浏览全部资源
扫码关注微信
1. 上海交通大学宁波人工智能研究院,浙江 宁波 315000
2. 上海交通大学电子信息与电气工程学院,上海 200240
3. 宁波市永耀电力投资集团有限公司,浙江 宁波 315099
4. 国网浙江省电力有限公司宁波供电公司,浙江 宁波 315016
[ "卢秋呈(1998- ),男,上海交通大学硕士生,主要研究方向为工业通信系统与安全可信" ]
[ "唐金辉(1999- ),男,上海交通大学硕士生,主要研究方向为工业通信系统与安全可信" ]
[ "鲍聪颖(1986- ),女,宁波市永耀电力投资集团有限公司高级工程师,主要研究方向为电力5G规划与应用安全" ]
[ "吴昊(1993- ),男,国网浙江省电力有限公司宁波供电公司工程师,主要研究方向为电力5G通信与安全" ]
[ "伏玉笋(1972- ),男,博士,上海交通大学助理研究员,主要研究方向为无线通信与系统、无线网联智能系统、工业互联网与安全可信、智能制造等" ]
网络出版日期:2023-08,
纸质出版日期:2023-08-20
移动端阅览
卢秋呈, 唐金辉, 鲍聪颖, 等. 5G MEC安全评估体系与方法研究[J]. 电信科学, 2023,39(8):43-57.
Qiucheng LU, Jinhui TANG, Congying BAO, et al. Research on 5G MEC security assessment system and method[J]. Telecommunications science, 2023, 39(8): 43-57.
卢秋呈, 唐金辉, 鲍聪颖, 等. 5G MEC安全评估体系与方法研究[J]. 电信科学, 2023,39(8):43-57. DOI: 10.11959/j.issn.1000-0801.2023152.
Qiucheng LU, Jinhui TANG, Congying BAO, et al. Research on 5G MEC security assessment system and method[J]. Telecommunications science, 2023, 39(8): 43-57. DOI: 10.11959/j.issn.1000-0801.2023152.
多接入边缘计算(multi-access edge computing,MEC)部署在网络边缘,在实现移动网络中高效、快速的数据处理的同时,还承担着重要的安全功能,这使得MEC成为攻击者的主要目标。因此,MEC节点将面临巨大的安全风险,如何准确地评估、量化MEC安全能力是迫切需要解决的课题。为了准确地评估、量化MEC安全能力,结合MEC安全风险提出了MEC安全评估体系,该评估体系选取的评估指标较为全面地反映了MEC 的基本特性,体现了其完整的安全能力。基于此评估体系,利用层次分析法(analytic hierarchy process,AHP)和模糊评价设计了MEC安全评估方法,创新性地提出了MEC漏洞评分系统,并参考该系统的结果给出指标评价,最终计算出MEC安全能力量化值。实例结果证明了方法的有效性。
Multi-access edge computing (MEC) is deployed at the edge of the network
enabling efficient and fast data processing in mobile networks
while also undertaking important security functions
making MEC a prime target for attackers.Therefore
MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities
the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system
the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation
the MEC vulnerability scoring system was creatively proposed
and the evaluation indicators were provided based on the results of MEC vulnerability scoring system
the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.
AHMAD I , KUMAR T , LIYANAGE M , et al . Overview of 5G security challenges and solutions [J ] . IEEE Communications Standards Magazine , 2018 , 2 ( 1 ): 36 - 43 .
项弘禹 , 肖扬文 , 张贤 , 等 . 5G边缘计算和网络切片技术 [J ] . 电信科学 , 2017 , 33 ( 6 ): 54 - 63 .
XIANG H Y , XIAO Y W , ZHANG X , et al . Edge computing and network slicing technology in 5G [J ] . Telecommunications Science , 2017 , 33 ( 6 ): 54 - 63 .
BEBORTTA S , SENAPATI D , PANIGRAHI C R , et al . Adaptive performance modeling framework for QoS-aware offloading in MEC-based IIoT systems [J ] . IEEE Internet of Things Journal , 2022 , 9 ( 12 ): 10162 - 10171 .
HOU Y Z , WANG C R , ZHU M , et al . Joint allocation of wireless resource and computing capability in MEC-enabled vehicular network [J ] . China Communications , 2021 , 18 ( 6 ): 64 - 76 .
QADIR J , SAINZ-DE-ABAJO B , KHAN A , et al . Towards mobile edge computing:taxonomy,challenges,applications and future realms [J ] . IEEE Access , 2020 ( 8 ): 189129 - 189162 .
ETSI . Mobile edge computing (MEC); framework and reference architecture:ETSI GS MEC003 V2.2.1 [S ] . 2020 .
3GPP . Security architecture and procedures for 5G system:TS 33.501 V15.4.0 [S ] . 2020 .
AHMAD I , SHAHABUDDIN S , KUMAR T , et al . Security for 5G and beyond [J ] . IEEE Communications Surveys & Tutorials , 2019 , 21 ( 4 ): 3682 - 3722 .
TALEB T , SAMDANIS K , MADA B , et al . On multi-access edge computing:a survey of the emerging 5G network edge cloud architecture and orchestration [J ] . IEEE Communications Surveys & Tutorials , 2017 , 19 ( 3 ): 1657 - 1681 .
RANAWEERA P , JURCUT A D , LIYANAGE M . Survey on multi-access edge computing security and privacy [J ] . IEEE Communications Surveys & Tutorials , 2021 , 23 ( 2 ): 1078 - 1124 .
刘云毅 , 张建敏 , 冯晓丽 , 等 . 5G MEC系统安全能力部署方案 [J ] . 电信科学 , 2022 , 38 ( 11 ): 143 - 152 .
