Security Context Migration in MEC: Challenges and Use Cases
Modern and future services require ultra-reliable mobile connections with high bandwidth parameters and proper security protection. It is possible to ensure such conditions by provisioning services in the Multi-Access Edge Computing system integrated with fifth-generation mobile networks. However, t...
Main Authors: | Wojciech Niewolski, Tomasz W. Nowak, Mariusz Sepczuk, Zbigniew Kotulski, Rafal Artych, Krzysztof Bocianiak, Jean-Philippe Wary |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-10-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/11/21/3512 |
Similar Items
-
Token-Based Authentication Framework for 5G MEC Mobile Networks
by: Wojciech Niewolski, et al.
Published: (2021-07-01) -
Privacy-Enhanced AKMA for Multi-Access Edge Computing Mobility
by: Gizem Akman, et al.
Published: (2022-12-01) -
Efficient Resource Allocation for Security-Aware Task Offloading in MEC System Using DVS
by: Yanli Wang, et al.
Published: (2022-09-01) -
Security for mobility /
by: Mitchell, Chris J., et al.
Published: (2004) -
Security implementation approach for the use of bring your own device in government agencies /
by: Mohamad Roshidi Rozali, 1980-, author, et al.
Published: (2015)