A Comprehensive Guide to 5G Security. (Record no. 134746)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 11368nam a22005293i 4500 |
001 - CONTROL NUMBER | |
control field | EBC5216619 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | MiAaPQ |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240729131707.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240724s2018 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119293088 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119293040 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (MiAaPQ)EBC5216619 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Au-PeEL)EBL5216619 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaPaEBR)ebr11496661 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1005779670 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MiAaPQ |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | MiAaPQ |
Modifying agency | MiAaPQ |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5103.2 .C649 2018 |
082 0# - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Liyanage, Madhusanka. |
245 12 - TITLE STATEMENT | |
Title | A Comprehensive Guide to 5G Security. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Newark : |
Name of producer, publisher, distributor, manufacturer | John Wiley & Sons, Incorporated, |
Date of production, publication, distribution, manufacture, or copyright notice | 2018. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | ©2018. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (483 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Intro -- Title Page -- Copyright Page -- Contents -- The Editors -- About the Contributors -- Foreword -- Preface -- Acknowledgements -- Part I 5G Security Overview -- Chapter 1 Evolution of Cellular Systems -- 1.1 Introduction -- 1.2 Early Development -- 1.3 First Generation Cellular Systems -- 1.3.1 Advanced Mobile Phone Service -- 1.3.2 Security in 1G -- 1.4 Second Generation Cellular Systems -- 1.4.1 Global System for Mobile Communications -- 1.4.2 GSM Network Architecture -- 1.4.3 Code Division Multiple Access -- 1.4.4 Security in 2G -- 1.4.5 Security in GSM -- 1.4.6 Security in IS‐95 -- 1.5 Third Generation Cellular Systems -- 1.5.1 CDMA 2000 -- 1.5.2 UMTS WCDMA -- 1.5.3 UMTS Network Architecture -- 1.5.4 HSPA -- 1.5.5 Security in 3G -- 1.5.6 Security in CDMA2000 -- 1.5.7 Security in UMTS -- 1.6 Cellular Systems beyond 3G -- 1.6.1 HSPA+ -- 1.6.2 Mobile WiMAX -- 1.6.3 LTE -- 1.6.4 LTE Network Architecture -- 1.7 Fourth Generation Cellular Systems -- 1.7.1 Key Technologies of 4G -- 1.7.2 Network Architecture -- 1.7.3 Beyond 3G and 4G Cellular Systems Security -- 1.7.4 LTE Security Model -- 1.7.5 Security in WiMAX -- 1.8 Conclusion -- References -- Chapter 2 5G Mobile Networks: Requirements, Enabling Technologies, and Research Activities -- 2.1 Introduction -- 2.1.1 What is 5G? -- 2.1.2 Typical Use Cases -- 2.2 5G Requirements -- 2.2.1 High Data Rate and Ultra Low Latency -- 2.2.2 Massive Connectivity and Seamless Mobility -- 2.2.3 Reliability and High Availability -- 2.2.4 Flexibility and Programmability -- 2.2.5 Energy, Cost and Spectrum Efficiency -- 2.2.6 Security and Privacy -- 2.3 5G Enabling Technologies -- 2.3.1 5G Radio Access Network -- 2.3.2 5G Mobile Core Network -- 2.3.3 5G End-to-End System -- 2.4 5G Standardization Activities -- 2.4.1 ITU Activities -- 2.4.2 3GPP Activities -- 2.4.3 ETSI Activities -- 2.4.4 IEEE Activities. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 2.4.5 IETF Activities -- 2.5 5G Research Communities -- 2.5.1 European 5G Related Activities -- 2.5.2 Asian 5G Related Activities -- 2.5.3 American 5G Related Activities -- 2.6 Conclusion -- 2.7 Acknowledgement -- References -- Chapter 3 Mobile Networks Security Landscape -- 3.1 Introduction -- 3.2 Mobile Networks Security Landscape -- 3.2.1 Security Threats and Protection for 1G -- 3.2.2 Security Threats and Protection for 2G -- 3.2.3 Security Threats and Protection for 3G -- 3.2.4 Security Threats and Protection for 4G -- 3.2.5 Security Threats and Protection for 5G -- 3.3 Mobile