Security Context Migration in MEC: Challenges and Use Cases

Modern and future services require ultra-reliable mobile connections with high bandwidth parameters and proper security protection. It is possible to ensure such conditions by provisioning services in the Multi-Access Edge Computing system integrated with fifth-generation mobile networks. However, t...

Full description

Bibliographic Details
Main Authors: Wojciech Niewolski, Tomasz W. Nowak, Mariusz Sepczuk, Zbigniew Kotulski, Rafal Artych, Krzysztof Bocianiak, Jean-Philippe Wary
Format: Article
Language:English
Published: MDPI AG 2022-10-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/11/21/3512
_version_ 1797468524947439616
author Wojciech Niewolski
Tomasz W. Nowak
Mariusz Sepczuk
Zbigniew Kotulski
Rafal Artych
Krzysztof Bocianiak
Jean-Philippe Wary
author_facet Wojciech Niewolski
Tomasz W. Nowak
Mariusz Sepczuk
Zbigniew Kotulski
Rafal Artych
Krzysztof Bocianiak
Jean-Philippe Wary
author_sort Wojciech Niewolski
collection DOAJ
description Modern and future services require ultra-reliable mobile connections with high bandwidth parameters and proper security protection. It is possible to ensure such conditions by provisioning services in the Multi-Access Edge Computing system integrated with fifth-generation mobile networks. However, the main challenge in the mentioned architecture is providing a secure service migration with all related data and security requirements to another edge computing host area when the user changes its physical location. This article aims to present the state of research on the migration of the security context between service instances in Edge/MEC servers, specify steps of the migration procedure, and identify new security challenges inspired by use cases of 5G vertical industries. For this purpose, the analysis of the security context’s structure and basic concept of the Security Service Level Agreement was performed and presented in the document. Next, a further investigation of the security context was conducted, including requirements for its reliable migration between edge serves instances. The study mainly focused on crucial migration challenges and possible solutions to resolve them. Finally, the authors presented how the proposed solution can be used to protect 5G vertical industries services based on several mobile use cases.
first_indexed 2024-03-09T19:08:38Z
format Article
id doaj.art-aeb67739c9cf4b1ea42b6d408e5de72e
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-09T19:08:38Z
publishDate 2022-10-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-aeb67739c9cf4b1ea42b6d408e5de72e2023-11-24T04:25:06ZengMDPI AGElectronics2079-92922022-10-011121351210.3390/electronics11213512Security Context Migration in MEC: Challenges and Use CasesWojciech Niewolski0Tomasz W. Nowak1Mariusz Sepczuk2Zbigniew Kotulski3Rafal Artych4Krzysztof Bocianiak5Jean-Philippe Wary6Faculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, PolandFaculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, PolandFaculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, PolandFaculty of Electronics and Information Technology, Warsaw University of Technology, 00-665 Warsaw, PolandOrange Polska S.A., 02-326 Warsaw, PolandOrange Polska S.A., 02-326 Warsaw, PolandOrange Innovation, 92320 Châtillon, FranceModern and future services require ultra-reliable mobile connections with high bandwidth parameters and proper security protection. It is possible to ensure such conditions by provisioning services in the Multi-Access Edge Computing system integrated with fifth-generation mobile networks. However, the main challenge in the mentioned architecture is providing a secure service migration with all related data and security requirements to another edge computing host area when the user changes its physical location. This article aims to present the state of research on the migration of the security context between service instances in Edge/MEC servers, specify steps of the migration procedure, and identify new security challenges inspired by use cases of 5G vertical industries. For this purpose, the analysis of the security context’s structure and basic concept of the Security Service Level Agreement was performed and presented in the document. Next, a further investigation of the security context was conducted, including requirements for its reliable migration between edge serves instances. The study mainly focused on crucial migration challenges and possible solutions to resolve them. Finally, the authors presented how the proposed solution can be used to protect 5G vertical industries services based on several mobile use cases.https://www.mdpi.com/2079-9292/11/21/35125G mobile communicationcommunication system securityMECmobile computingsecurity contextSLA
spellingShingle Wojciech Niewolski
Tomasz W. Nowak
Mariusz Sepczuk
Zbigniew Kotulski
Rafal Artych
Krzysztof Bocianiak
Jean-Philippe Wary
Security Context Migration in MEC: Challenges and Use Cases
Electronics
5G mobile communication
communication system security
MEC
mobile computing
security context
SLA
title Security Context Migration in MEC: Challenges and Use Cases
title_full Security Context Migration in MEC: Challenges and Use Cases
title_fullStr Security Context Migration in MEC: Challenges and Use Cases
title_full_unstemmed Security Context Migration in MEC: Challenges and Use Cases
title_short Security Context Migration in MEC: Challenges and Use Cases
title_sort security context migration in mec challenges and use cases
topic 5G mobile communication
communication system security
MEC
mobile computing
security context
SLA
url https://www.mdpi.com/2079-9292/11/21/3512
work_keys_str_mv AT wojciechniewolski securitycontextmigrationinmecchallengesandusecases
AT tomaszwnowak securitycontextmigrationinmecchallengesandusecases
AT mariuszsepczuk securitycontextmigrationinmecchallengesandusecases
AT zbigniewkotulski securitycontextmigrationinmecchallengesandusecases
AT rafalartych securitycontextmigrationinmecchallengesandusecases
AT krzysztofbocianiak securitycontextmigrationinmecchallengesandusecases
AT jeanphilippewary securitycontextmigrationinmecchallengesandusecases