Research on Edge Computing Security Defense of Information Energy System

Mobile Edge Computing (MEC) can effectively solve the problem of heavy backhaul link load and the long delay in traditional networks by further extending the telecom cellular network to other wireless access networks. However, because MEC nodes have abundant computing resources, communication resour...

Full description

Saved in:
Bibliographic Details
Published inIOP conference series. Earth and environmental science Vol. 784; no. 1; pp. 12014 - 12018
Main Authors Jiang, Jian, Li, Jian, Chen, Juan
Format Journal Article
LanguageEnglish
Published Bristol IOP Publishing 01.05.2021
Subjects
Online AccessGet full text
ISSN1755-1307
1755-1315
DOI10.1088/1755-1315/784/1/012014

Cover

Loading…
More Information
Summary:Mobile Edge Computing (MEC) can effectively solve the problem of heavy backhaul link load and the long delay in traditional networks by further extending the telecom cellular network to other wireless access networks. However, because MEC nodes have abundant computing resources, communication resources, and storage resources, they carry the sensitive data storage, communication applications, and computing services of multiple enterprises. Once the attacker controls the edge nodes, they can use the edge nodes for further horizontal or Vertical attacks will seriously damage the confidentiality, availability, and integrity of applications, communications, and data, and will bring a wide range of new security threats to users and society. At the same time, MEC nodes are often deployed in unattended computer rooms, and there are multiple operators and responsible parties in the safety life cycle, which brings more challenges to physical safety protection and safe operation management. Based on the analysis of the security threats faced by mobile edge computing, the key problems, and challenges faced by mobile edge computing are summarized and expounded because of four different security subjects, namely, device security, application security, data security, and management security, and the existing security solutions are summarized.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1755-1307
1755-1315
DOI:10.1088/1755-1315/784/1/012014