Security Lifecycle Functions -- 3.3.1 Secure Device Management -- 3.3.2 Mobile OS and App Patch Management -- 3.3.3 Security Threat Analysis and Assessment -- 3.3.4 Security Monitoring -- 3.4 Conclusion -- References -- Chapter 4 Design Principles for 5G Security -- 4.1 Introduction -- 4.2 Overviews of Security Recommendations and Challenges -- 4.2.1 Security Recommendations by ITU-T -- 4.2.2 Security Threats and Recommendations by NGMN -- 4.2.3 Other Security Challenges -- 4.3 Novel Technologies for 5G Security -- 4.3.1 5G Security Leveraging NFV -- 4.3.2 Network Security Leveraging SDN -- 4.3.3 Security Challenges in SDN -- 4.3.4 Security Solutions for SDN -- 4.4 Security in SDN‐based Mobile Networks -- 4.4.1 Data Link Security -- 4.4.2 Control Channels Security -- 4.4.3 Traffic Monitoring -- 4.4.4 Access Control -- 4.4.5 Network Resilience -- 4.4.6 Security Systems and Firewalls -- 4.4.7 Network Security Automation -- 4.5 Conclusions and Future Directions -- 4.6 Acknowledgement -- References -- Chapter 5 Cyber Security Business Models in 5G -- 5.1 Introduction -- 5.2 The Context of Cyber Security Businesses -- 5.2.1 Types of Cyber Threat -- 5.2.2 The Cost of Cyber-Attacks -- 5.3 The Business Model Approach -- 5.3.1 The 4C Typology of the ICT Business Model. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 5.3.2 Business Models in the Context of Cyber Preparedness -- 5.4 The Business Case of Cyber Security in the Era of 5G -- 5.4.1 The Users and Issues of Cyber Security in 5G -- 5.4.2 Scenarios for 5G Security Provisioning -- 5.4.3 Delivering Cyber Security in 5G -- 5.5 Business Model Options in 5G Cyber Security -- 5.6 Acknowledgement -- References -- Part II 5G Network Security -- Chapter 6 Physical Layer Security -- 6.1 Introduction -- 6.1.1 Physical Layer Security in 5G Networks -- 6.1.2 Related Work -- 6.1.3,Algorithm 6.1 Motivation -- 6.2 WBPLSec System Model -- 6.2.1 Transmitter -- 6.2.2 Jamming Receiver -- 6.2.3 Secrecy Metrics -- 6.2.4 Secrecy Capacity of WBPLSec -- 6.2.5 Secrecy Capacity of iJAM -- 6.3 Outage Probability of Secrecy Capacity of a Jamming Receiver -- 6.3.1 Simulation Scenario for Secrecy Capacity -- 6.4 WBPLSec Applied to 5G networks -- 6.5 Conclusions -- References -- Chapter 7 5G-WLAN Security -- 7.1 Chapter Overview -- 7.2 Introduction to WiFi-5G Networks Interoperability -- 7.2.1 WiFi (Wireless Local Area Network) -- 7.2.2 Interoperability of WiFi with 5G Networks -- 7.2.3 WiFi Security -- 7.3 Overview of Network Architecture for WiFi-5G Networks Interoperability -- 7.3.1 MAC Layer -- 7.3.2 Network Layer -- 7.3.3 Transport Layer -- 7.3.4 Application Layer -- 7.4 5G-WiFi Security Challenges -- 7.4.1 WIFI-5G Security Challenges with Respect to a Large Number of Device Connectivity -- 7.4.2 Security Challenges in 5G Networks and WiFi -- 7.5 Security Consideration for Architectural Design of WiFi-5G Networks -- 7.5.1 User and Device Identity Confidentiality -- 7.5.2 Integrity -- 7.5.3 Mutual Authentication and Key Management -- 7.6 LiFi Networks -- 7.7 Introduction to LiFi-5G Networks Interoperability -- 7.8 5G-LiFi Security Challenges -- 7.8.1 LIFI-5G Security Challenges with Respect to a Large Number of Device Connectivity. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 7.8.2 Security Challenges in 5G Networks and LiFi -- 7.9 Security Consideration for Architectural Design of LiFi-5G Networks -- 7.10 Conclusion and Future Work -- References -- Chapter 8 Safety of 5G Network Physical Infrastructures -- 8.1 Introduction -- 8.2 Historical Development -- 8.2.1 Typology -- 8.2.2 Codes -- 8.2.3 Outlook -- 8.3 Structural Design Philosophy -- 8.3.1 Basis -- 8.3.2 Actions -- 8.3.3 Structural Analysis -- 8.3.4 Steel Design Verifications -- 8.4 Survey of Problems -- 8.4.1 General -- 8.4.2 Design Failures -- 8.4.3 Maintenance Failures -- 8.4.4 Vandalism or Terrorism Failures -- 8.5 Opportunities and Recommendations -- 8.6 Acknowledgement -- References -- Chapter 9 Customer Edge Switching: A Security Framework for 5G -- 9.1 Introduction -- 9.2 State-of-the-art in Mobile Networks Security -- 9.2.1 Mobile Network