The Wiley 5G REF: Security

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

From the Section Editor’s Foreword by Dr. Madhusanka Liyanage, University College Dublin, Ireland. The Wiley 5G Ref: Security offers a stellar collection of articles selected from the online-only Work, The Wiley 5G Reference. It aims to provide a solid educational foundation for researchers and practitioners in the field of 5G Security and Privacy to expand their knowledge base by including the latest developments in these disciplines. The book introduces the security landscape of 5G, and significant security and privacy risks associated with the 5G networks. Then, the security solutions for different segments of the 5G network, i.e., radio network, edge network, access network, and core network, are discussed. Since 5G is developed based on network softwarization, security threats associated with key network softwarization technologies such as SDN, NFV, NS, and MEC are also presented in detail. Then, the security issues related to the new 5G and IoT services are delivered. Finally, a detailed discussion on the privacy of 5G networks is presented by considering Datafied Society. Written by leading experts in security and privacy for the telecommunication network, this book is intended to provide additional learning opportunities for a wide range of readers, from graduate-level students to seasoned engineering professionals. We are confident that this book and the entire collection of selected articles will continue Wiley’s tradition of excellence in technical publishing and provide a lasting and positive contribution to the teaching and practice of security and privacy of 5G and beyond networks.

Author(s): Rahim Tafazolli, Chin-Liang Wang, Periklis Chatzimisios, Madhusanka Liyanage
Edition: 1
Publisher: Wiley
Year: 2021

