Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2022, Vol. 48 ›› Issue (10): 19-27.doi: 10.12267/j.issn.2096-5931.2022.10.004

Previous Articles     Next Articles

A security scheme of enterprise park networking based on 5G SA+MEC

HU Zhaoxuan1, ZHANG Jianmin1, FENG Xiaoli2   

  1. 1. Research Institute of China Telecom Co., Ltd., Beijing 102209, China
    2. China Telecom Co., Ltd., Beijing 100033, China
  • Received:2022-04-18 Online:2022-10-15 Published:2022-11-01

Abstract:

Multi-access Edge Computing (MEC) on a 5G SA (Standalone) network has the advantages of low latency, large bandwidth, and high computing power. By using the 5G SA+MEC networking, enterprises can realize locally processing of production and management data, reduce delay and congestion of network, and obtain a better quality of service. Due to the introducing of technologies like container and virtualization at the edge of 5G network, and exposing network capability to the applications it carries, MEC faces different security threats in access network, transmission network, MEC platform, data security, management of operation and maintenance and other aspects. It is necessary to focus on the common security threats which 5G SA+MEC networking is up against, corresponding security schemes and typical cases.

Key words: MEC, security, networking, 5G, enterprise park

CLC Number: