[1] |
刘云毅, 张建敏, 杨峰义 . 基于MEC的移动网络CDN增强及部署场景建议[J]. 电信科学, 2019,35(S2): 36-43.
|
|
LIU Y Y , ZHANG J M , YANG F Y . MEC-based mobile network CDN enhancement and deployment scenario recommendations[J]. Telecommunications Science, 2019,35(S2): 36-43.
|
[2] |
张建敏, 杨峰义, 武洲云 ,等. 多接入边缘计算(MEC)及关键技术[M]. 北京: 人民邮电出版社, 2019.
|
|
ZHANG J M , YANG F Y , WU Z Y ,et al. Multi-access edge computing (MEC) and key technologies[M]. Beijing: Posts and Telecom Press, 2019.
|
[3] |
ETSI white paper No.46. MEC security:status of standards support and future evolutions[R]. 2021.
|
[4] |
ALI B , GREGORY M A , LI S . Multi-access edge computing architecture,data security and privacy:a review[J]. IEEE Access, 2021(9): 18706-18721.
|
[5] |
RANAWEERA P , JURCUT A , LIYANAGE M . MEC-enabled 5G use cases:a survey on security vulnerabilities and countermeasures[J]. ACM Computing Surveys, 2022,54(9): 1-37.
|
[6] |
杨红梅, 王亚楠 . 5G 边缘计算安全关键问题及标准研究[J]. 信息安全研究, 2021,7(5): 390-395.
|
|
YANG H M , WANG Y N . Study on security key issues and standards of 5G MEC[J]. Journal of Information Security Research, 2021,7(5): 390-395.
|
[7] |
工业互联网产业联盟. 5G边缘计算安全白皮书[R]. 2020.
|
|
Alliance of Industrial Internet. 5G edge computing security white paper[R]. 2020.
|
[8] |
张建敏, 谢伟良, 杨峰义 ,等. 移动边缘计算技术及其本地分流方案[J]. 电信科学, 2016,32(7): 132-139.
|
|
ZHANG J M , XIE W L , YANG F Y ,et al. Mobile edge computing and application in traffic offloading[J]. Telecommunications Science, 2016,32(7): 132-139.
|
[9] |
张蕾, 刘云毅, 张建敏 ,等. 基于MEC的能力开放及安全策略研究[J]. 电子技术应用, 2020,46(6): 1-5.
|
|
ZHANG L , LIU Y Y , ZHANG J M ,et al. Research on capability exposure and security strategy based on MEC[J]. Application of Electronic Technique, 2020,46(6): 1-5.
|
[10] |
何明, 沈军, 吴国威 ,等. MEC安全探讨[J]. 移动通信, 2019,43(10): 2-6.
|
|
HE M , SHEN J , WU G W ,et al. Discussions on the security of MEC[J]. Mobile Communications, 2019,43(10): 2-6.
|
[11] |
IMT-2020(5G)推进组,中国信息通信研究院. 5G安全知识库[R]. 2021.
|
|
IMT-2020(5G) Promotion Group,CAICT. 5G security knowledge base[R]. 2021.
|
[12] |
何明, 沈军, 吴国威 . MEC安全建设策略[J]. 移动通信, 2021,45(3): 26-29,34.
|
|
HE M , SHEN J , WU G W . Strategy on the security construction of MEC[J]. Mobile Communications, 2021,45(3): 26-29,34.
|