Share
Fr. 186.00
Ahmed Bux Abro, Ahmed Bux e Abro, Ija Ahmad, Ijaz Ahmad, Andrei Gurtov, M Liyanage...
Comprehensive Guide to 5g Security
English · Hardback
Shipping usually within 1 to 3 weeks (not available at short notice)
Description
The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices
Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem.
5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks.
Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book:
* Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it
* Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks
* Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views
* Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts
Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.
List of contents
The Editors xvii
About the Contributors xxi
Foreword xxxiii
Preface xxxv
Acknowledgements xli
Part I 5G Security Overview 1
1 Evolution of Cellular Systems 3
Shahriar Shahabuddin, Sadiqur Rahaman, Faisal Rehman, Ijaz Ahmad, and Zaheer Khan
1.1 Introduction 3
1.2 Early Development 4
1.3 First Generation Cellular Systems 6
1.3.1 Advanced Mobile Phone Service 7
1.3.2 Security in 1G 7
1.4 Second Generation Cellular Systems 8
1.4.1 Global System for Mobile Communications 8
1.4.2 GSM Network Architecture 9
1.4.3 Code Division Multiple Access 10
1.4.4 Security in 2G 10
1.4.5 Security in GSM 11
1.4.5.1 IMSI 11
1.4.5.2 Ki 12
1.4.5.3 A3 Algorithm 12
1.4.5.4 A8 Algorithm 13
1.4.5.5 COMP128 14
1.4.5.6 A5 Algorithm 14
1.4.6 Security in IS?]95 14
1.5 Third Generation Cellular Systems 15
1.5.1 CDMA 2000 15
1.5.2 UMTS WCDMA 15
1.5.3 UMTS Network Architecture 16
1.5.4 HSPA 17
1.5.5 Security in 3G 17
1.5.6 Security in CDMA2000 17
1.5.7 Security in UMTS 18
1.6 Cellular Systems beyond 3G 20
1.6.1 HSPA+ 20
1.6.2 Mobile WiMAX 20
1.6.3 LTE 21
1.6.3.1 Orthogonal Frequency Division Multiplexing (OFDM) 21
1.6.3.2 SC?]FDE and SC?]FDMA 21
1.6.3.3 Multi?]antenna Technique 21
1.6.4 LTE Network Architecture 21
1.7 Fourth Generation Cellular Systems 22
1.7.1 Key Technologies of 4G 23
1.7.1.1 Enhanced MINO 23
1.7.1.2 Cooperative Multipoint Transmission and Reception for LTE?]Advanced 23
1.7.1.3 Spectrum and Bandwidth Management 24
1.7.1.4 Carrier Aggregation 24
1.7.1.5 Relays 24
1.7.2 Network Architecture 24
1.7.3 Beyond 3G and 4G Cellular Systems Security 25
1.7.4 LTE Security Model 26
1.7.5 Security in WiMAX 26
1.8 Conclusion 27
References 28
2 5G Mobile Networks: Requirements, Enabling Technologies, and Research Activities 31
Van?]Giang Nguyen, Anna Brunstrom, Karl?]Johan Grinnemo, and Javid Taheri
2.1 Introduction 31
2.1.1 What is 5G? 31
2.1.1.1 From a System Architecture Perspective 32
2.1.1.2 From the Spectrum Perspective 32
2.1.1.3 From a User and Customer Perspective 32
2.1.2 Typical Use Cases 32
2.2 5G Requirements 33
2.2.1 High Data Rate and Ultra Low Latency 34
2.2.2 Massive Connectivity and Seamless Mobility 35
2.2.3 Reliability and High Availability 35
2.2.4 Flexibility and Programmability 36
2.2.5 Energy, Cost and Spectrum Efficiency 36
2.2.6 Security and Privacy 36
2.3 5G Enabling Technologies 37
2.3.1 5G Radio Access Network 38
2.3.1.1 mmWave Communication 38
2.3.1.2 Massive MIMO 38
2.3.1.3 Ultra?]Dense Small Cells 39
2.3.1.4 M2M and D2D Communications 40
2.3.1.5 Cloud?]based Radio Access Network 42
2.3.1.6 Mobile Edge and Fog Computing 42
2.3.2 5G Mobile Core Network 44
2.3.2.1 Software Defined Networking 44
2.3.2.2 Network Function Virtualization 44
2.3.2.3 Cloud Computing 46
2.3.3 G End?]to?]End System 46
2.3.3.1 Network Slicing 46
2.3.3.2 Management and Orchestration 47
2.4 5G Standardization Activities 48
2.4.1 ITU Activities 48
2.4.1.1 ITU?]R 49
About the author
Madhusanka Liyanage, PhD, is a post-doctoral researcher at the Centre for Wireless Communications, University of Oulu, Finland. Ijaz Ahmad, MSc, is a PhD candidate at the University of Oulu, Finland. Ahmed Abro, MS, is an Enterprise Solutions Architect at VMware, Inc., United States. Andrei Gurtov, PhD, is a professor in the Department of Computer and Information Science, Linköping University, Sweden. Mika Ylianttila, PhD, is a professor at the Centre for Wireless Communications, University of Oulu, Finland.
Summary
The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices
Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem.
5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks.
Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book:
* Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it
* Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks
* Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views
* Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts
Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.
Product details
Customer reviews
No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.
Write a review
Thumbs up or thumbs down? Write your own review.