MEC-enabled 5G Use Cases: A Survey on Security Vulnerabilities and Countermeasures

Pasika Ranaweera,Anca Jurcut,Madhusanka Liyanage
DOI: https://doi.org/10.1145/3474552
IF: 16.6
2021-01-01
ACM Computing Surveys
Abstract:The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of automated driving, augmented-reality, and machine-type-communication are quite sophisticated and require an elevation of the current mobile infrastructure for launching. The fifth-generation (5G) mobile technology serves as the solution, though it lacks a proximate networking infrastructure to satisfy the service guarantees. Multi-access Edge Computing (MEC) envisages such an edge computing platform. In this survey, we are revealing security vulnerabilities of key 5G-based use cases deployed in the MEC context. Probable security flows of each case are specified, while countermeasures are proposed for mitigating them.
What problem does this paper attempt to address?