SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: A Comprehensive Guide to 5G Security

A Comprehensive Guide to 5G Security, 1. udgave
Søgbar e-bog

A Comprehensive Guide to 5G Security Vital Source e-bog

Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov og Mika Ylianttila
(2018)
John Wiley & Sons
1.339,00 kr.
Leveres umiddelbart efter køb
A Comprehensive Guide to 5G Security

A Comprehensive Guide to 5G Security

Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov og Mika Ylianttila
(2018)
Sprog: Engelsk
John Wiley & Sons, Limited
1.540,00 kr.
ikke på lager, Bestil nu og få den leveret
om ca. 10 hverdage

Detaljer om varen

  • 1. Udgave
  • Vital Source searchable e-book (Reflowable pages)
  • Udgiver: John Wiley & Sons (Januar 2018)
  • Forfattere: Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov og Mika Ylianttila
  • ISBN: 9781119293057

The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices

 Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem.

5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks.

Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book:

  • Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it
  • Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks
  • Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views
  • Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts
Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.
Licens varighed:
Bookshelf online: 5 år fra købsdato.
Bookshelf appen: ubegrænset dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 10 sider kan printes ad gangen
Copy: højest 2 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • Hardback: 480 sider
  • Udgiver: John Wiley & Sons, Limited (Marts 2018)
  • Forfattere: Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov og Mika Ylianttila
  • ISBN: 9781119293040

The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices

 Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem.

5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks.

Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book:

  • Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it
  • Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks
  • Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views
  • Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts
Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.
The Editors xvii About the Contributors xxi Foreword xxxiii Preface xxxv Acknowledgements xli
Part I 5G Security Overview 1 1 Evolution of Cellular Systems 3 Shahriar Shahabuddin, Sadiqur Rahaman, Faisal Rehman, Ijaz Ahmad, and Zaheer Khan
1.1 Introduction 3
1.2 Early Development 4
1.3 First Generation Cellular Systems 6
1.3.1 Advanced Mobile Phone Service 7
1.3.2 Security in 1G 7
1.4 Second Generation Cellular Systems 8
1.4.1 Global System for Mobile Communications 8
1.4.2 GSM Network Architecture 9
1.4.3 Code Division Multiple Access 10
1.4.4 Security in 2G 10
1.4.5 Security in GSM 11
1.4.5.1 IMSI 11
1.4.5.2 Ki 12
1.4.5.3 A3 Algorithm 12
1.4.5.4 A8 Algorithm 13
1.4.5.5 COMP128 14
1.4.5.6 A5 Algorithm 14
1.4.6 Security in IS]95 14
1.5 Third Generation Cellular Systems 15
1.5.1 CDMA 2000 15
1.5.2 UMTS WCDMA 15
1.5.3 UMTS Network Architecture 16
1.5.4 HSPA 17
1.5.5 Security in 3G 17
1.5.6 Security in CDMA2000 17
1.5.7 Security in UMTS 18
1.6 Cellular Systems beyond 3G 20
1.6.1 HSPA+ 20
1.6.2 Mobile WiMAX 20
1.6.3 LTE 21
1.6.3.1 Orthogonal Frequency Division Multiplexing (OFDM) 21
1.6.3.2 SC]FDE and SC]FDMA 21
1.6.3.3 Multi]antenna Technique 21
1.6.4 LTE Network Architecture 21
1.7 Fourth Generation Cellular Systems 22
1.7.1 Key Technologies of 4G 23
1.7.1.1 Enhanced MINO 23
1.7.1.2 Cooperative Multipoint Transmission and Reception for LTE]Advanced 23
1.7.1.3 Spectrum and Bandwidth Management 24
1.7.1.4 Carrier Aggregation 24
1.7.1.5 Relays 24
1.7.2 Network Architecture 24
1.7.3 Beyond 3G and 4G Cellular Systems Security 25
1.7.4 LTE Security Model 26
1.7.5 Security in WiMAX 26
1.8 Conclusion 27 References 28 2 5G Mobile Networks: Requirements, Enabling Technologies, and Research Activities 31 Van]Giang Nguyen, Anna Brunstrom, Karl]Johan Grinnemo, and Javid Taheri
2.1 Introduction 31
2.1.1 What is 5G? 31
2.1.1.1 From a System Architecture Perspective 32
2.1.1.2 From the Spectrum Perspective 32
2.1.1.3 From a User and Customer Perspective 32
2.1.2 Typical Use Cases 32
2.2 5G Requirements 33
2.2.1 High Data Rate and Ultra Low Latency 34
2.2.2 Massive Connectivity and Seamless Mobility 35
2.2.3 Reliability and High Availability 35
2.2.4 Flexibility and Programmability 36
2.2.5 Energy, Cost and Spectrum Efficiency 36
2.2.6 Security and Privacy 36
2.3 5G Enabling Technologies 37
2.3.1 5G Radio Access Network 38
2.3.1.1 mmWave Communication 38
2.3.1.2 Massive MIMO 38
2.3.1.3 Ultra]Dense Small Cells 39
2.3.1.4 M2M and D2D Communications 40
2.3.1.5 Cloud]based Radio Access Network 42
2.3.1.6 Mobile Edge and Fog Computing 42
2.3.2 5G Mobile Core Network 44
2.3.2.1 Software Defined Networking 44
2.3.2.2 Network Function Virtualization 44
2.3.2.3 Cloud Computing 46
2.3.3 G End]to]End System 46
2.3.3.1 Network Slicing 46
2.3.3.2 Management and Orchestration 47
2.4 5G Standardization Activities 48
2.4.1 ITU Activities 48
2.4.1.1 ITU]R 49
2.4.1.2 ITU]T 49
2.4.2 3GPP Activities 49
2.4.2.1 Pre]5G Phase 49
2.4.2.2 5G Phase I 50
2.4.2.3 5G Phase II 50
2.4.3 ETSI Activities 50
2.4.4 IEEE Activities 51
2.4.5 IETF Activities 52
2.5 5G Research Communities 52
2.5.1 European 5G Related Activities 52
2.5.1.1 5G Research in EU FP7 52
2.5.1.2 5G Research in EU H2020 52
2.5.1.3 5G Research in Celtic]Plus 53
2.5.2 Asian 5G Related Activities 53
2.5.2.1 South Korea: 5G Forum 53
2.5.2.2 Japan: 5GMF Forum 54
2.5.2.3 China: IMT]2020 5G Promotion Group 54
2.5.3 American 5G Related Activities 54
2.6 Conclusion 55
2.7 Acknowledgement 55 References 55 3 Mobile Networks Security Landscape 59 Ahmed Bux Abro
3.1 Introduction 59
3.2 Mobile Networks Security Landscape 59
3.2.1 Security Threats and Protection for 1G 61
3.2.2 Security Threats and Protection for 2G 61
3.2.3 Security Threats and Protection for 3G 63
3.2.4 Security Threats and Protection for 4G 63
3.2.4.1 LTE UE (User Equipment) Domain Security 64
3.2.4.2 LTE (Remote Access Network) Domain Security 65
3.2.4.3 LTE Core Network Domain Security 65
3.2.4.4 Security Threat Analysis for 4G 65
3.2.5 Security Threats and Protection for 5G 66
3.2.5.1 Next Generation Threat Landscape for 5G 68
3.2.5.2 IoT Threat Landscape 68