Language: English
Pages: 336
Tags: 5G, security, SDN, NFV, NS, MEC

Cover
Title Page
Copyright
Contents
Foreword
List of Contributors
Chapter 1 5G Mobile Networks Security Landscape and Major Risks
Introduction
4G to 5G: A Paradigm Shift
5G System Architecture
Salient Features of 5G Network
The Threat Landscape and Security Roadmap
5G Network Threat Surface
Inspecting 3GPP Security Proposals
Security Research Groups and Visions
Why Securing 5G is Challenging?
Billions of Hackable IoT Devices
The Convergence of IT and Telecom Infrastructure
Open‐source Softwarization
AI vs AI
Real‐time E2E Security Monitoring at Scale
Physical Layer Security
Can 3GPP Recommendations Solely Secure the 5GS?
Current State of the Arts and Open Research Areas
Conclusion
Acronyms
Related Articles
References
Further Reading
Chapter 2 SDMN Security
Software‐defined Mobile Network (SDMN) Security
Introduction
SDN Concepts
SDN Vulnerabilities
SDN Security
Security Function Implementations
Advanced Detection Algorithms
Data Plane Extensions
Security Monitoring and Policy Enforcement
Conclusion and Future Trends
Related Articles
References
Further Reading
Chapter 3 5G Security – Complex Challenges
Introduction 5G Security Building Blocks
Old Challenges in New Context for 5G
New Security Research Challenges for 5G
Trust
Dimension 1: Trust Stack
Dimension 2: E2E Trust
Dimension 3: Supply Chain Integrity
Dimension 4: Dynamicity
Malware in Mobile Core Networks
Measuring Security
Need for a Comprehensive and Regular Risk Management Approach
Status Regulatory Approaches for Risk Management
How to Proceed Today in 5G Risk Management Approach
Latest Proposal for 5G Risk Management
Summary
Related Articles
References
Further Reading
Chapter 4 Physical‐Layer Security for 5G and Beyond
Introduction
Notion on Physical‐Layer Security
Secrecy Performance Metrics
Secrecy Capacity
Secrecy Outage Probability
Alternative Secrecy Outage Formulation
Fractional Equivocation‐Based Metrics
Intercept Probability
Probability of Strictly Positive Secrecy Capacity
Physical‐Layer Security Techniques
Artificial Noise Generation
Multiantenna Diversity
Cooperative Diversity
Trusted Relays
Untrusted Relays
Physical‐Layer Authentication and Secret‐Key Generation
Physical‐Layer Key Generation
Physical‐Layer Security for 5G Technologies
Massive MIMO
mmWave Communications
Full‐Duplex Communications
Nonorthogonal Multiple Access
Conclusions and Future Challenges
Practical Channel Models
Secure Waveforms
Physical‐Layer Security in Terterahertz communications
Physical‐Layer Security for UAV‐Aided Communications
Machine‐Learning Techniques for Physical‐Layer Authentication
Acknowledgment
Related Article
References
Further Reading
Chapter 5 Security for Handover and D2D Communication in 5G HetNets
Introduction
Security Architecture Overview
3GPP 5G Network Architecture
3GPP 5G Security Architecture
Security Attacks and Mechanisms in 5G
Attacks in 5G
Eavesdropping and Traffic Analysis
Jamming
DoS and DDoS
Man in the Middle Attack
Key Security Technologies in 5G
Software‐Defined Networking (SDN)
Heterogeneous Networks
Security Mechanisms in 5G
Authentication
Cryptography
Confidentiality
Availability
Integrity
Key Management
Security Evaluations Techniques
Security in 5G Heterogeneous Networks
Handover Authentication Security
D2D Group Authentication Security
Conclusions
Related Articles
References
Further Reading
Chapter 6 Authentication and Access Control for 5G
Introduction
Basics of Authentication and Access Control
Overall Architecture of the AAC in 3G, 4G, and 5G
5G Network Architecture
Authentication and Access Control in 5G
5G‐AKA Protocol
Security Flaws in 5G‐AKA
New Concepts in 5G
5G‐Specific Use Cases and Requirements
Motivated Use Cases
Derived Requirements
AAC Proposal in Cellular Networks
Summary
Related Articles
References
Further Reading
Chapter 7 5G‐Core Network Security
Introduction
5G Design Principles and the Core Network
Security of Core Network
Overview of 5G Security Architecture
Security of Core Network Elements
Security of Interfaces/Protocols
UE and Network Authentication
Security of Emerging New Network Technologies
Security of Cloud Platforms
Security of SDN
Security of Network Virtualization
Discussion and Conclusion
Related Article
References
Further Reading
Chapter 8 MEC and Cloud Security
Introduction
5G MEC‐Cloud Overview
Edge and Cloud Computing for 5G
Features and Synergies
MEC and Cloud Security in 5G
Threat Models
Network Infrastructure
Core Servers
Edge Servers
Virtualization
End Devices
Security Challenges and Considerations for Integrating MEC and Cloud to 5G
Hardware Component
Connected Devices
System Software
Networking and Communication
MEC‐Cloud Service
Distributed Logging at Scale
Open Research Directions
Conclusions
References
Further Reading/Resources
Chapter 9 Security in Network Slicing
Introduction
Network Slicing Architecture
Security Threats of NS High‐Level Functional Roles
Security Considerations in Network Slicing and Related Work
Security Considerations in Network Slicing
State of the Art for NS Security
Future Research Directions
Artificial Intelligence
One Slice for Security
Context‐Aware Security
Security Orchestration and Automation
Security‐By‐Design
Security‐as‐a‐Service
Conclusions
References
Further Reading
Chapter 10 VNF Placement and Sharing in NFV‐Based Cellular Networks
Introduction
Related Issues
System Model and Decisions to Make
Relevant Quantities for VNF Placement and Sharing
Objective and Constraints
The FlexShare Algorithm
Placement Decisions
Priority, Scaling, and Pruning
Reference Scenarios and Benchmark Strategies
Synthetic Scenario
Real‐World Scenario
Benchmark Strategies
Numerical Results
Conclusions
Acknowledgment
References
Further Reading
Chapter 11 Security Monitoring and Management in 5G
Introduction
Network Security Monitoring
Software‐Defined Security
Network Slicing
Cognitive Network Security Management
Optimization Techniques
Conclusions
Related Article
References
Further Reading
Chapter 12 Security for Vertical Industries
Introduction
Cloudification of the Network Operators
MVNO Security in 5G Networks
Security Management and Orchestration
TaaS Deployment Security
Conclusions
Related Articles
References
Further Reading
Chapter 13 Introduction to IoT Security
Introduction
Attacks and Countermeasures
Perception Layer
Perception Nodes
Sensor Nodes
Gateways
Network Layer
Mobile Communication
Cloud Computing
Internet
Application Layer
Smart Utilities – Smart Grids and Smart Metering
Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine
Intelligent Transportation
Smart Agriculture
Industrial IoT (IIoT)
Smart Buildings, Environments, and Cities
Authentication and Authorization
Authentication
Authorization
Authentication at IoT Layers
Perception Layer
Network Layer
Application Layer
Other Security Features and Related Issues
The Simplified Layer Structure
The Idea of Middleware
Cross‐Layer Security Problem
Privacy
Risk Mitigation
Discussion
Future Research Directions
Blockchain
5G
Fog and Edge Computing
Quantum Security, AI, and Predictive Data Analytics
Network Slicing
Conclusions
References
Further Reading
Chapter 14 Privacy in the 5G World: The GDPR in a Datafied Society
Introduction
The 5G World. What Sets It Apart from Previous Communication Technologies?
Data Privacy and the GDPR
The Risks and Threats to Privacy in 5G
Concluding Thoughts
Related Article
References
Further Reading
Chapter 15 Structural Safety Assessment of 5G Network Infrastructures
Introduction
Discussion
Telecommunication Sector Background
Communication Structures Background
Safety Assessment of Communication Structures
Major Concerns to 5G when Compared with Pre‐5G Networks
Conclusions and Recommendations
Related Articles
References
Further Reading
Index
EULA