MULTI-ACCESS EDGE COMPUTING ANALYSIS OF RISKS AND SECURITY MEASURES

3Citations
Citations of this article
240Readers
Mendeley users who have this article in their library.

Abstract

5G efficiently uses technologies like network slicing (NS), network function virtualization (NFV), software-defined network (SDN), and multi-access edge computing (MEC). At the same time, embracing these technologies and creating new services opens the network to a new set of security challenges. This paper presents a threat analysis of MEC features. The paper's novelty resides in viewing MEC as common ground for the telco and IT sectors. This paper studies the measures according to ISO/IEC 27001:2022 controls. ISO/IEC 27001 is the most popular standard for information security management systems, with a new version published in 2022.

Cite

CITATION STYLE

APA

Glavan, A. F., Gheorghica, D., & Croitoru, V. (2023). MULTI-ACCESS EDGE COMPUTING ANALYSIS OF RISKS AND SECURITY MEASURES. Revue Roumaine Des Sciences Techniques Serie Electrotechnique et Energetique, 68(2), 206–211. https://doi.org/10.59277/rrst-ee.2023.68.2.15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free