3.2.5.3 5G Evolved Security Model 68
3.2.5.4 5G Security Threat Analysis 69
3.3 Mobile Security Lifecycle Functions 70
3.3.1 Secure Device Management 71
3.3.2 Mobile OS and App Patch Management 71
3.3.3 Security Threat Analysis and Assessment 71
3.3.4 Security Monitoring 72
3.4 Conclusion 73 References 73 4 Design Principles for 5G Security 75 Ijaz Ahmad, Madhusanka Liyanage, Shahriar Shahabuddin, Mika Ylianttila, and Andrei Gurtov
4.1 Introduction 75
4.2 Overviews of Security Recommendations and Challenges 76
4.2.1 Security Recommendations by ITU]T 77
4.2.2 Security Threats and Recommendations by NGMN 78
4.2.3 Other Security Challenges 79
4.2.3.1 Security Challenges in the Access Network 79
4.2.3.2 DoS Attacks 79
4.2.3.3 Security Challenges in the Control Layer or Core Network 80
4.3 Novel Technologies for 5G Security 81
4.3.1 5G Security Leveraging NFV 82
4.3.2 Network Security Leveraging SDN 83
4.3.3 Security Challenges in SDN 84
4.3.3.1 Application Layer 84
4.3.3.2 Controller Layer 85
4.3.3.3 Infrastructure Layer 86
4.3.4 Security Solutions for SDN 86
4.3.4.1 Application Plane Security 86
4.3.4.2 Control Plane Security 87
4.3.4.3 Data Plane Security Solutions 87
4.4 Security in SDN]based Mobile Networks 88
4.4.1 Data Link Security 88
4.4.2 Control Channels Security 89
4.4.3 Traffic Monitoring 91
4.4.4 Access Control 91
4.4.5 Network Resilience 91
4.4.6 Security Systems and Firewalls 92
4.4.7 Network Security Automation 92
4.5 Conclusions and Future Directions 94
4.6 Acknowledgement 95 References 95 5 Cyber Security Business Models in 5G 99 Julius Francis Gomes, Marika Iivari, Petri Ahokangas, Lauri Isotalo, Bengt Sahlin, and Jan Melén
5.1 Introduction 99
5.2 The Context of Cyber Security Businesses 100
5.2.1 Types of Cyber Threat 101
5.2.2 The Cost of Cyber]Attacks 102
5.3 The Business Model Approach 103
5.3.1 The 4C Typology of the ICT Business Model 104
5.3.2 Business Models in the Context of Cyber Preparedness 105
5.4 The Business Case of Cyber Security in the Era of 5G 106
5.4.1 The Users and Issues of Cyber Security in 5G 108
5.4.2 Scenarios for 5G Security Provisioning 109
5.4.3 Delivering Cyber Security in 5G 110
5.5 Business Model Options in 5G Cyber Security 112
5.6 Acknowledgment 114 References 114
Part II 5G Network Security 117 6 Physical Layer Security 119 Simone Soderi, Lorenzo Mucchi, Matti Hämäläinen, Alessandro Piva, and Jari Iinatti
6.1 Introduction 119
6.1.1 Physical Layer Security in 5G Networks 120
6.1.2 Related Work 121
6.1.3 Motivation 121
6.2 WBPLSec System Model 123
6.2.1 Transmitter 124
6.2.2 Jamming Receiver 126
6.2.3 Secrecy Metrics 126
6.2.4 Secrecy Capacity of WBPLSec 128
6.2.5 Secrecy Capacity of iJAM 129
6.3 Outage Probability of Secrecy Capacity of a Jamming Receiver 131
6.3.1 Simulation Scenario for Secrecy Capacity 134
6.4 WBPLSec Applied to 5G networks 136
6.5 Conclusions 138 References 139 7 5G]WLAN Security 143 Satish Anamalamudi, Abdur Rashid Sangi, Mohammed Alkatheiri, Fahad T. Bin Muhaya, and Chang Liu
7.1
Chapter Overview 143
7.2 Introduction to WiFi]5G Networks Interoperability 143
7.2.1 WiFi (Wireless Local Area Network) 143
7.2.2 Interoperability of WiFi with 5G Networks 144
7.2.3 WiFi Security 144
7.3 Overview of Network Architecture for WiFi]5G Networks Interoperability 146
7.3.1 MAC Layer 147
7.3.2 Network Layer 147
7.3.3 Transport Layer 148
7.3.4 Application Layer 149
7.4 5G]WiFi Security Challenges 150
7.4.1 Security Challenges with Respect to a Large Number of Device Connectivity 151
7.4.2 Security Challenges in 5G Networks and WiFi 151
7.5 Security Consideration for Architectural Design of WiFi]5G Networks 156
7.5.1 User and Device Identity Confidentiality 156
7.5.2 Integrity 156
7.5.3 Mutual Authentication and Key Management 157
7.6 LiFi Networks 158
7.7 Introduction to LiFi]5G Networks Interoperability 159
7.8 5G]LiFi Security Challenges 160
7.8.1 Security Challenges with Respect to a Large Number of Device Connectivity 160
7.8.2 Security Challenges in 5G Networks and LiFi 160
7.9 Security Consideration for Architectural Design of
De oplyste priser er inkl. moms

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Trykt eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Bookshelf: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. søgning, overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 1825 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.