LEADER 06514nam 2200493 450 001 9910830427503321 005 20231115021012.0 010 $a1-119-78431-X 010 $a1-119-78434-4 035 $a(MiAaPQ)EBC30858719 035 $a(Au-PeEL)EBL30858719 035 $a(EXLCZ)9928653789700041 100 $a20231115d2024 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a5G Wireless Network Security and Privacy /$fDongFeng Fang, Yi Qian, and Rose Qingyang Hu 205 $aFirst edition. 210 1$aChichester, England :$cJohn Wiley & Sons Ltd,$d[2024] 210 4$dİ2024 215 $a1 online resource (131 pages) 225 1 $aIEEE Press Series 311 08$aPrint version: Fang, DongFeng 5G Wireless Network Security and Privacy Newark : John Wiley & Sons, Incorporated,c2024 9781119784296 320 $aIncludes bibliographical references and index. 327 $aCover -- Title Page -- Copyright -- Contents -- About the Authors -- Preface -- Acknowledgments -- Introduction -- Chapter 1 Introduction to 5G Wireless Systems -- 1.1 Motivations and Objectives of 5G Wireless Networks -- 1.2 Security Drives and Requirements -- 1.3 5G Wireless Network Architecture -- 1.3.1 Overview of the 5G Wireless Network Architecture -- 1.3.2 Comparison Between the Legacy Cellular Network and the 5G Wireless Network -- 1.4 Conclusion -- Chapter 2 Security from Legacy Wireless Systems to 5G Networks -- 2.1 Network Security for Legacy Systems -- 2.2 Security Attacks and Security Services in 5G Wireless Networks -- 2.2.1 Security Attacks -- 2.2.2 Security Services -- 2.2.2.1 Authentication -- 2.2.2.2 Confidentiality -- 2.2.2.3 Availability -- 2.2.2.4 Integrity -- 2.3 The Evolution of Wireless Security Architectures from 3G to 5G -- 2.3.1 3G Security Architecture -- 2.3.2 4G Security Architecture -- 2.3.3 5G Wireless Security Architecture -- 2.3.3.1 Overview of the Proposed 5G Wireless Security Architecture -- 2.3.3.2 Security Domains -- 2.4 Summary -- Chapter 3 Security Mechanisms in 5G Wireless Systems -- 3.1 Cryptographic Approaches and Physical Layer Security -- 3.2 Authentication -- 3.3 Availability -- 3.4 Data Confidentiality -- 3.5 Key Management -- 3.6 Privacy -- 3.7 Conclusion -- Chapter 4 An Efficient Security Solution Based on Physical Layer Security in 5G Wireless Networks -- 4.1 Enhancing 5G Security Through Artificial Noise and Interference Utilization -- 4.2 A HetNet System Model and Security Analysis -- 4.2.1 System Model and Threat Model -- 4.2.2 Security Analysis -- 4.3 Problem Formulation and Analysis -- 4.3.1 Maximum Secrecy Rate -- 4.3.2 The Proposed Algorithm -- 4.4 Numerical and Simulation Results -- 4.5 Conclusion. 327 $aChapter 5 Flexible and Efficient Security Schemes for IoT Applications in 5G Wireless Systems -- 5.1 IoT Application Models and Current Security Challenges -- 5.2 A General System Model for IoT Applications Over 5G -- 5.2.1 System Architecture -- 5.2.2 Trust Models -- 5.2.3 Threat Models and Design Objectives -- 5.3 The 5G Authentication and Secure Data Transmission Scheme -- 5.3.1 Overview of the 5G Authentication and Secure Data Transmission Scheme -- 5.3.2 The Detailed Scheme -- 5.3.2.1 Phase 1?-?System Initialization -- 5.3.2.2 Phase 2?-?Authentication and Initial Session Key Agreement -- 5.3.2.3 Phase 3?-?Data Transmission -- 5.3.2.4 Phase 4?-?Data Receiving -- 5.3.2.5 Phase 5?-?T2 IoT Devices Authentication and Initial Session Key Agreement -- 5.4 Security Analysis -- 5.4.1 Protocol Verification -- 5.4.2 Security Objectives -- 5.4.2.1 Mutual Authentication -- 5.4.2.2 Initial Session Key Agreement -- 5.4.2.3 Data Confidentiality and Integrity -- 5.4.2.4 Contextual Privacy -- 5.4.2.5 Forward Security -- 5.4.2.6 End?to?End Security -- 5.4.2.7 Key Escrow Resilience -- 5.5 Performance Evaluation -- 5.5.1 Security Services -- 5.5.2 Computational Overhead -- 5.5.3 Communication Overhead -- 5.6 Conclusion -- Chapter 6 Secure and Efficient Mobility Management in 5G Wireless Networks -- 6.1 Handover Issues and Requirements Over 5G Wireless Networks -- 6.2 A 5G CN Model and HetNet System Model -- 6.3 5G Handover Scenarios and Procedures -- 6.3.1 Handover Scenarios -- 6.3.2 Handover Procedures -- 6.4 A New Authentication Protocol for 5G Networks -- 6.4.1 Assumptions -- 6.4.2 Pre?Authentication -- 6.4.3 Full Authentication -- 6.4.4 Fast Authentication -- 6.4.4.1 Handover Between APs -- 6.4.4.2 Handover Between BSs -- 6.5 Security Analysis of the New 5G Authentication Protocols -- 6.6 Performance Evaluations -- 6.6.1 Communication Overhead. 327 $a6.6.2 Computation Overhead -- 6.7 Conclusion -- Chapter 7 Open Issues and Future Research Directions for Security and Privacy in 5G Networks -- 7.1 New Trust Models -- 7.2 New Security Attack Models -- 7.3 Privacy Protection -- 7.4 Unified Security Management -- References -- Index -- EULA. 330 $a"5G Wireless Network Security and Privacy addresses the motivation for security and privacy of 5G wireless network systems. The authors ? noted experts in the topic ? examine and discuss the current vulnerabilities of 5G wireless networks and problems of security and privacy solutions based on the perspectives of security architecture and mechanisms. Comprised of 11 chapters, this book aims to enhance security and network performance, new security architecture and flexible, efficient security mechanisms throughout. It provides a comprehensive understanding on drives and requirements of 5G wireless network security and is packed with insights from professionals. Aimed at researchers and professionals within the field of cybersecurity and 5G wireless networks, 5G Wireless Network Security and Privacy offers in-depth knowledge within the field, enabling readers an insight of the possibilities in 5G today."--$cProvided by publisher. 410 0$aIEEE Press/Chapman & Hall Publishers series on microwave technology and RF. 606 $a5G mobile communication systems$xSecurity measures 615 0$a5G mobile communication systems$xSecurity measures. 676 $a621.3845/6 700 $aFang$b Dongfeng$01659300 702 $aQian$b Yi 702 $aHu$b Rose Qingyang 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910830427503321 996 $a5G Wireless Network Security and Privacy$94013882 997 $aUNINA