共查询到18条相似文献,搜索用时 78 毫秒
1.
基于5G网络中新引入的技术网元MEC的安全进行全方位研究,通过对MEC外部网络环境的安全性与其自身内部环境的安全问题进行探索,分别总结出无线侧CU/DU部署对MEC安全影响、可信域与非可信域之间传输不可靠引起的数据安全影响、部分边缘DC机房硬体环境的安全影响、NFV环境的安全影响以及第三方应用的安全影响五大场景,并在逐一研究后提出可行性解决方案。 相似文献
2.
5G MEC是运营商面向垂直行业进行业务拓展的利器,未来几年,将迎来爆发式增长。本文分析了5G MEC网络设计的特点,研究了垂直行业客户的需求,总结提出了5G MEC设计方法,期望能为MEC大规模设计和建设提供参考。 相似文献
3.
4.
5.
6.
随着物联网和5G网络的快速发展,单纯依靠云计算的集中式数据处理方式将无法满足以物联网感知为背景的大规模数据处理需求。移动边缘计算(MEC)作为新兴计算范式,是云计算的有力补充。但MEC的开放特性加剧了其面临的非授权访问、敏感数据泄露、网络攻击等安全风险。文章基于MEC在5G网络环境中面临的安全风险,结合MEC网络基础支撑统一化、能力服务化、流程编排化等特点,提出移动边缘计算网络安全防护方案,突破安全功能高效虚拟化、安全云服务联动、安全服务动态编排、安全功能自适应部署与协同调度、态势感知和高级威胁检测等技术瓶颈,形成移动边缘计算网络安全纵深防御体系,对于推进移动通信网络信息安全建设具有重要意义。 相似文献
7.
8.
文章提出了一种基于MEC的RTK基准站架构.在该架构里,RTK基准站与网络边缘计算服务器相结合,RTK基准站通过网线将RTK差分信号端对端的传输给MEC服务器,实现一个MEC服务器与一个RTK基准站对应,MEC直接向区域中所有车辆加密广播差分信号.在节约成本和减少时延的同时,保证了RTK信息的安全传输,减少了RTK基准站下发的差分信号和流动站的时延,提高了定位信息的安全保密性. 相似文献
9.
10.
11.
12.
物联网已经在世界范围内得到了广泛的关注和发展,其安全性也面临严重威胁。然而由于物联网本身的特性,很多在互联网领域的安全措施不能直接照搬过来。目前的安全策略主要是针对物联网受到的威胁逐一寻找解决方案,协同机制分散。面对日益智能化、系统化、综合化的安全威胁,提出一种三元两层的可信物联网架构,根据物联网的功能设计一种全程可信安全机制,从传感器设备的软件及硬件的完整性和安全性检查开始,将可信链依次传递,直到应用层,并在应用层根据行为可信实现数据的处理和应用。同时将控制功能和数据功能分开,不同的安全策略之间相互协作、相互检验,从而有效提高物联网应对安全威胁的能力。 相似文献
13.
Jafar A. Alzubi Omar A. Alzubi Ashish Singh Tareq Mahmod Alzubi 《International Journal of Network Management》2023,33(5):e2240
Mobile edge computing (MEC) integrates mobile and edge computing technologies to provide efficient computing services with low latency. It includes several Internet of Things (IoT) and edge devices that process the user data at the network's edge. The architectural characteristic of MEC supports many internet-based services, which attract more number of users, including attackers. The safety and privacy of the MEC environment, especially user information is a significant concern. A lightweight accessing and sharing protocol is required because edge devices are resource constraints. This paper addresses this issue by proposing a blockchain-enabled security management framework for MEC environments. This approach provides another level of security and includes blockchain security features like temper resistance, immutable, transparent, traceable, and distributed ledger in the MEC environment. The framework guarantees secure data storage in the MEC environment. The contributions of this paper are twofold: (1) We propose a blockchain-enabled security management framework for MEC environments that address the security and privacy concerns, and (2) we demonstrate through simulations that the framework has high performance and is suitable for resource-constrained MEC devices. In addition, a smart contract-based access and sharing mechanism is proposed. Our research uses a combination of theoretical analysis and simulation experiments to demonstrate that the proposed framework offers high security, low latency, legitimate access, high throughput, and low operations cost. 相似文献
14.
Information security technology confronts severe challenges because of the safety demands of cloud computing.The trustworthiness and self-safety of cloud computing platform are the foundation of cloud computing security.The confidence of cloud users is the key issue the deep development and popularization for cloud computing.The trusted cloud computing technology provides a feasible solution.From the standpoint of guaranteeing the trustworthiness of cloud computing platform,related research progresses on trusted virtualization,construction of trusted cloud platform and trusted virtual machine were introduced.Additionally,the characteristics,application scopes and effectiveness of typical schemes were analyzed and compared.Finally,current limitations and possible directions for future research were discussed. 相似文献
15.
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. 相似文献
16.
陈捷 《信息安全与通信保密》2007,(8):103-105
网络安全与可信计算的融合,是信息安全发展的必然趋势,安全管理也从单纯的安全参数配置和安全事件统计,朝着基于可信的安全管理与控制方向发展。文中针对目前网络安全威胁现状,阐述了建立在可信基础上的网络安全内涵,探讨了基于可信的安全管理与控制机制,并就几个影响后续发展的重要技术问题进行了初步分析和展望。 相似文献
17.
18.
当前,虚拟机技术和可信计算技术是两大热门技术,可信计算技术是实现信息系统安全的重要手段。是否可以在虚拟机的环境下,通过结合虚拟机和可信计算的技术优势,来实现终端系统与网络的可信,提高整个信息系统的安全?研究了如何设计一个基于虚拟机的可信计算平台安全架构,并进一步研究了虚拟化TPM的问题。同时,分析并总结了TCG定义的可信链技术。在此基础上,提出了虚拟机环境下可信链的实现方法,加强终端系统与网络的安全性。 相似文献