This assignment requires a thorough evaluation of mobile edge computing's (MEC) security protocols and potential challenges. The report highlights the emergence of MEC as a promising technology for various applications but also emphasizes the need for robust security measures to ensure its safe deployment. The author discusses the limitations of cloud-based environments, such as low mobility support and location awareness, which are addressed by MEC. However, the report fails to provide adequate recommendations for incorporating security protocols in MEC environments, leading to potential security threats and challenges. A detailed analysis of existing literature on MEC and fog computing is provided, but the report's focus on security measures is lacking.