Vai al contenuto principale della pagina
Autore: | Fang Dongfeng |
Titolo: | 5G Wireless Network Security and Privacy / / DongFeng Fang, Yi Qian, and Rose Qingyang Hu |
Pubblicazione: | Chichester, England : , : John Wiley & Sons Ltd, , [2024] |
©2024 | |
Edizione: | First edition. |
Descrizione fisica: | 1 online resource (131 pages) |
Disciplina: | 621.3845/6 |
Soggetto topico: | 5G mobile communication systems - Security measures |
Persona (resp. second.): | QianYi |
HuRose Qingyang | |
Nota di bibliografia: | Includes bibliographical references and index. |
Nota di contenuto: | Cover -- Title Page -- Copyright -- Contents -- About the Authors -- Preface -- Acknowledgments -- Introduction -- Chapter 1 Introduction to 5G Wireless Systems -- 1.1 Motivations and Objectives of 5G Wireless Networks -- 1.2 Security Drives and Requirements -- 1.3 5G Wireless Network Architecture -- 1.3.1 Overview of the 5G Wireless Network Architecture -- 1.3.2 Comparison Between the Legacy Cellular Network and the 5G Wireless Network -- 1.4 Conclusion -- Chapter 2 Security from Legacy Wireless Systems to 5G Networks -- 2.1 Network Security for Legacy Systems -- 2.2 Security Attacks and Security Services in 5G Wireless Networks -- 2.2.1 Security Attacks -- 2.2.2 Security Services -- 2.2.2.1 Authentication -- 2.2.2.2 Confidentiality -- 2.2.2.3 Availability -- 2.2.2.4 Integrity -- 2.3 The Evolution of Wireless Security Architectures from 3G to 5G -- 2.3.1 3G Security Architecture -- 2.3.2 4G Security Architecture -- 2.3.3 5G Wireless Security Architecture -- 2.3.3.1 Overview of the Proposed 5G Wireless Security Architecture -- 2.3.3.2 Security Domains -- 2.4 Summary -- Chapter 3 Security Mechanisms in 5G Wireless Systems -- 3.1 Cryptographic Approaches and Physical Layer Security -- 3.2 Authentication -- 3.3 Availability -- 3.4 Data Confidentiality -- 3.5 Key Management -- 3.6 Privacy -- 3.7 Conclusion -- Chapter 4 An Efficient Security Solution Based on Physical Layer Security in 5G Wireless Networks -- 4.1 Enhancing 5G Security Through Artificial Noise and Interference Utilization -- 4.2 A HetNet System Model and Security Analysis -- 4.2.1 System Model and Threat Model -- 4.2.2 Security Analysis -- 4.3 Problem Formulation and Analysis -- 4.3.1 Maximum Secrecy Rate -- 4.3.2 The Proposed Algorithm -- 4.4 Numerical and Simulation Results -- 4.5 Conclusion. |
Chapter 5 Flexible and Efficient Security Schemes for IoT Applications in 5G Wireless Systems -- 5.1 IoT Application Models and Current Security Challenges -- 5.2 A General System Model for IoT Applications Over 5G -- 5.2.1 System Architecture -- 5.2.2 Trust Models -- 5.2.3 Threat Models and Design Objectives -- 5.3 The 5G Authentication and Secure Data Transmission Scheme -- 5.3.1 Overview of the 5G Authentication and Secure Data Transmission Scheme -- 5.3.2 The Detailed Scheme -- 5.3.2.1 Phase 1 - System Initialization -- 5.3.2.2 Phase 2 - Authentication and Initial Session Key Agreement -- 5.3.2.3 Phase 3 - Data Transmission -- 5.3.2.4 Phase 4 - Data Receiving -- 5.3.2.5 Phase 5 - T2 IoT Devices Authentication and Initial Session Key Agreement -- 5.4 Security Analysis -- 5.4.1 Protocol Verification -- 5.4.2 Security Objectives -- 5.4.2.1 Mutual Authentication -- 5.4.2.2 Initial Session Key Agreement -- 5.4.2.3 Data Confidentiality and Integrity -- 5.4.2.4 Contextual Privacy -- 5.4.2.5 Forward Security -- 5.4.2.6 End‐to‐End Security -- 5.4.2.7 Key Escrow Resilience -- 5.5 Performance Evaluation -- 5.5.1 Security Services -- 5.5.2 Computational Overhead -- 5.5.3 Communication Overhead -- 5.6 Conclusion -- Chapter 6 Secure and Efficient Mobility Management in 5G Wireless Networks -- 6.1 Handover Issues and Requirements Over 5G Wireless Networks -- 6.2 A 5G CN Model and HetNet System Model -- 6.3 5G Handover Scenarios and Procedures -- 6.3.1 Handover Scenarios -- 6.3.2 Handover Procedures -- 6.4 A New Authentication Protocol for 5G Networks -- 6.4.1 Assumptions -- 6.4.2 Pre‐Authentication -- 6.4.3 Full Authentication -- 6.4.4 Fast Authentication -- 6.4.4.1 Handover Between APs -- 6.4.4.2 Handover Between BSs -- 6.5 Security Analysis of the New 5G Authentication Protocols -- 6.6 Performance Evaluations -- 6.6.1 Communication Overhead. | |
6.6.2 Computation Overhead -- 6.7 Conclusion -- Chapter 7 Open Issues and Future Research Directions for Security and Privacy in 5G Networks -- 7.1 New Trust Models -- 7.2 New Security Attack Models -- 7.3 Privacy Protection -- 7.4 Unified Security Management -- References -- Index -- EULA. | |
Sommario/riassunto: | "5G Wireless Network Security and Privacy addresses the motivation for security and privacy of 5G wireless network systems. The authors ? noted experts in the topic ? examine and discuss the current vulnerabilities of 5G wireless networks and problems of security and privacy solutions based on the perspectives of security architecture and mechanisms. Comprised of 11 chapters, this book aims to enhance security and network performance, new security architecture and flexible, efficient security mechanisms throughout. It provides a comprehensive understanding on drives and requirements of 5G wireless network security and is packed with insights from professionals. Aimed at researchers and professionals within the field of cybersecurity and 5G wireless networks, 5G Wireless Network Security and Privacy offers in-depth knowledge within the field, enabling readers an insight of the possibilities in 5G today."-- |
Titolo autorizzato: | 5G Wireless Network Security and Privacy |
ISBN: | 1-119-78431-X |
1-119-78434-4 | |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910830427503321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |