Preface

The emergence of smartphones and tablets coupled with broadband wireless connectivity has changed our lives. More demands on high throughput, low latency, high‐speed mobility and new services drive the development of 5G. The first commercial networks of 5G are expected for deployment by 2020, three years ahead of writing this book. However, initial proof‐of‐concept deployments are announced already for 2018. While multiple books already exist on 5G, this is the first book, to our knowledge that focuses on security aspects of future 5G ecosystem.

The book provides a reference material to a comprehensive study of 5G security. It offers an insight into the current and future threats to mobile networks and mechanisms to protect it. It covers the critical lifecycle functions and stages of 5G security, and how to build an effective security architecture for 5G based mobile networks. It addresses mobile network security based on Network‐centricity, Device‐centricity, Information‐centricity and most importantly, People‐Centricity views.

This book offers security considerations for all relative stakeholders of mobile networks, such as mobile network operators (MNOs), mobile virtual network operators (MVNOs), mobile users, wireless users, Internet‐of‐Things (IoT) and cybersecurity experts, security researchers and engineers.

5G Mobile Networks

5G networks are not only expected to be faster, but provide a backbone for many new services for Networked Society, such as IoT and ...

Get A Comprehensive Guide to 5G Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.