中圖分類號: TN929.5 文獻標識碼: A DOI:10.16157/j.issn.0258-7998.200376 中文引用格式: 張蕾,劉云毅,,張建敏,,等. 基于MEC的能力開放及安全策略研究[J].電子技術(shù)應用,2020,,46(6):1-5. 英文引用格式: Zhang Lei,,Liu Yunyi,Zhang Jianmin,,et al. Research on capability exposure and security strategy based on MEC[J]. Application of Electronic Technique,,2020,46(6):1-5.
Research on capability exposure and security strategy based on MEC
Zhang Lei,,Liu Yunyi,,Zhang Jianmin,,Yang Fengyi
5G R&D Center,China Telecom Corporation Limited Research Institute,,Beijing 102209,,China
Abstract: Multi-access edge computing(MEC) as one of key technologies of 5G,has attracted wide attention from related researchers. Based on edge networks and edge computing resources, MEC provides a combination of connectivity, computing, capabilities and applications, provides services to users nearby, and supports the introduction and exposure of cooperation between network capabilities and business capabilities. In the 5G mobile communication network, it has become a hot issue that how to exposure the edge capabilities safely and efficiently. Given that, this paper firstly introduces the MEC system architecture, network capabilities and business capabilities, and then studies the capability exposure architecture and procedure. Finally, we give the security strategy and introduce a specific example.
Key words : MEC,;network capability,;business capability;capability exposure,;security strategy