790 research outputs found

    Context-Awareness Enhances 5G Multi-Access Edge Computing Reliability

    Get PDF
    The fifth generation (5G) mobile telecommunication network is expected to support Multi- Access Edge Computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultra-responsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable a more decentralized approach for authentication and authorization processes. This paper proposes a novel decentralized authentication architecture that supports flexible and low-cost local authentication with the awareness of context information of network elements such as user equipment and virtual network functions. Based on a Markov model for backhaul link quality, as well as a random walk mobility model with mixed mobility classes and traffic scenarios, numerical simulations have demonstrated that the proposed approach is able to achieve a flexible balance between the network operating cost and the MEC reliability.Comment: Accepted by IEEE Access on Feb. 02, 201

    Flexible fog computing and telecom architecture for 5G networks

    Get PDF
    We review a novel, secure, highly distributed and ultra-dense fog computing infrastructure, which can be allocated at the extreme edge of a wired/wireless network for a Telecom Operator to provide multiple unified, cost-effective and new 5G services, such as Network Function Virtualization (NFV), Mobile Edge Computing (MEC), and services for third parties (e.g., smart cities, vertical industries or Internet of Things (IoT)). The distributed and programmable fog technologies are expected to strengthen the position of the Mobile Network and cloud markets; key benefits are the dynamic deployment of new distributed low-latency services. The architecture consists of three main building blocks: a) a scalable node, that is seamlessly integrated in the Telecom infrastructure; b) a controller, focused on service assurance, that is integrated in the management and orchestration architecture of the Telecom operator; and c) services running on top of the Telecom infrastructure.Peer ReviewedPostprint (author's final draft
    • …
    corecore