Home Page Icon
Home Page
Table of Contents for
Part I: 5G Security Overview
Close
Part I: 5G Security Overview
by Mika Ylianttila, Andrei Gurtov, Ahmed Bux Abro, Ijaz Ahmad, Madhusanka Liyanage
A Comprehensive Guide to 5G Security
Cover
Title Page
The Editors
About the Contributors
Foreword
Preface
Acknowledgements
Part I: 5G Security Overview
1 Evolution of Cellular Systems
1.1 Introduction
1.2 Early Development
1.3 First Generation Cellular Systems
1.4 Second Generation Cellular Systems
1.5 Third Generation Cellular Systems
1.6 Cellular Systems beyond 3G
1.7 Fourth Generation Cellular Systems
1.8 Conclusion
References
2 5G Mobile Networks
2.1 Introduction
2.2 5G Requirements
2.3 5G Enabling Technologies
2.4 5G Standardization Activities
2.5 5G Research Communities
2.6 Conclusion
2.7 Acknowledgement
References
3 Mobile Networks Security Landscape
3.1 Introduction
3.2 Mobile Networks Security Landscape
3.3 Mobile Security Lifecycle Functions
3.4 Conclusion
References
4 Design Principles for 5G Security
4.1 Introduction
4.2 Overviews of Security Recommendations and Challenges
4.3 Novel Technologies for 5G Security
4.4 Security in SDN‐based Mobile Networks
4.5 Conclusions and Future Directions
4.6 Acknowledgement
References
5 Cyber Security Business Models in 5G
5.1 Introduction
5.2 The Context of Cyber Security Businesses
5.3 The Business Model Approach
5.4 The Business Case of Cyber Security in the Era of 5G
5.5 Business Model Options in 5G Cyber Security
5.6 Acknowledgement
References
Part II: 5G Network Security
6 Physical Layer Security
6.1 Introduction
6.2 WBPLSec System Model
6.3 Outage Probability of Secrecy Capacity of a Jamming Receiver
6.4 WBPLSec Applied to 5G networks
6.5 Conclusions
References
7 5G‐WLAN Security
7.1 Chapter Overview
7.2 Introduction to WiFi‐5G Networks Interoperability
7.3 Overview of Network Architecture for WiFi‐5G Networks Interoperability
7.4 5G‐WiFi Security Challenges
7.5 Security Consideration for Architectural Design of WiFi‐5G Networks
7.6 LiFi Networks
7.7 Introduction to LiFi‐5G Networks Interoperability
7.8 5G‐LiFi Security Challenges
7.9 Security Consideration for Architectural Design of LiFi‐5G Networks
7.10 Conclusion and Future Work
References
8 Safety of 5G Network Physical Infrastructures
8.1 Introduction
8.2 Historical Development
8.3 Structural Design Philosophy
8.4 Survey of Problems
8.5 Opportunities and Recommendations
8.6 Acknowledgement
References
9 Customer Edge Switching
9.1 Introduction
9.2 State‐of‐the‐art in Mobile Networks Security
9.3 CES Security Framework
9.4 Evaluation of CES Security
9.5 Deployment in 5G Networks
9.6 Conclusion
References
10 Software Defined Security Monitoring in 5G Networks
10.1 Introduction
10.2 Existing Monitoring Techniques
10.3 Limitations of Current Monitoring Techniques
10.4 Use of Monitoring in 5G
10.5 Software‐Defined Monitoring Architecture
10.6 Expected Advantages of Software Defined Monitoring
10.7 Expected Challenges in Software Defined Monitoring
10.8 Conclusion
References
Part III: 5G Device and User Security
11 IoT Security
11.1 Introduction
11.2 Related Work
11.3 Literature Overview and Research Motivation
11.4 Distributed Security Platform
11.5 Mobile Cloud Robot Security Scenarios
11.6 Conclusion
References
12 User Privacy, Identity and Trust in 5G
12.1 Introduction
12.2 Background
12.3 User Privacy
12.4 Identity Management
12.5 Trust Models
12.6 Discussion
12.7 Conclusion
References
13 5G Positioning
13.1 Introduction
13.2 Outdoor versus Indoor Positioning Technologies
13.3 Passive versus Active Positioning
13.4 Brief Overview of 5G Positioning Mechanisms
13.5 Survey of Security Threats and Privacy Issues in 5G Positioning
13.6 Main Privacy Concerns
13.7 Passive versus Active Positioning Concepts
13.8 Physical‐Layer Based Security Enhancements Mechanisms for Positioning in 5G
13.9 Enhancing Trustworthiness
13.10 Cryptographic Techniques for Security and Privacy of Positioning
13.11 Legislation on User Location Privacy in 5G
13.12 Landscape of the European and International Projects related to Secure Positioning
References
Part IV: 5G Cloud and Virtual Network Security
14 Mobile Virtual Network Operators (MVNO) Security
14.1 Introduction
14.2 Related Work
14.3 Cloudification of the Network Operators
14.4 MVNO Security
14.5 TaaS Deployment Security
14.6 Future Directions
14.7 Conclusion
References
15 NFV and NFV-based Security Services
15.1 Introduction
15.2 5G, NFV and Security
15.3 A Brief Introduction to NFV
15.4 NFV, SDN and a Telco Cloud
15.5 Common NFV Drivers
15.6 NFV Security: Challenges and Opportunities
15.7 NFV-based Security Services
15.8 Conclusions
References
16 Cloud and MEC Security
16.1 Introduction
16.2 Cloud Computing in 5G Networks
16.3 MEC in 5G Networks
16.4 Security Challenges in 5G Cloud
16.5 Security Challenges in 5G MEC
16.6 Security Architectures for 5G Cloud and MEC
16.7 5GMEC, Cloud Security Research and Standardizations
16.8 Conclusions
References
17 Regulatory Impact on 5G Security and Privacy
17.1 Introduction
17.2 Regulatory Objectives for Security and Privacy
17.3 Legal Framework for Security and Privacy
17.4 Security and Privacy Issues in New 5G Technologies
17.5 Relevance Assessment of Security and Privacy Issues for Regulation
17.6 Analysis of Potential Regulatory Approaches
17.7 Summary of Issues and Impact of New Technologies on Security and Privacy Regulation
References
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Acknowledgements
Next
Next Chapter
1 Evolution of Cellular Systems
Part I
5G Security Overview
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset