Archives

MEC_Threat_Vectors

Survey on Multi-Access Edge Computing Security and Privacy

  • February 26, 2021
  • Comments off

The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MECdeployments. In this paper, we analyse the security and privacy of the MEC system. We introduce […]

Read More
MEC Threat Vectors

Realizing Multi-Access Edge Computing
Feasibility: Security Perspective

  • October 28, 2019
  • Comments off

Internet of Things (IoT) and 5G are emerging technologies that prompt a mobile service platform capable of provisioning billions of communication devices which enable ubiquitous computing and ambient intelligence. These novel approaches are guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. To achieve these limitations, ETSI has introduced the paradigm of […]

Read More