Committed to connecting the world

  •  
ITU GSR 2024

ITU-T work programme

[2022-2024] : [SG17] : [Q2/17]

[Declared patent(s)]  - [Publication]

Work item: X.1815 (ex X.5Gsec-ecs)
Subject/title: Security guidelines and requirements for IMT-2020 edge computing services
Status: Approved on 2023-03-03 [Issued from previous study period]
Approval process: TAP
Type of work item: Recommendation
Version: New
Equivalent number: -
Timing: -
Liaison: 3GPP, NGMN,ETSI,GSMA, ITU-T SG13, ITU-T SG20
Supporting members: -
Summary: The IMT-2020 network will enable a variety of services, including enhanced mobile broadband (eMBB) services, massive machine type communications (mMTC) based services and ultrareliable low latency communications (URLLC) based services, on an infrastructure of network and computing resources. In line with the key features and the requirements identified for the IMT-2020 network, it is required to be more efficient, personalized, intelligent, reliable and flexible. To support the typical services in the IMT-2020 network, especially eMBB services and URLLC based services, edge computing is acknowledged to be one of the key technologies for meeting the demanding key performance indicators (KPIs) of the IMT-2020 network, especially as far as low latency and bandwidth efficiency are concerned. Edge computing enables the operator and the third party service provider to deploy the services close to the user's access point, thus achieving high-efficiency service delivery through reduced end-to-end latency and load on the transport network. In order to ensure the security of edge computing service deployment and application, the security threats and relevant security requirements specific to edge computing service need to be analysed and the overall security framework need to be established. This draft Recommendation analyses the deployment scheme and typical application scenarios of edge computing services, specifies the security threats and requirements specific to edge computing services in IMT-2020 and thus establishes security capabilities for the operator to safeguard its applications.
Comment: -
Reference(s):
  Historic references:
Contact(s):
Feng Gao, Editor
Jae Hoon Nah, Editor
Junjie Xia, Editor
Bo Yu, Editor
Xiaojun ZHUANG, Editor
ITU-T A.5 justification(s):
Generate A.5 drat TD
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2019-02-01 11:14:31
Last update: 2023-03-09 11:11:26