019, IEEE Internet of Things Journal.

[144]  Tarik Taleb,et al.  NFV: Security Threats and Best Practices , 2017, IEEE Communications Magazine.

[145]  Xianbin Wang,et al.  Integrating PHY Security Into NDN-IoT Networks By Exploiting MEC: Authentication Efficiency, Robustness, and Accuracy Enhancement , 2019, IEEE Transactions on Signal and Information Processing over Networks.

[146]  An Braeken,et al.  BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks , 2020, IEEE Access.

[147]  Wei Li,et al.  On the Secrecy Capacity of 5G MmWave Small Cell Networks , 2018, IEEE Wireless Communications.

[148]  Jeff Reeve,et al.  The Security Trade-Offs in Resource Constrained Nodes for IoT Application , 2018 .

[149]  Atay Ozgovde,et al.  Enabling service-centric networks for cloudlets using SDN , 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).

[150]  Rossouw von Solms,et al.  From information security to cyber security , 2013, Comput. Secur..

[151]  Jose Ordonez-Lucena,et al.  Network Slicing for 5G with SDN/NFV: Concepts, Architectures, and Challenges , 2017, IEEE Communications Magazine.

[152]  David Hutchison,et al.  The Extended Cloud: Review and Analysis of Mobile Edge Computing and Fog From a Security and Resilience Perspective , 2017, IEEE Journal on Selected Areas in Communications.

[153]  Degang Sun,et al.  SPLM: Security Protection of Live Virtual Machine Migration in Cloud Computing , 2016, SCC@AsiaCCS.

[154]  Zheng Qin,et al.  T2FA: Transparent Two-Factor Authentication , 2018, IEEE Access.

[155]  Huaiyu Dai,et al.  A Survey on Low Latency Towards 5G: RAN, Core Network and Caching Solutions , 2017, IEEE Communications Surveys & Tutorials.

[156]  Wei Cao,et al.  Intelligent Offloading in Multi-Access Edge Computing: A State-of-the-Art Review and Framework , 2019, IEEE Communications Magazine.

[157]  Changcheng Huang,et al.  Availability-Aware Mobile Edge Application Placement in 5G Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[158]  Narendra S. Chaudhari,et al.  Security Vulnerabilities in Handover Authentication Mechanism of 5G Network , 2018, 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC).

[159]  Kim-Kwang Raymond Choo,et al.  A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing , 2020, IEEE Systems Journal.

[160]  Andrei V. Gurtov,et al.  Opportunities and Challenges of Software-Defined Mobile Networks in Network Security , 2016, IEEE Security & Privacy.

[161]  Richeng Jin,et al.  Privacy-Aware Offloading in Mobile-Edge Computing , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[162]  Athanasios V. Vasilakos,et al.  A security and trust framework for virtualized networks and software-defined networking , 2016, Secur. Commun. Networks.

[163]  Xiong Li,et al.  Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications , 2019, IEEE Internet of Things Journal.

[164]  Tarik Taleb,et al.  Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[165]  Rafal Wojtczuk Poacher turned gamekeeper: Lessons learned from eight years of breaking hypervisors , 2014 .

[166]  Hsiao-Hwa Chen,et al.  Machine-to-Machine Communications in Ultra-Dense Networks—A Survey , 2017, IEEE Communications Surveys & Tutorials.

[167]  Zhaowen Lin,et al.  Dynamic Virtualization Security Service Construction Strategy for Software Defined Networks , 2016, 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN).

[168]  Tanesh Kumar,et al.  5G Privacy: Scenarios and Solutions , 2018, 2018 IEEE 5G World Forum (5GWF).

[169]  Pawani Porambage,et al.  Five Driving Forces of Multi-Access Edge Computing , 2018, ArXiv.

[170]  Madhusanka Liyanage,et al.  Security as a Service Platform Leveraging Multi-Access Edge Computing Infrastructure Provisions , 2020, ICC 2020 - 2020 IEEE International Conference on Communications (ICC).

[171]  Frank van Lingen,et al.  The Unavoidable Convergence of NFV, 5G, and Fog: A Model-Driven Approach to Bridge Cloud and Edge , 2017, IEEE Communications Magazine.

[172]  Xing Zhang,et al.  A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications , 2017, IEEE Access.

[173]  Ada Gavrilovska,et al.  Towards IoT-DDoS Prevention Using Edge Computing , 2018, HotEdge.

[174]  Himanshu Gupta,et al.  Impact of Side Channel Attack in Information Security , 2019, 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE).

[175]  Tal Garfinkel,et al.  A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.

[176]  Asit Chakraborti,et al.  5G-ICN: Delivering ICN Services over 5G Using Network Slicing , 2016, IEEE Communications Magazine.

[177]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[178]  Wei Quan,et al.  Fuzzy Theory Based Security Service Chaining for Sustainable Mobile-Edge Computing , 2017, Mob. Inf. Syst..