Security Context Establishment and Migration in Mobile Computing

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (30 November 2022) | Viewed by 2273

Special Issue Editor


E-Mail Website
Guest Editor
Institute of Telecommunications, Warsaw University of Technology, 15/19 Nowowiejska Str., 00-665 Warsaw, Poland
Interests: network security; mobile networks; cryptography; discrete chaotic cryptography
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Exploiting modern information systems requires using mobile devices equipped with appropriate applications and guaranteeing connectivity with services through distributed and changing access points and servers. This causes difficulties and creates new challenges in ensuring an adequate level of security, regardless of the current connection pattern.

Therefore, problems arise related to establishing the level of security and guaranteeing that it is satisfactory for all parties involved in the provision and use of the service. An additional problem is the transfer of the established security level between service components that change and cooperate during the end user's mobility.

In this Special Issue, we focus on the security context establishment and migration in mobile computing, which defines all the security settings and their relations to the entities involved in providing the service in a mobile environment.

We invite submissions related to different aspects of security context establishment and migration in modern mobile networks, including, but not limited to, the following:

5G networks security;

Mobile cloud computing; 

Multi-access edge computing (MEC);

Inter-MEC systems and their security;

MEC-cloud system security establishment;

Application mobility services;

Interoperability in cloud computing;

Service-level agreement (SLA);

Level of security SLA;

MEC orchestration for security;

MEC enabler and access control management;

MEC application mobility;

V2X information service;

Service evolution;

End-to-end network slicing;

End-user applications security ;

Network security metrics;

Secure MEC applications;

Cloud computing risk evaluation;

Mobile identity management;

Security of mobile software;

Smart devices for mobility;

Ubiquitous computing.

Prof. Dr. Zbigniew Kotulski
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • 5G networks security
  • Mobile cloud computing
  • Multi-access edge computing (MEC)

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

33 pages, 389 KiB  
Article
Security Context Migration in MEC: Challenges and Use Cases
by Wojciech Niewolski, Tomasz W. Nowak, Mariusz Sepczuk, Zbigniew Kotulski, Rafal Artych, Krzysztof Bocianiak and Jean-Philippe Wary
Electronics 2022, 11(21), 3512; https://doi.org/10.3390/electronics11213512 - 28 Oct 2022
Cited by 2 | Viewed by 1855
Abstract
Modern and future services require ultra-reliable mobile connections with high bandwidth parameters and proper security protection. It is possible to ensure such conditions by provisioning services in the Multi-Access Edge Computing system integrated with fifth-generation mobile networks. However, the main challenge in the [...] Read more.
Modern and future services require ultra-reliable mobile connections with high bandwidth parameters and proper security protection. It is possible to ensure such conditions by provisioning services in the Multi-Access Edge Computing system integrated with fifth-generation mobile networks. However, the main challenge in the mentioned architecture is providing a secure service migration with all related data and security requirements to another edge computing host area when the user changes its physical location. This article aims to present the state of research on the migration of the security context between service instances in Edge/MEC servers, specify steps of the migration procedure, and identify new security challenges inspired by use cases of 5G vertical industries. For this purpose, the analysis of the security context’s structure and basic concept of the Security Service Level Agreement was performed and presented in the document. Next, a further investigation of the security context was conducted, including requirements for its reliable migration between edge serves instances. The study mainly focused on crucial migration challenges and possible solutions to resolve them. Finally, the authors presented how the proposed solution can be used to protect 5G vertical industries services based on several mobile use cases. Full article
(This article belongs to the Special Issue Security Context Establishment and Migration in Mobile Computing)
Show Figures

Graphical abstract

Back to TopTop