共查询到19条相似文献,搜索用时 889 毫秒
1.
随着5G商用的到来,基于5G三大应用场景的业务需求,现有核心网集中式部署不能满足新的需求,网络随业务流向边缘迁移是产业发展趋势。移动边缘计算靠近用户侧部署,能提供更短时延和保护隐私等功能。本文通过分析移动边缘计算面向的重点行业和重点领域等业务发展需求,协同构建客户的业务、无线和局房资源视图,匹配出移动边缘计算部署机房位置及资源储备。 相似文献
2.
3.
张滨 《电信工程技术与标准化》2020,(12)
本论文聚焦在5G边缘计算安全研究与应用,包括5G边缘计算安全风险、5G边缘安计算安全防护要求以及5G边缘计算安全应用。首先从网络服务、硬件环境、虚拟化、边缘计算平台、能力开放、应用、管理、数据方面明确5G边缘计算安全风险,然后针对安全风险提出对应的安全防护要求,并以智能电网为例介绍了5G边缘计算安全应用。论文为5G边缘计算安全的风险以及防护要求分析等研究提供支持,为5G边缘计算安全应用提供发展思路。 相似文献
4.
计算卸载作为移动边缘计算的关键技术之一,对于提升移动边缘计算实现节能、降低时延和改善用户体验等方面,起到关键的作用.本文围绕移动边缘计算的计算卸载技术进行分析研究,首先介绍了计算卸载概念和主要特征;并就移动边缘计算的计算卸载实施步骤和计算卸载系统分类进行阐述;然后针对计算卸载关键技术中的3个重点研究问题进行了详细分析;最后,对研究工作进行总结. 相似文献
5.
计算卸载作为移动边缘计算的关键技术之一,对于提升移动边缘计算实现节能、降低时延和改善用户体验等方面,起到关键的作用.本文围绕移动边缘计算的计算卸载技术进行分析研究,首先介绍了计算卸载概念和主要特征;并就移动边缘计算的计算卸载实施步骤和计算卸载系统分类进行阐述;然后针对计算卸载关键技术中的3个重点研究问题进行了详细分析;最后,对研究工作进行总结. 相似文献
6.
7.
8.
多接入边缘计算(multi-access edge computing,MEC)能为城市轨道交通中的计算密集型业务和时延敏感型业务提供高质量的服务能力,然而轨道交通边缘计算网络中的大量边缘设施暴露在开放式环境中,其隐私保护和传输安全面临着很大的挑战。区块链(blockchain)具有分布式账本、共识机制、智能合约、去中心化应用等功能特性,因此,区块链技术可以为分布式轨道交通边缘计算网络构建系统性的安全防护机制,从而保障网络安全和数据安全,实现高质量的城市轨道交通服务。首先,介绍了区块链的基本概念;其次,设计了轨道交通边缘计算网络架构,提出了融合区块链的轨道交通边缘计算网络安全防护机制和应用实例;最后,对该安全防护机制面临的问题和挑战进行了分析和展望。 相似文献
9.
10.
11.
Dharminder Dharminder Dheerendra Mishra 《International Journal of Communication Systems》2023,36(12):e4116
Human-centered systems play an important role in the modern world, for example, driverless car, autonomous and smart vehicles, drones, and robotics. The internet of things environment demands a faster real-time response depending on the applications processed in a particular duration. Mobile edge computing (MEC) allows a user to get a real-time response as compared with cloud computing (CC), although ensuring a number of security attributes in MEC environment remains challenging. In this article, a protocol is designed to achieve mutual authentication, anonymous communication, and security against traceability, as these are very crucial factors to ensure the security of data and user's privacy. Moreover, the proposed scheme ensures mutual authentication between a mobile user and an edge server along with the user's anonymity and untraceability. The proof of security and evaluation of performance of the scheme validates that it ensures security attributes and improves efficiency in terms of communication and computation overheads. 相似文献
12.
13.