LIU Y Y , ZHANG J M , FENG X L , et al . 5G MEC system security capability deployment scheme [J ] . Telecommunications Science , 2022 , 38 ( 11 ): 143 - 152 .
张琳 , 魏新艳 , 刘茜萍 , 等 . 基于协作信誉和设备反馈的物联网边缘服务器信任评估算法 [J ] . 通信学报 , 2022 , 43 ( 2 ): 118 - 130 .
ZHANG L , WEI X Y , LIU X P , et al . Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback [J ] . Journal on Communications , 2022 , 43 ( 2 ): 118 - 130 .
贺海 , 刘海峰 , 成金爱 . 云计算平台安全能力评估体系和评估指标研究 [J ] . 信息安全研究 , 2020 , 6 ( 11 ): 990 - 995 .
HE H , LIU H F , CHENG J A . Research on evaluation system and index of cloud computing platform security capability [J ] . Journal of Information Security Research , 2020 , 6 ( 11 ): 990 - 995 .
FIGUEROA-LORENZO S , AÑORGA J , ARRIZABALAGA S . A survey of IIoT protocols:a measure of vulnerability risk analysis based on CVSS [J ] . ACM Computing Surveys , 2020 , 53 ( 2 ): 1 - 53 .
陶耀东 , 贾新桐 , 吴云坤 . 一种工业控制系统漏洞风险评估方法 [J ] . 小型微型计算机系统 , 2020 , 41 ( 3 ): 603 - 609 .
TAO Y D , JIA X T , WU Y K . Industry control system vulnerability risk assessment method [J ] . Journal of Chinese Computer Systems , 2020 , 41 ( 3 ): 603 - 609 .
李舟 , 唐聪 , 胡建斌 , 等 . 面向 SaaS 云平台的安全漏洞评分方法研究 [J ] . 通信学报 , 2016 , 37 ( 8 ): 157 - 166 .
LI Z , TANG C , HU J B , et al . Vulnerabilities scoring approach for cloud SaaS [J ] . Journal on Communications , 2016 , 37 ( 8 ): 157 - 166 .
ALI B , GREGORY M A , LI S . Multi-access edge computing architecture,data security and privacy:a review [J ] . IEEE Access , 2021 ( 9 ): 18706 - 18721 .
杨志强 , 粟栗 , 杨波 , 等 . 5G 安全技术与标准 [M ] . 北京 : 人民邮电出版社 , 2020 .
YANG Z Q , SU L , YANG B , et al . 5G security technology and standards [M ] . Beijing : Posts & Telecom Press , 2020 .
周艳 , 何承东 . 5G 安全的全球统一认证体系和标准演进 [J ] . 移动通信 , 2021 , 45 ( 1 ): 21 - 29 .
ZHOU Y , HE C D . Global unified security certification system and standard evolution for 5G security [J ] . Mobile Communications , 2021 , 45 ( 1 ): 21 - 29 .
武志学 . 云计算虚拟化技术的发展与趋势 [J ] . 计算机应用 , 2017 , 37 ( 4 ): 915 - 923 .
WU Z X . Advances on virtualization technology of cloud computing [J ] . Journal of Computer Applications , 2017 , 37 ( 4 ): 915 - 923 .
杨爱民 , 高放 , 边敏华 , 等 . 基于层次分析—模糊评价的云计算安全评估与对策 [J ] . 通信学报 , 2016 , 37 ( S1 ): 104 - 110 .
YANG A M , GAO F , BIAN M H , et al . Cloud computing security evaluation and countermeasure based on AHP-fuzzy comprehensive evaluation [J ] . Journal on Communications , 2016 , 37 ( S1 ): 104 - 110 .
FENG N , FU B C , WU H J , et al . Modeling of fuzzy comprehensive evaluation based on cloud model [C ] // Proceedings of 2016 14th International Conference on Control,Automation,Robotics and Vision (ICARCV) . Piscataway:IEEE Press , 2017 : 1 - 5 .
于亚 , 伏玉笋 . 工业互联网边缘终端初始接入可信度量方法研究 [J ] . 物联网学报 , 2022 , 6 ( 4 ): 149 - 157 .
YU Y , FU Y S . Research on trust measurement method for initial access of industrial Internet edge terminals [J ] . Chinese Journal on Internet of Things , 2022 , 6 ( 4 ): 149 - 157 .
PRATHYUSHA Y , SHEU T L . Coordinated resource allocations for eMBB and URLLC in 5G communication networks [J ] . IEEE Transactions on Vehicular Technology , 2022 , 71 ( 8 ): 8717 - 8728 .
KAI S F , ZHENG J H , SHI F , et al . A CVSS-based vulnerability assessment method for reducing scoring error [C ] // Proceedings of 2021 2nd International Conference on Electronics,Communications and Information Technology (CECIT) . Piscataway:IEEE Press , 2022 : 25 - 32 .
SPINELLI F , MANCUSO V . Toward enabled industrial verticals in 5G:a survey on MEC-based approaches to provisioning and flexibility [J ] . IEEE Communications Surveys & Tutorials , 2021 , 23 ( 1 ): 596 - 630 .
NOWAK T W , SEPCZUK M , KOTULSKI Z , et al . Verticals in 5G MEC-use cases and security challenges [J ] . IEEE Access , 2021 ( 9 ): 87251 - 87298 .
马洪源 , 肖子玉 , 卜忠贵 , 等 . 5G边缘计算技术及应用展望 [J ] . 电信科学 , 2019 , 35 ( 6 ): 114 - 123 .
MA H Y , XIAO Z Y , BU Z G , et al . 5G edge computing technology and application prospects [J ] . Telecommunications Science , 2019 , 35 ( 6 ): 114 - 123 .
0
浏览量
125
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构