Liyanage, Madhusanka.
A Comprehensive Guide to 5G Security.
- 1st ed.
- 1 online resource (483 pages)
Intro -- Title Page -- Copyright Page -- Contents -- The Editors -- About the Contributors -- Foreword -- Preface -- Acknowledgements -- Part I 5G Security Overview -- Chapter 1 Evolution of Cellular Systems -- 1.1 Introduction -- 1.2 Early Development -- 1.3 First Generation Cellular Systems -- 1.3.1 Advanced Mobile Phone Service -- 1.3.2 Security in 1G -- 1.4 Second Generation Cellular Systems -- 1.4.1 Global System for Mobile Communications -- 1.4.2 GSM Network Architecture -- 1.4.3 Code Division Multiple Access -- 1.4.4 Security in 2G -- 1.4.5 Security in GSM -- 1.4.6 Security in IS‐95 -- 1.5 Third Generation Cellular Systems -- 1.5.1 CDMA 2000 -- 1.5.2 UMTS WCDMA -- 1.5.3 UMTS Network Architecture -- 1.5.4 HSPA -- 1.5.5 Security in 3G -- 1.5.6 Security in CDMA2000 -- 1.5.7 Security in UMTS -- 1.6 Cellular Systems beyond 3G -- 1.6.1 HSPA+ -- 1.6.2 Mobile WiMAX -- 1.6.3 LTE -- 1.6.4 LTE Network Architecture -- 1.7 Fourth Generation Cellular Systems -- 1.7.1 Key Technologies of 4G -- 1.7.2 Network Architecture -- 1.7.3 Beyond 3G and 4G Cellular Systems Security -- 1.7.4 LTE Security Model -- 1.7.5 Security in WiMAX -- 1.8 Conclusion -- References -- Chapter 2 5G Mobile Networks: Requirements, Enabling Technologies, and Research Activities -- 2.1 Introduction -- 2.1.1 What is 5G? -- 2.1.2 Typical Use Cases -- 2.2 5G Requirements -- 2.2.1 High Data Rate and Ultra Low Latency -- 2.2.2 Massive Connectivity and Seamless Mobility -- 2.2.3 Reliability and High Availability -- 2.2.4 Flexibility and Programmability -- 2.2.5 Energy, Cost and Spectrum Efficiency -- 2.2.6 Security and Privacy -- 2.3 5G Enabling Technologies -- 2.3.1 5G Radio Access Network -- 2.3.2 5G Mobile Core Network -- 2.3.3 5G End-to-End System -- 2.4 5G Standardization Activities -- 2.4.1 ITU Activities -- 2.4.2 3GPP Activities -- 2.4.3 ETSI Activities -- 2.4.4 IEEE Activities. 2.4.5 IETF Activities -- 2.5 5G Research Communities -- 2.5.1 European 5G Related Activities -- 2.5.2 Asian 5G Related Activities -- 2.5.3 American 5G Related Activities -- 2.6 Conclusion -- 2.7 Acknowledgement -- References -- Chapter 3 Mobile Networks Security Landscape -- 3.1 Introduction -- 3.2 Mobile Networks Security Landscape -- 3.2.1 Security Threats and Protection for 1G -- 3.2.2 Security Threats and Protection for 2G -- 3.2.3 Security Threats and Protection for 3G -- 3.2.4 Security Threats and Protection for 4G -- 3.2.5 Security Threats and Protection for 5G -- 3.3 Mobile Security Lifecycle Functions -- 3.3.1 Secure Device Management -- 3.3.2 Mobile OS and App Patch Management -- 3.3.3 Security Threat Analysis and Assessment -- 3.3.4 Security Monitoring -- 3.4 Conclusion -- References -- Chapter 4 Design Principles for 5G Security -- 4.1 Introduction -- 4.2 Overviews of Security Recommendations and Challenges -- 4.2.1 Security Recommendations by ITU-T -- 4.2.2 Security Threats and Recommendations by NGMN -- 4.2.3 Other Security Challenges -- 4.3 Novel Technologies for 5G Security -- 4.3.1 5G Security Leveraging NFV -- 4.3.2 Network Security Leveraging SDN -- 4.3.3 Security Challenges in SDN -- 4.3.4 