Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (1): 130-142.doi: 10.11959/j.issn.2096-109x.2021014

Special Issue: 边缘计算

• Papers • Previous Articles     Next Articles

Research on security defense of mobile edge computing

Lu CHEN, Hongbo TANG, Wei YOU, Yi BAI   

  1. Information Engineering University, Zhengzhou 450001, China
  • Revised:2020-10-28 Online:2021-02-15 Published:2021-02-01
  • Supported by:
    The National Natural Science Foundation of China(61801515);The National Natural Science Foundation of China(61941114)

Abstract:

Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed.

Key words: mobile edge computing, security, threats, computing offloading, computing migration

CLC Number: 

No Suggested Reading articles found!