Telecommunications Science ›› 2023, Vol. 39 ›› Issue (8): 43-57.doi: 10.11959/j.issn.1000-0801.2023152

• Research and Development • Previous Articles    

Research on 5G MEC security assessment system and method

Qiucheng LU1,2, Jinhui TANG2, Congying BAO3,4, Hao WU4, Yusun FU2   

  1. 1 Ningbo Artificial Intelligence Institute of Shanghai Jiao Tong University, Ningbo 315000, China
    2 School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
    3 Ningbo Yongyao Power Investment Group Co., Ltd., Ningbo 315099, China
    4 State Grid Zhejiang Electric Power Co., Ltd.Ningbo Power Supply Company, Ningbo 315016, China
  • Revised:2023-08-05 Online:2023-08-01 Published:2023-08-01
  • Supported by:
    The National Key Research and Development Program of China(2019YFB1705703);The Major Scientific and Technological Research Program of Ningbo(2021Z022);The Research Program of Ningbo Yongyao Power Investment Group Co., Ltd.(NBGC21P05A-0926-41)

Abstract:

Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.

Key words: 5G MEC, security assessment system, vulnerability scoring system, AHP, fuzzy evaluation

CLC Number: 

No Suggested Reading articles found!