Telecommunications Science ›› 2022, Vol. 38 ›› Issue (11): 143-152.doi: 10.11959/j.issn.1000-0801.2022265

• Engineering and Application • Previous Articles     Next Articles

5G MEC system security capability deployment scheme

Yunyi LIU1, Jianmin ZHANG1, Xiaoli FENG2, Liwei ZHANG2   

  1. 1 Research Institute of China Telecom Co., Ltd., Beijing 102209, China
    2 China Telecom Group Co., Ltd., Beijing 100033, China
  • Revised:2022-09-23 Online:2022-11-20 Published:2022-11-01


Multi-access edge computing (MEC), as the core differentiated capability of 5G, is the key technology for telecom operators to build private 5G networks for enterprises.With the increase of 5G MEC nodes, security risks and protection schemes are increasingly concerned.Based on the description of 5G MEC system architecture, the potential security risks were analyzed.On this basis, the security capability deployment architecture and scheme of the 5G MEC system were proposed, and the deployment case was introduced.Finally, the current problems and challenges in the deployment of MEC security capabilities were discussed to provide references for subsequent research and development.

Key words: 5G, MEC, security capability, deployment scheme

CLC Number: 

No Suggested Reading articles found!