Challenges and Principles of Security Framework -- 9.2.2 Trust Domains and Trust Processing -- 9.3 CES Security Framework -- 9.3.1 DNS to Initiate Communication -- 9.3.2 CETP Policy-based Communication -- 9.3.3 Policy Architecture -- 9.3.4 CES Security Mechanisms -- 9.3.5 Realm Gateway -- 9.3.6 RGW Security Mechanisms -- 9.4 Evaluation of CES Security -- 9.4.1 Evaluating the CETP Policy-based Communication -- 9.4.2 Evaluation of RGW Security -- 9.5 Deployment in 5G Networks -- 9.5.1 Use Case 1: Mobile Broadband -- 9.5.2 Use Case 2: Corporate Gateway -- 9.5.3 Use Case 3: National CERT Centric Trust Domain -- 9.5.4 Use Case 4: Industrial Internet for Road Traffic and Transport -- 9.6 Conclusion -- References -- Chapter 10 Software Defined Security Monitoring in 5G Networks -- 10.1 Introduction -- 10.2 Existing Monitoring Techniques -- 10.3 Limitations of Current Monitoring Techniques -- 10.4 Use of Monitoring in 5G -- 10.5 Software-Defined Monitoring Architecture -- 10.6 Expected Advantages of Software Defined Monitoring. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 10.7 Expected Challenges in Software Defined Monitoring -- 10.8 Conclusion -- References -- Part III 5G Device and User Security -- Chapter 11 IoT Security -- 11.1 Introduction -- 11.2 Related Work -- 11.3 Literature Overview and Research Motivation -- 11.3.1 IoT Devices, Services and Attacks on Them -- 11.3.2 Research Motivation -- 11.4 Distributed Security Platform -- 11.4.1 Robot Data Classification -- 11.4.2 Robot Attack Classification -- 11.4.3 Robot Security Platform -- 11.5 Mobile Cloud Robot Security Scenarios -- 11.5.1 Robot with SIMcard -- 11.5.2 SIMless Robot -- 11.5.3 Robot Attack -- 11.5.4 Robot Communication -- 11.6 Conclusion -- References -- Chapter 12 User Privacy, Identity and Trust in 5G -- 12.1 Introduction -- 12.2 Background -- 12.3 User Privacy -- 12.3.1 Data Privacy -- 12.3.2 Location Privacy -- 12.3.3 Identity Privacy -- 12.4 Identity Management -- 12.5 Trust Models -- 12.6 Discussion -- 12.7 Conclusion -- References -- Chapter 13 5G Positioning: Security and Privacy Aspects -- 13.1 Introduction -- 13.2 Outdoor versus Indoor Positioning Technologies -- 13.3 Passive versus Active Positioning -- 13.4 Brief Overview of 5G Positioning Mechanisms -- 13.5 Survey of Security Threats and Privacy Issues in 5G Positioning -- 13.5.1 Security Threats in 5G Positioning -- 13.6 Main Privacy Concerns -- 13.7 Passive versus Active Positioning Concepts -- 13.8 Physical-Layer Based Security Enhancements Mechanisms for Positioning in 5G -- 13.8.1 Reliability Monitoring and Outlier Detection Mechanisms -- 13.8.2 Detection, Location and Estimation of Interference Signals -- 13.8.3 Backup Systems -- 13.9 Enhancing Trustworthiness -- 13.10 Cryptographic Techniques for Security and Privacy of Positioning -- 13.10.1 Cryptographic Authentication in Positioning -- 13.10.2 Cryptographic Distance-Bounding. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 13.10.3 Cryptographic Techniques for Privacy-Preserving Location-based Services. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on publisher supplied metadata and other sources. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Mobile communication systems-Security measures. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Ahmad, Ijaz. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Abro, Ahmed Bux. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Gurtov, Andrei. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Ylianttila, Mika. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Liyanage, Madhusanka |
Title | A Comprehensive Guide to 5G Security |
Place, publisher, and date of publication | Newark : John Wiley & Sons, Incorporated,c2018 |
International Standard Book Number | 9781119293040 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) | |
Corporate name or jurisdiction name as entry element | ProQuest (Firm) |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=5216619">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=5216619</a> |
Public note | Click to View |
No items available.