[1] 中国信通院,IMT-2020(5G)推进组.5G安全报告[R/ OL].(2020-02-04)[2020-04-28].http://www.imt2020.org.cn/zh/documents/1
[2] 3GPP TS 23.501 System Architecture for the 5G System [S/OL] [2020-12-17]. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3144
[3] Chang Zhiquan, Xie Yujuan. 5G Network Security in Depth [J].Journal of Information Securyity Research. 2019, 5(12) 1124-1128 (in Chinese) (常志泉 谢玉娟 5G网络安全技术探究 [J].信息安全研究. 2019, 5(12) 1124-1128)
[4] 3GPP TR 33.839 Study on security aspects of enhancement of support for edge computing in 5G Core (5GC) [S/OL] [2020-12-02]. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3759
[5] Research on security technology of 5G mobile edge computing [S]. CCSA, 2021 (in Chinese) (5G 移动边缘计算安全技术研究[S].CCSA , 2021)
[6] Zhuang Xiaojun, Yang Bo, Yang Limin, Wang Yue. Research on 5G edge computing security for vertical industry [J]. Security science and technology, 2020, No. 120 (09): 22-29 (in Chinese)(庄小君、杨波、杨利民、王悦. 面向垂直行业的5G边缘计算安全研究[J]. 保密科学技术, 2020, No.120(09):22-29.)
[7] Qiu Qin Zhang Bin Lü Xin. Research on the Requirements and Standard System of 5G Cybersecurity. 2020, 6(8) 673-679) (in Chinese) (邱勤 张滨 吕欣 5G安全需求与标准体系研究[J].信息安全研究. 2020, 6(8) 673-679)
[8] 3GPP TR 23.748 Study on enhancement of support for Edge Computing in 5G Core network (5GC) [S/OL] [2020-12-17]. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3622
[9] 3GPP TS 33.501 Security architecture and procedures for 5G System [S/OL] [2020-12-16]. https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3169
[10] ETSI GS MEC 003 Mobile Edge Computing (MEC); Framework and Reference Architecture https://standards.globalspec.com/std/10001572/etsi-gs-mec-003
[11] ETSI GR MEC 017 V1.1.1 (2018-02) Mobile Edge Computing (MEC); Deployment of Mobile Edge Computing in an NFV environment
[12] ETSI White Paper No. 28-MEC in 5G networks