[1] |
AHMAD I , KUMAR T , LIYANAGE M ,et al. Overview of 5G security challenges and solutions[J]. IEEE Communications Standards Magazine, 2018,2(1): 36-43.
|
[2] |
项弘禹, 肖扬文, 张贤 ,等. 5G边缘计算和网络切片技术[J]. 电信科学, 2017,33(6): 54-63.
|
|
XIANG H Y , XIAO Y W , ZHANG X ,et al. Edge computing and network slicing technology in 5G[J]. Telecommunications Science, 2017,33(6): 54-63.
|
[3] |
BEBORTTA S , SENAPATI D , PANIGRAHI C R ,et al. Adaptive performance modeling framework for QoS-aware offloading in MEC-based IIoT systems[J]. IEEE Internet of Things Journal, 2022,9(12): 10162-10171.
|
[4] |
HOU Y Z , WANG C R , ZHU M ,et al. Joint allocation of wireless resource and computing capability in MEC-enabled vehicular network[J]. China Communications, 2021,18(6): 64-76.
|
[5] |
QADIR J , SAINZ-DE-ABAJO B , KHAN A ,et al. Towards mobile edge computing:taxonomy,challenges,applications and future realms[J]. IEEE Access, 2020(8): 189129-189162.
|
[6] |
ETSI. Mobile edge computing (MEC); framework and reference architecture:ETSI GS MEC003 V2.2.1[S]. 2020.
|
[7] |
3GPP. Security architecture and procedures for 5G system:TS 33.501 V15.4.0[S]. 2020.
|
[8] |
AHMAD I , SHAHABUDDIN S , KUMAR T ,et al. Security for 5G and beyond[J]. IEEE Communications Surveys & Tutorials, 2019,21(4): 3682-3722.
|
[9] |
TALEB T , SAMDANIS K , MADA B ,et al. On multi-access edge computing:a survey of the emerging 5G network edge cloud architecture and orchestration[J]. IEEE Communications Surveys & Tutorials, 2017,19(3): 1657-1681.
|
[10] |
RANAWEERA P , JURCUT A D , LIYANAGE M . Survey on multi-access edge computing security and privacy[J]. IEEE Communications Surveys & Tutorials, 2021,23(2): 1078-1124.
|
[11] |
刘云毅, 张建敏, 冯晓丽 ,等. 5G MEC系统安全能力部署方案[J]. 电信科学, 2022,38(11): 143-152.
|
|
LIU Y Y , ZHANG J M , FENG X L ,et al. 5G MEC system security capability deployment scheme[J]. Telecommunications Science, 2022,38(11): 143-152.
|
[12] |
张琳, 魏新艳, 刘茜萍 ,等. 基于协作信誉和设备反馈的物联网边缘服务器信任评估算法[J]. 通信学报, 2022,43(2): 118-130.
|
|
ZHANG L , WEI X Y , LIU X P ,et al. Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback[J]. Journal on Communications, 2022,43(2): 118-130.
|
[13] |
贺海, 刘海峰, 成金爱 . 云计算平台安全能力评估体系和评估指标研究[J]. 信息安全研究, 2020,6(11): 990-995.
|
|
HE H , LIU H F , CHENG J A . Research on evaluation system and index of cloud computing platform security capability[J]. Journal of Information Security Research, 2020,6(11): 990-995.
|
[14] |
FIGUEROA-LORENZO S , A?ORGA J , ARRIZABALAGA S . A survey of IIoT protocols:a measure of vulnerability risk analysis based on CVSS[J]. ACM Computing Surveys, 2020,53(2): 1-53.
|
[15] |
陶耀东, 贾新桐, 吴云坤 . 一种工业控制系统漏洞风险评估方法[J]. 小型微型计算机系统, 2020,41(3): 603-609.
|
|
TAO Y D , JIA X T , WU Y K . Industry control system vulnerability risk assessment method[J]. Journal of Chinese Computer Systems, 2020,41(3): 603-609.