As mobile networks become high speed and attain an all-IP structure,more services are possible.This brings about many new security requirements that traditional security programs cannot handle.This paper analyzes security threats and the needs of 3G/4G mobile networks,and then proposes a novel protection scheme for them based on their whole structure.In this scheme,a trusted computing environment is constructed on the mobile terminal side by combining software validity verification with access control.At the security management center,security services such as validity verification and integrity check are provided to mobile terminals.In this way,terminals and the network as a whole are secured to a much greater extent.This paper also highlights problems to be addressed in future research and development. 相似文献
14.
Jafar A. Alzubi Omar A. Alzubi Ashish Singh Tareq Mahmod Alzubi 《International Journal of Network Management》2023,33(5):e2240
Mobile edge computing (MEC) integrates mobile and edge computing technologies to provide efficient computing services with low latency. It includes several Internet of Things (IoT) and edge devices that process the user data at the network's edge. The architectural characteristic of MEC supports many internet-based services, which attract more number of users, including attackers. The safety and privacy of the MEC environment, especially user information is a significant concern. A lightweight accessing and sharing protocol is required because edge devices are resource constraints. This paper addresses this issue by proposing a blockchain-enabled security management framework for MEC environments. This approach provides another level of security and includes blockchain security features like temper resistance, immutable, transparent, traceable, and distributed ledger in the MEC environment. The framework guarantees secure data storage in the MEC environment. The contributions of this paper are twofold: (1) We propose a blockchain-enabled security management framework for MEC environments that address the security and privacy concerns, and (2) we demonstrate through simulations that the framework has high performance and is suitable for resource-constrained MEC devices. In addition, a smart contract-based access and sharing mechanism is proposed. Our research uses a combination of theoretical analysis and simulation experiments to demonstrate that the proposed framework offers high security, low latency, legitimate access, high throughput, and low operations cost. 相似文献
15.
16.
An efficient authentication system of smart device using multi factors in mobile cloud service architecture 下载免费PDF全文
Young‐Sik Jeong Ji Soo Park Jong Hyuk Park 《International Journal of Communication Systems》2015,28(4):659-674
Mobile cloud computing environments have overcome the performance limitation of mobile devices and provide use environments not restricted by places. However, user information protection mechanisms are required because of both the security vulnerability of mobile devices and the security vulnerability of cloud computing. In this paper, a multifactor mobile device authentication system is proposed to provide safety, efficiency, and user convenience for mobile device use in cloud service architectures. This system improves security by reinforcing the user authentication required before using cloud computing services. Furthermore, to reinforce user convenience, the system proposed increases the strength of authentication keys by establishing multiple factors for authentication. For efficient entries in mobile device use environments, this system combines mobile device identification number entries, basic ID/password type authentication methods, and the authentication of diverse user bio‐information. This system also enhances authentication efficiency by processing the authentication factors of a user's authentication attempt in a lump instead of one by one in the cloud computing service environment. These authentication factors can be continuously added, and this authentication system provides authentication efficiency even when authentication factors are added. The main contribution is to improve high security level by through authentication of mobile devices with multifactors simultaneously and to use the mobile cloud service architecture for its efficient processing with respect to execution time of it. Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
17.
18.
面向未来6G移动通信的大规模网络移动边缘计算与缓存技术,首先,介绍了大规模无线网络下移动边缘计算和缓存的架构与原理,并阐释了移动边缘计算和缓存技术在大规模无线网络中的必要性和普适性。接着,从计算卸载、边缘缓存、多维资源分配、用户关联和隐私保护这5个关键问题出发,综述和分析了移动边缘计算和缓存赋能大规模无线网络时会引入的新型关键问题以及对应的解决方案研究,并进一步指出了未来的发展趋势和研究方向。最后,针对隐私保护问题,提出了一种基于联邦学习的隐私保护方案,并通过仿真结果表明所提方案能够同时保护用户数据隐私且改善系统服务质量。 相似文献