Security Solutions for SDN -- 4.4 Security in SDN‐based Mobile Networks -- 4.4.1 Data Link Security -- 4.4.2 Control Channels Security -- 4.4.3 Traffic Monitoring -- 4.4.4 Access Control -- 4.4.5 Network Resilience -- 4.4.6 Security Systems and Firewalls -- 4.4.7 Network Security Automation -- 4.5 Conclusions and Future Directions -- 4.6 Acknowledgement -- References -- Chapter 5 Cyber Security Business Models in 5G -- 5.1 Introduction -- 5.2 The Context of Cyber Security Businesses -- 5.2.1 Types of Cyber Threat -- 5.2.2 The Cost of Cyber-Attacks -- 5.3 The Business Model Approach -- 5.3.1 The 4C Typology of the ICT Business Model. 5.3.2 Business Models in the Context of Cyber Preparedness -- 5.4 The Business Case of Cyber Security in the Era of 5G -- 5.4.1 The Users and Issues of Cyber Security in 5G -- 5.4.2 Scenarios for 5G Security Provisioning -- 5.4.3 Delivering Cyber Security in 5G -- 5.5 Business Model Options in 5G Cyber Security -- 5.6 Acknowledgement -- References -- Part II 5G Network Security -- Chapter 6 Physical Layer Security -- 6.1 Introduction -- 6.1.1 Physical Layer Security in 5G Networks -- 6.1.2 Related Work -- 6.1.3,Algorithm 6.1 Motivation -- 6.2 WBPLSec System Model -- 6.2.1 Transmitter -- 6.2.2 Jamming Receiver -- 6.2.3 Secrecy Metrics -- 6.2.4 Secrecy Capacity of WBPLSec -- 6.2.5 Secrecy Capacity of iJAM -- 6.3 Outage Probability of Secrecy Capacity of a Jamming Receiver -- 6.3.1 Simulation Scenario for Secrecy Capacity -- 6.4 WBPLSec Applied to 5G networks -- 6.5 Conclusions -- References -- Chapter 7 5G-WLAN Security -- 7.1 Chapter Overview -- 7.2 Introduction to WiFi-5G Networks Interoperability -- 7.2.1 WiFi (Wireless Local Area Network) -- 7.2.2 Interoperability of WiFi with 5G Networks -- 7.2.3 WiFi Security -- 7.3 Overview of Network Architecture for WiFi-5G Networks Interoperability -- 7.3.1 MAC Layer -- 7.3.2 Network Layer -- 7.3.3 Transport Layer -- 7.3.4 Application Layer -- 7.4 5G-WiFi Security Challenges -- 7.4.1 WIFI-5G Security Challenges with Respect to a Large Number of Device Connectivity -- 7.4.2 Security Challenges in 5G Networks and WiFi -- 7.5 Security Consideration for Architectural Design of WiFi-5G Networks -- 7.5.1 User and Device Identity Confidentiality -- 7.5.2 Integrity -- 7.5.3 Mutual Authentication and Key Management -- 7.6 LiFi Networks -- 7.7 Introduction to LiFi-5G Networks Interoperability -- 7.8 5G-LiFi Security Challenges -- 7.8.1 LIFI-5G Security Challenges with Respect to a Large Number of Device Connectivity. 7.8.2 Security Challenges in 5G Networks and LiFi -- 7.9 Security Consideration for Architectural Design of LiFi-5G Networks -- 7.10 Conclusion and Future Work -- References -- Chapter 8 Safety of 5G Network Physical Infrastructures -- 8.1 Introduction -- 8.2 Historical Development -- 8.2.1 Typology -- 8.2.2 Codes -- 8.2.3 Outlook -- 8.3 Structural Design Philosophy -- 8.3.1 Basis -- 8.3.2 Actions -- 8.3.3 Structural Analysis -- 8.3.4 Steel Design Verifications -- 8.4 Survey of Problems -- 8.4.1 General -- 8.4.2 Design Failures -- 8.4.3 Maintenance Failures -- 8.4.4 Vandalism or Terrorism Failures -- 8.5 Opportunities and Recommendations -- 8.6 Acknowledgement -- References -- Chapter 