Book description
The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices
Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem.
5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks.
Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book:
- Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it
- Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks
- Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views
- Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts
Table of contents
- Cover
- Title Page
- The Editors
- About the Contributors
- Foreword
- Preface
- Acknowledgements
- Part I: 5G Security Overview
-
Part II: 5G Network Security
- 6 Physical Layer Security
-
7 5G‐WLAN Security
- 7.1 Chapter Overview
- 7.2 Introduction to WiFi‐5G Networks Interoperability
- 7.3 Overview of Network Architecture for WiFi‐5G Networks Interoperability
- 7.4 5G‐WiFi Security Challenges
- 7.5 Security Consideration for Architectural Design of WiFi‐5G Networks
- 7.6 LiFi Networks
- 7.7 Introduction to LiFi‐5G Networks Interoperability
- 7.8 5G‐LiFi Security Challenges
- 7.9 Security Consideration for Architectural Design of LiFi‐5G Networks
- 7.10 Conclusion and Future Work
- References
- 8 Safety of 5G Network Physical Infrastructures
- 9 Customer Edge Switching
-
10 Software Defined Security Monitoring in 5G Networks
- 10.1 Introduction
- 10.2 Existing Monitoring Techniques
- 10.3 Limitations of Current Monitoring Techniques
- 10.4 Use of Monitoring in 5G
- 10.5 Software‐Defined Monitoring Architecture
- 10.6 Expected Advantages of Software Defined Monitoring
- 10.7 Expected Challenges in Software Defined Monitoring
- 10.8 Conclusion
- References
-
Part III: 5G Device and User Security
- 11 IoT Security
- 12 User Privacy, Identity and Trust in 5G
-
13 5G Positioning
- 13.1 Introduction
- 13.2 Outdoor versus Indoor Positioning Technologies
- 13.3 Passive versus Active Positioning
- 13.4 Brief Overview of 5G Positioning Mechanisms
- 13.5 Survey of Security Threats and Privacy Issues in 5G Positioning
- 13.6 Main Privacy Concerns
- 13.7 Passive versus Active Positioning Concepts
- 13.8 Physical‐Layer Based Security Enhancements Mechanisms for Positioning in 5G
- 13.9 Enhancing Trustworthiness
- 13.10 Cryptographic Techniques for Security and Privacy of Positioning
- 13.11 Legislation on User Location Privacy in 5G
- 13.12 Landscape of the European and International Projects related to Secure Positioning
- References
-
Part IV: 5G Cloud and Virtual Network Security
- 14 Mobile Virtual Network Operators (MVNO) Security
- 15 NFV and NFV-based Security Services
- 16 Cloud and MEC Security
-
17 Regulatory Impact on 5G Security and Privacy
- 17.1 Introduction
- 17.2 Regulatory Objectives for Security and Privacy
- 17.3 Legal Framework for Security and Privacy
- 17.4 Security and Privacy Issues in New 5G Technologies
- 17.5 Relevance Assessment of Security and Privacy Issues for Regulation
- 17.6 Analysis of Potential Regulatory Approaches
- 17.7 Summary of Issues and Impact of New Technologies on Security and Privacy Regulation
- References
- Index
- End User License Agreement
Product information
- Title: A Comprehensive Guide to 5G Security
- Author(s):
- Release date: March 2018
- Publisher(s): Wiley
- ISBN: 9781119293040
You might also like
book
Cyber Security and Network Security
CYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, …
book
Network Security Strategies
Build a resilient network and prevent advanced cyber attacks and breaches Key Features Explore modern cybersecurity …
video
Linux Security and Hardening, The Practical Security Guide
Keep yourself and your company out of the news by protecting your Linux systems from hackers, …
book
Network Security Assessment, 3rd Edition
How secure is your network? The best way to find out is to attack it, using …