Security Context Migration in MEC: Challenges and Use Cases
Modern and future services require ultra-reliable mobile connections with high bandwidth parameters and proper security protection. It is possible to ensure such conditions by provisioning services in the Multi-Access Edge Computing system integrated with fifth-generation mobile networks. However, t...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-10-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/11/21/3512 |
_version_ | 1797468524947439616 |
---|---|
author | Wojciech Niewolski Tomasz W. Nowak Mariusz Sepczuk Zbigniew Kotulski Rafal Artych Krzysztof Bocianiak Jean-Philippe Wary |
author_facet | Wojciech Niewolski Tomasz W. Nowak Mariusz Sepczuk Zbigniew Kotulski Rafal Artych Krzysztof Bocianiak Jean-Philippe Wary |
author_sort | Wojciech Niewolski |
collection | DOAJ |
description | Modern and future services require ultra-reliable mobile connections with high bandwidth parameters and proper security protection. It is possible to ensure such conditions by provisioning services in the Multi-Access Edge Computing system integrated with fifth-generation mobile networks. However, the main challenge in the mentioned architecture is providing a secure service migration with all related data and security requirements to another edge computing host area when the user changes its physical location. This article aims to present the state of research on the migration of the security context between service instances in Edge/MEC servers, specify steps of the migration procedure, and identify new security challenges inspired by use cases of 5G vertical industries. For this purpose, the analysis of the security context’s structure and basic concept of the Security Service Level Agreement was performed and presented in the document. Next, a further investigation of the security context was conducted, including requirements for its reliable migration between edge serves instances. The study mainly focused on crucial migration challenges and possible solutions to resolve them. Finally, the authors presented how the proposed solution can be used to protect 5G vertical industries services based on several mobile use cases. |
first_indexed | 2024-03-09T19:08:38Z |
format | Article |
id | doaj.art-aeb67739c9cf4b1ea42b6d408e5de72e |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-09T19:08:38Z |
publishDate | 2022-10-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-aeb67739c9cf4b1ea42b6d408e5de72e2023-11-24T04:25:06ZengMDPI AGElectronics2079-92922022-10-011121351210.3390/electronics11213512Security Context Migration in MEC: Challenges and Use CasesWojciech Niewolski0Tomasz W. Nowak1Mariusz Sepczuk2Zbigniew Kotulski3Rafal Artych4Krzysztof Bocianiak5Jean-Philippe Wary6Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, PolandFaculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, PolandFaculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, PolandFaculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, PolandOrange Polska S.A., 02-326 Warsaw, PolandOrange Polska S.A., 02-326 Warsaw, PolandOrange Innovation, 92320 Châtillon, FranceModern and future services require ultra-reliable mobile connections with high bandwidth parameters and proper security protection. It is possible to ensure such conditions by provisioning services in the Multi-Access Edge Computing system integrated with fifth-generation mobile networks. However, the main challenge in the mentioned architecture is providing a secure service migration with all related data and security requirements to another edge computing host area when the user changes its physical location. This article aims to present the state of research on the migration of the security context between service instances in Edge/MEC servers, specify steps of the migration procedure, and identify new security challenges inspired by use cases of 5G vertical industries. For this purpose, the analysis of the security context’s structure and basic concept of the Security Service Level Agreement was performed and presented in the document. Next, a further investigation of the security context was conducted, including requirements for its reliable migration between edge serves instances. The study mainly focused on crucial migration challenges and possible solutions to resolve them. Finally, the authors presented how the proposed solution can be used to protect 5G vertical industries services based on several mobile use cases.https://www.mdpi.com/2079-9292/11/21/35125G mobile communicationcommunication system securityMECmobile computingsecurity contextSLA |
spellingShingle | Wojciech Niewolski Tomasz W. Nowak Mariusz Sepczuk Zbigniew Kotulski Rafal Artych Krzysztof Bocianiak Jean-Philippe Wary Security Context Migration in MEC: Challenges and Use Cases Electronics 5G mobile communication communication system security MEC mobile computing security context SLA |
title | Security Context Migration in MEC: Challenges and Use Cases |
title_full | Security Context Migration in MEC: Challenges and Use Cases |
title_fullStr | Security Context Migration in MEC: Challenges and Use Cases |
title_full_unstemmed | Security Context Migration in MEC: Challenges and Use Cases |
title_short | Security Context Migration in MEC: Challenges and Use Cases |
title_sort | security context migration in mec challenges and use cases |
topic | 5G mobile communication communication system security MEC mobile computing security context SLA |
url | https://www.mdpi.com/2079-9292/11/21/3512 |
work_keys_str_mv | AT wojciechniewolski securitycontextmigrationinmecchallengesandusecases AT tomaszwnowak securitycontextmigrationinmecchallengesandusecases AT mariuszsepczuk securitycontextmigrationinmecchallengesandusecases AT zbigniewkotulski securitycontextmigrationinmecchallengesandusecases AT rafalartych securitycontextmigrationinmecchallengesandusecases AT krzysztofbocianiak securitycontextmigrationinmecchallengesandusecases AT jeanphilippewary securitycontextmigrationinmecchallengesandusecases |