信息安全研究 ›› 2023, Vol. 9 ›› Issue (1): 38-.

• 学术论文 • 上一篇    下一篇

基于可信执行环境的5G边缘计算安全研究

鲍聪颖1,2吴昊2陆凯1曹松钱2卢秋呈3,4
  

  1. 1(宁波永耀电力投资集团有限公司浙江宁波315099)
    2(国网浙江省电力有限公司宁波供电公司浙江宁波315016)
    3(上海交通大学宁波人工智能研究院浙江宁波315000)
    4(上海交通大学电子信息与电气工程学院上海200240)
  • 出版日期:2023-01-01 发布日期:2022-12-30
  • 通讯作者: 鲍聪颖 硕士,工程师.主要研究方向为电力5G规划与应用安全. 617392055@qq.com
  • 作者简介:鲍聪颖 硕士,工程师.主要研究方向为电力5G规划与应用安全. 617392055@qq.com 吴昊 硕士,工程师.主要研究方向为电力5G通信与安全. 412449425@qq.com 陆凯 工程师.主要研究方向为电力5G应用安全. 617392055@qq.com 曹松钱 高级工程师.主要研究方向为电力5G通信与安全. 253490548@qq.com 卢秋呈 硕士.主要研究方向为工业通信系统与安全可信. 377091635@qq.com

Research on 5G Edge Computing Security Based on the Trusted  Execution Environment

  • Online:2023-01-01 Published:2022-12-30

摘要: 多接入边缘计算(multiaccess edge computing, MEC)在用户终端与数据中心之间架起了桥梁,使终端数据在边缘侧就能得到高效的处理.针对MEC存在的安全问题,通过分析MEC面临的安全风险,阐述了一种基于可信执行环境(trusted execution environment, TEE)的MEC安全方案,该方案通过在不同架构下(ARMx86)的TEE安全模块的结合,实现了MEC各组成部分的完整性检测以及可信度量,保障了MEC从启动到运行中各个部件的安全.同时介绍了一种MEC节点与边缘计算编排器之间的远程证明方法,实现了一套保障MEC基础设施、平台、应用、编排管理安全的整体方案.

关键词: 5G, 边缘计算安全, 可信计算, 可信执行环境, 可信度量

Abstract: MEC has built a bridge between the equipment edge and the data center, so that the original data can be processed efficiently at the mobile edge. Aiming at the security problems of MEC, by analyzing the security risks faced by MEC, this paper expounds on a MEC security scheme based on a trusted execution environment (TEE). Through the combination of tee security modules under different architectures (ARMx86), this scheme realizes the integrity detection and trusted measurement of each component of MEC, and ensures the security of each component of MEC from Startup to operation, At the same time, a remote proof method between MEC node and MEO is introduced, and a set of overall scheme to ensure the security of MEC infrastructure, platform, application and choreography management is realized.

Key words: 5G, edge computing security, trusted computing, trusted execution environment, trust measurement