Unmanned Aerial Vehicle Multi-Access Edge Computing as Security Enabler for Next-Gen 5G Security Frameworks
作者机构:Department of Information and Communications EngineeringUniversity of MurciaMurcia30003Spain
出 版 物:《Intelligent Automation & Soft Computing》 (智能自动化与软计算(英文))
年 卷 期:2023年第37卷第8期
页 面:2307-2333页
核心收录:
学科分类:0839[工学-网络空间安全] 08[工学]
基 金:supported by the ONOFRE-3 project,Grant Agreement PID2020-112675RB-C44,funded by MCIN/AEI/10.13039/501100011033 funds from the Spanish Ministry of Economic Affairs and Digital Transformation and the European Union–nextGeneration EU[TSI-063000-2021-36,TSI-063000-2021-44,TSI-063000-2021-45,TSI-063000-2021-62].Antonio Skármeta received them
摘 要:5G/Beyond 5G(B5G)networks provide connectivity to many heterogeneous devices,raising significant security and operational issues and making traditional infrastructure management increasingly *** this regard,new frameworks such as Anastacia-H2020 or INSPIRE-5GPlus automate the management of next-generation infrastructures,especially regarding policy-based security,abstraction,flexibility,and *** paper presents the design,workflow,and implementation of a security solution based on Unmanned Aerial Vehicles(UAVs),able to extend 5G/B5G security framework capabilities with UAV features like dynamic service provisioning in specific geographic *** proposed solution allows enforcing UAV security policies in proactive and reactive ways to automate UAV dynamic deployments and provisioning security Virtual Network Functions(VNFs)in the onboard Multi-access Edge Computing(MEC)node.A UAV has been ensembled from scratch to validate the proposal,and a raspberry-pi has been onboarded as compute *** implementation provides a VNF for dynamic UAV management,capable of dynamically loading waypoints into the flight controller to address reactive autonomous flights,and anMLbased VNF capable of detecting image *** to the security policies,the onboard VNFs can be dynamically configured to generate alerts to the framework and apply local reactions depending on the detection *** our experiments,we measured the time it takes for the solution to be ready after receiving a security policy for detecting patterns in a specific geographical *** time it takes for the solution to react automatically was also *** results show that the proactive flow configuration considering ten waypoints can be enforced in less than 3 s,and a local reactive flow can be enforced in around 1 *** consider that the results are promising and aligned with other security enabler solutions as part of existing 5G/6G security frameworks.