790 research outputs found
Context-Awareness Enhances 5G Multi-Access Edge Computing Reliability
The fifth generation (5G) mobile telecommunication network is expected to
support Multi- Access Edge Computing (MEC), which intends to distribute
computation tasks and services from the central cloud to the edge clouds.
Towards ultra-responsive, ultra-reliable and ultra-low-latency MEC services,
the current mobile network security architecture should enable a more
decentralized approach for authentication and authorization processes. This
paper proposes a novel decentralized authentication architecture that supports
flexible and low-cost local authentication with the awareness of context
information of network elements such as user equipment and virtual network
functions. Based on a Markov model for backhaul link quality, as well as a
random walk mobility model with mixed mobility classes and traffic scenarios,
numerical simulations have demonstrated that the proposed approach is able to
achieve a flexible balance between the network operating cost and the MEC
reliability.Comment: Accepted by IEEE Access on Feb. 02, 201
Flexible fog computing and telecom architecture for 5G networks
We review a novel, secure, highly distributed and ultra-dense fog computing infrastructure, which can be allocated at the extreme edge of a wired/wireless network for a Telecom Operator to provide multiple unified, cost-effective and new 5G services, such as Network Function Virtualization (NFV), Mobile Edge Computing (MEC), and services for third parties (e.g., smart cities, vertical industries or Internet of Things (IoT)). The distributed and programmable fog technologies are expected to strengthen the position of the Mobile Network and cloud markets; key benefits are the dynamic deployment of new distributed low-latency services. The architecture consists of three main building blocks: a) a scalable node, that is seamlessly integrated in the Telecom infrastructure; b) a controller, focused on service assurance, that is integrated in the management and orchestration architecture of the Telecom operator; and c) services running on top of the Telecom infrastructure.Peer ReviewedPostprint (author's final draft
- …