|
[16] |
李舟, 唐聪, 胡建斌 ,等. 面向 SaaS 云平台的安全漏洞评分方法研究[J]. 通信学报, 2016,37(8): 157-166.
|
|
LI Z , TANG C , HU J B ,et al. Vulnerabilities scoring approach for cloud SaaS[J]. Journal on Communications, 2016,37(8): 157-166.
|
[17] |
ALI B , GREGORY M A , LI S . Multi-access edge computing architecture,data security and privacy:a review[J]. IEEE Access, 2021(9): 18706-18721.
|
[18] |
杨志强, 粟栗, 杨波 ,等. 5G 安全技术与标准[M]. 北京: 人民邮电出版社, 2020.
|
|
YANG Z Q , SU L , YANG B ,et al. 5G security technology and standards[M]. Beijing: Posts & Telecom Press, 2020.
|
[19] |
周艳, 何承东 . 5G 安全的全球统一认证体系和标准演进[J]. 移动通信, 2021,45(1): 21-29.
|
|
ZHOU Y , HE C D . Global unified security certification system and standard evolution for 5G security[J]. Mobile Communications, 2021,45(1): 21-29.
|
[20] |
武志学 . 云计算虚拟化技术的发展与趋势[J]. 计算机应用, 2017,37(4): 915-923.
|
|
WU Z X . Advances on virtualization technology of cloud computing[J]. Journal of Computer Applications, 2017,37(4): 915-923.
|
[21] |
杨爱民, 高放, 边敏华 ,等. 基于层次分析—模糊评价的云计算安全评估与对策[J]. 通信学报, 2016,37(S1): 104-110.
|
|
YANG A M , GAO F , BIAN M H ,et al. Cloud computing security evaluation and countermeasure based on AHP-fuzzy comprehensive evaluation[J]. Journal on Communications, 2016,37(S1): 104-110.
|
[22] |
FENG N , FU B C , WU H J ,et al. Modeling of fuzzy comprehensive evaluation based on cloud model[C]// Proceedings of 2016 14th International Conference on Control,Automation,Robotics and Vision (ICARCV). Piscataway:IEEE Press, 2017: 1-5.
|
[23] |
于亚, 伏玉笋 . 工业互联网边缘终端初始接入可信度量方法研究[J]. 物联网学报, 2022,6(4): 149-157.
|
|
YU Y , FU Y S . Research on trust measurement method for initial access of industrial Internet edge terminals[J]. Chinese Journal on Internet of Things, 2022,6(4): 149-157.
|
[24] |
PRATHYUSHA Y , SHEU T L . Coordinated resource allocations for eMBB and URLLC in 5G communication networks[J]. IEEE Transactions on Vehicular Technology, 2022,71(8): 8717-8728.
|
[25] |
KAI S F , ZHENG J H , SHI F ,et al. A CVSS-based vulnerability assessment method for reducing scoring error[C]// Proceedings of 2021 2nd International Conference on Electronics,Communications and Information Technology (CECIT). Piscataway:IEEE Press, 2022: 25-32.
|
[26] |
SPINELLI F , MANCUSO V . Toward enabled industrial verticals in 5G:a survey on MEC-based approaches to provisioning and flexibility[J]. IEEE Communications Surveys & Tutorials, 2021,23(1): 596-630.
|
[27] |
NOWAK T W , SEPCZUK M , KOTULSKI Z ,et al. Verticals in 5G MEC-use cases and security challenges[J]. IEEE Access, 2021(9): 87251-87298.
|
[28] |
马洪源, 肖子玉, 卜忠贵 ,等. 5G边缘计算技术及应用展望[J]. 电信科学, 2019,35(6): 114-123.
|
|
MA H Y , XIAO Z Y , BU Z G ,et al. 5G edge computing technology and application prospects[J]. Telecommunications Science, 2019,35(6): 114-123.
|