电信科学 ›› 2022, Vol. 38 ›› Issue (11): 143-152.doi: 10.11959/j.issn.1000-0801.2022265

• 工程与应用 • 上一篇    下一篇

5G MEC系统安全能力部署方案

刘云毅1, 张建敏1, 冯晓丽2, 张丽伟2   

  1. 1 中国电信股份有限公司研究院,北京 102209
    2 中国电信集团有限公司,北京 100033
  • 修回日期:2022-09-23 出版日期:2022-11-20 发布日期:2022-11-01
  • 作者简介:刘云毅(1993- ),男,中国电信股份有限公司研究院中级工程师,主要研究方向为移动通信与边缘计算
    张建敏(1983- ),男,中国电信股份有限公司研究院教授级高级工程师,主要研究方向为移动通信技术与边缘计算等
    冯晓丽(1983- ),女,中国电信集团有限公司高级项目经理、5G MEC产品运营经理,主要研究方向为5G MEC
    张丽伟(1982- ),女,中国电信集团有限公司云网运营部政企智能服务运营中心室主任,主要研究方向为 5G 移动通信、5G定制专网等

5G MEC system security capability deployment scheme

Yunyi LIU1, Jianmin ZHANG1, Xiaoli FENG2, Liwei ZHANG2   

  1. 1 Research Institute of China Telecom Co., Ltd., Beijing 102209, China
    2 China Telecom Group Co., Ltd., Beijing 100033, China
  • Revised:2022-09-23 Online:2022-11-20 Published:2022-11-01

摘要:

多接入边缘计算(multi-access edge computing,MEC)作为5G网络的核心差异能力,是电信运营商为企业客户打造5G专网的关键技术。随着5G MEC节点数量的增多,安全风险和安全防护方案等问题也日益受到关注。首先介绍了5G MEC系统架构,对其潜在安全风险进行了分析。在此基础上,提出了5G MEC系统安全能力部署架构和方案,并介绍部署案例。最后,针对目前边缘计算安全能力部署存在的问题与挑战进行了讨论,为后续研究开发提供了参考。

关键词: 5G, 多接入边缘计算, 安全能力, 部署方案

Abstract:

Multi-access edge computing (MEC), as the core differentiated capability of 5G, is the key technology for telecom operators to build private 5G networks for enterprises.With the increase of 5G MEC nodes, security risks and protection schemes are increasingly concerned.Based on the description of 5G MEC system architecture, the potential security risks were analyzed.On this basis, the security capability deployment architecture and scheme of the 5G MEC system were proposed, and the deployment case was introduced.Finally, the current problems and challenges in the deployment of MEC security capabilities were discussed to provide references for subsequent research and development.

Key words: 5G, MEC, security capability, deployment scheme

中图分类号: 

No Suggested Reading articles found!