9 Customer Edge Switching: A Security Framework for 5G -- 9.1 Introduction -- 9.2 State-of-the-art in Mobile Networks Security -- 9.2.1 Mobile Network Challenges and Principles of Security Framework -- 9.2.2 Trust Domains and Trust Processing -- 9.3 CES Security Framework -- 9.3.1 DNS to Initiate Communication -- 9.3.2 CETP Policy-based Communication -- 9.3.3 Policy Architecture -- 9.3.4 CES Security Mechanisms -- 9.3.5 Realm Gateway -- 9.3.6 RGW Security Mechanisms -- 9.4 Evaluation of CES Security -- 9.4.1 Evaluating the CETP Policy-based Communication -- 9.4.2 Evaluation of RGW Security -- 9.5 Deployment in 5G Networks -- 9.5.1 Use Case 1: Mobile Broadband -- 9.5.2 Use Case 2: Corporate Gateway -- 9.5.3 Use Case 3: National CERT Centric Trust Domain -- 9.5.4 Use Case 4: Industrial Internet for Road Traffic and Transport -- 9.6 Conclusion -- References -- Chapter 10 Software Defined Security Monitoring in 5G Networks -- 10.1 Introduction -- 10.2 Existing Monitoring Techniques -- 10.3 Limitations of Current Monitoring Techniques -- 10.4 Use of Monitoring in 5G -- 10.5 Software-Defined Monitoring Architecture -- 10.6 Expected Advantages of Software Defined Monitoring. 10.7 Expected Challenges in Software Defined Monitoring -- 10.8 Conclusion -- References -- Part III 5G Device and User Security -- Chapter 11 IoT Security -- 11.1 Introduction -- 11.2 Related Work -- 11.3 Literature Overview and Research Motivation -- 11.3.1 IoT Devices, Services and Attacks on Them -- 11.3.2 Research Motivation -- 11.4 Distributed Security Platform -- 11.4.1 Robot Data Classification -- 11.4.2 Robot Attack Classification -- 11.4.3 Robot Security Platform -- 11.5 Mobile Cloud Robot Security Scenarios -- 11.5.1 Robot with SIMcard -- 11.5.2 SIMless Robot -- 11.5.3 Robot Attack -- 11.5.4 Robot Communication -- 11.6 Conclusion -- References -- Chapter 12 User Privacy, Identity and Trust in 5G -- 12.1 Introduction -- 12.2 Background -- 12.3 User Privacy -- 12.3.1 Data Privacy -- 12.3.2 Location Privacy -- 12.3.3 Identity Privacy -- 12.4 Identity Management -- 12.5 Trust Models -- 12.6 Discussion -- 12.7 Conclusion -- References -- Chapter 13 5G Positioning: Security and Privacy Aspects -- 13.1 Introduction -- 13.2 Outdoor versus Indoor Positioning Technologies -- 13.3 Passive versus Active Positioning -- 13.4 Brief Overview of 5G Positioning Mechanisms -- 13.5 Survey of Security Threats and Privacy Issues in 5G Positioning -- 13.5.1 Security Threats in 5G Positioning -- 13.6 Main Privacy Concerns -- 13.7 Passive versus Active Positioning Concepts -- 13.8 Physical-Layer Based Security Enhancements Mechanisms for Positioning in 5G -- 13.8.1 Reliability Monitoring and Outlier Detection Mechanisms -- 13.8.2 Detection, Location and Estimation of Interference Signals -- 13.8.3 Backup Systems -- 13.9 Enhancing Trustworthiness -- 13.10 Cryptographic Techniques for Security and Privacy of Positioning -- 13.10.1 Cryptographic Authentication in Positioning -- 13.10.2 Cryptographic Distance-Bounding. 13.10.3 Cryptographic Techniques for Privacy-Preserving Location-based Services.
9781119293088
Mobile communication systems-Security measures.
Electronic books.
TK5103.2 .C649 2018
005.8