网络与信息安全学报 ›› 2021, Vol. 7 ›› Issue (1): 130-142.doi: 10.11959/j.issn.2096-109x.2021014

• 学术论文 • 上一篇    下一篇

移动边缘计算安全防御研究

陈璐, 汤红波, 游伟, 柏溢   

  1. 信息工程大学,河南 郑州 450001
  • 修回日期:2020-10-28 出版日期:2021-02-15 发布日期:2021-02-01
  • 作者简介:陈璐(1989- ),女,河北唐山人,信息工程大学博士生,主要研究方向为移动通信网安全、移动边缘计算技术。
    汤红波(1968- ),男,湖北孝感人,博士,信息工程大学教授、博士生导师,主要研究方向为移动通信网络、新型网络体系结构。
    游伟(1984- ),男,江西丰城人,博士,信息工程大学讲师,主要研究方向为密码学和移动通信网络。
    柏溢(1975- ),男,江苏盐城人,信息工程大学副研究员,主要研究方向为移动通信网络、新型网络体系结构。
  • 基金资助:
    国家自然科学基金(61801515);国家自然科学基金(61941114)

Research on security defense of mobile edge computing

Lu CHEN, Hongbo TANG, Wei YOU, Yi BAI   

  1. Information Engineering University, Zhengzhou 450001, China
  • Revised:2020-10-28 Online:2021-02-15 Published:2021-02-01
  • Supported by:
    The National Natural Science Foundation of China(61801515);The National Natural Science Foundation of China(61941114)

摘要:

移动边缘计算(Mobile Edge Computing,MEC)通过进一步将电信蜂窝网延伸至其他无线接入网络,可以有效地解决传统网络中回程链路负载过重、时延较长的问题。但由于 MEC 服务节点暴露在网络边缘,且计算能力、存储能力和能量受限,更易受到攻击者的青睐。在分析移动边缘计算面临的安全威胁问题基础上,针对设备安全、节点安全、网络资源及任务和迁移安全等4个不同的安全主体归纳并阐述了移动边缘计算面临的若干关键问题与挑战,总结归纳了现有的安全解决方案。最后,从动态场景下的有限资源防御模型、综合信任基础的资源部署、以用户为中心的服务可靠性保证3个方面,展望了移动边缘计算安全防御面临的开放性问题和未来的发展趋势。

关键词: 移动边缘计算, 安全, 威胁, 计算卸载, 计算迁移

Abstract:

Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed.

Key words: mobile edge computing, security, threats, computing offloading, computing migration

中图分类号: 

No Suggested Reading articles found!