top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Comprehensive guide to 5G security / / edited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila
Comprehensive guide to 5G security / / edited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2018
Descrizione fisica 1 online resource (441 pages) : illustrations
Disciplina 005.8
Soggetto topico Mobile communication systems - Security measures
Wireless communication systems - Security measures
ISBN 1-119-29305-7
1-119-29308-1
1-119-29307-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Editors xvii -- About the Contributors xxi -- Foreword xxxiii -- Preface xxxv -- Acknowledgements xli -- Part I 5G Security Overview 1 -- 1 Evolution of Cellular Systems 3 /Shahriar Shahabuddin, Sadiqur Rahaman, Faisal Rehman, Ijaz Ahmad, and Zaheer Khan -- 1.1 Introduction 3 -- 1.2 Early Development 4 -- 1.3 First Generation Cellular Systems 6 -- 1.3.1 Advanced Mobile Phone Service 7 -- 1.3.2 Security in 1G 7 -- 1.4 Second Generation Cellular Systems 8 -- 1.4.1 Global System for Mobile Communications 8 -- 1.4.2 GSM Network Architecture 9 -- 1.4.3 Code Division Multiple Access 10 -- 1.4.4 Security in 2G 10 -- 1.4.5 Security in GSM 11 -- 1.4.5.1 IMSI 11 -- 1.4.5.2 Ki 12 -- 1.4.5.3 A3 Algorithm 12 -- 1.4.5.4 A8 Algorithm 13 -- 1.4.5.5 COMP128 14 -- 1.4.5.6 A5 Algorithm 14 -- 1.4.6 Security in IS?]95 14 -- 1.5 Third Generation Cellular Systems 15 -- 1.5.1 CDMA 2000 15 -- 1.5.2 UMTS WCDMA 15 -- 1.5.3 UMTS Network Architecture 16 -- 1.5.4 HSPA 17 -- 1.5.5 Security in 3G 17 -- 1.5.6 Security in CDMA2000 17 -- 1.5.7 Security in UMTS 18 -- 1.6 Cellular Systems beyond 3G 20 -- 1.6.1 HSPA+ 20 -- 1.6.2 Mobile WiMAX 20 -- 1.6.3 LTE 21 -- 1.6.3.1 Orthogonal Frequency Division Multiplexing (OFDM) 21 -- 1.6.3.2 SC?]FDE and SC?]FDMA 21 -- 1.6.3.3 Multi?]antenna Technique 21 -- 1.6.4 LTE Network Architecture 21 -- 1.7 Fourth Generation Cellular Systems 22 -- 1.7.1 Key Technologies of 4G 23 -- 1.7.1.1 Enhanced MINO 23 -- 1.7.1.2 Cooperative Multipoint Transmission and Reception for LTE?]Advanced 23 -- 1.7.1.3 Spectrum and Bandwidth Management 24 -- 1.7.1.4 Carrier Aggregation 24 -- 1.7.1.5 Relays 24 -- 1.7.2 Network Architecture 24 -- 1.7.3 Beyond 3G and 4G Cellular Systems Security 25 -- 1.7.4 LTE Security Model 26 -- 1.7.5 Security in WiMAX 26 -- 1.8 Conclusion 27 -- References 28 -- 2 5G Mobile Networks: Requirements, Enabling Technologies, and Research Activities 31 /Van?]Giang Nguyen, Anna Brunstrom, Karl?]Johan Grinnemo, and Javid Taheri -- 2.1 Introduction 31 -- 2.1.1 What is 5G? 31.
2.1.1.1 From a System Architecture Perspective 32 -- 2.1.1.2 From the Spectrum Perspective 32 -- 2.1.1.3 From a User and Customer Perspective 32 -- 2.1.2 Typical Use Cases 32 -- 2.2 5G Requirements 33 -- 2.2.1 High Data Rate and Ultra Low Latency 34 -- 2.2.2 Massive Connectivity and Seamless Mobility 35 -- 2.2.3 Reliability and High Availability 35 -- 2.2.4 Flexibility and Programmability 36 -- 2.2.5 Energy, Cost and Spectrum Efficiency 36 -- 2.2.6 Security and Privacy 36 -- 2.3 5G Enabling Technologies 37 -- 2.3.1 5G Radio Access Network 38 -- 2.3.1.1 mmWave Communication 38 -- 2.3.1.2 Massive MIMO 38 -- 2.3.1.3 Ultra?]Dense Small Cells 39 -- 2.3.1.4 M2M and D2D Communications 40 -- 2.3.1.5 Cloud?]based Radio Access Network 42 -- 2.3.1.6 Mobile Edge and Fog Computing 42 -- 2.3.2 5G Mobile Core Network 44 -- 2.3.2.1 Software Defined Networking 44 -- 2.3.2.2 Network Function Virtualization 44 -- 2.3.2.3 Cloud Computing 46 -- 2.3.3 G End?]to?]End System 46 -- 2.3.3.1 Network Slicing 46 -- 2.3.3.2 Management and Orchestration 47 -- 2.4 5G Standardization Activities 48 -- 2.4.1 ITU Activities 48 -- 2.4.1.1 ITU?]R 49 -- 2.4.1.2 ITU?]T 49 -- 2.4.2 3GPP Activities 49 -- 2.4.2.1 Pre?]5G Phase 49 -- 2.4.2.2 5G Phase I 50 -- 2.4.2.3 5G Phase II 50 -- 2.4.3 ETSI Activities 50 -- 2.4.4 IEEE Activities 51 -- 2.4.5 IETF Activities 52 -- 2.5 5G Research Communities 52 -- 2.5.1 European 5G Related Activities 52 -- 2.5.1.1 5G Research in EU FP7 52 -- 2.5.1.2 5G Research in EU H2020 52 -- 2.5.1.3 5G Research in Celtic?]Plus 53 -- 2.5.2 Asian 5G Related Activities 53 -- 2.5.2.1 South Korea: 5G Forum 53 -- 2.5.2.2 Japan: 5GMF Forum 54 -- 2.5.2.3 China: IMT?]2020 5G Promotion Group 54 -- 2.5.3 American 5G Related Activities 54 -- 2.6 Conclusion 55 -- 2.7 Acknowledgement 55 -- References 55 -- 3 Mobile Networks Security Landscape 59 /Ahmed Bux Abro -- 3.1 Introduction 59 -- 3.2 Mobile Networks Security Landscape 59 -- 3.2.1 Security Threats and Protection for 1G 61 -- 3.2.2 Security Threats and Protection for 2G 61.
3.2.3 Security Threats and Protection for 3G 63 -- 3.2.4 Security Threats and Protection for 4G 63 -- 3.2.4.1 LTE UE (User Equipment) Domain Security 64 -- 3.2.4.2 LTE (Remote Access Network) Domain Security 65 -- 3.2.4.3 LTE Core Network Domain Security 65 -- 3.2.4.4 Security Threat Analysis for 4G 65 -- 3.2.5 Security Threats and Protection for 5G 66 -- 3.2.5.1 Next Generation Threat Landscape for 5G 68 -- 3.2.5.2 IoT Threat Landscape 68 -- 3.2.5.3 5G Evolved Security Model 68 -- 3.2.5.4 5G Security Threat Analysis 69 -- 3.3 Mobile Security Lifecycle Functions 70 -- 3.3.1 Secure Device Management 71 -- 3.3.2 Mobile OS and App Patch Management 71 -- 3.3.3 Security Threat Analysis and Assessment 71 -- 3.3.4 Security Monitoring 72 -- 3.4 Conclusion 73 -- References 73 -- 4 Design Principles for 5G Security 75 /Ijaz Ahmad, Madhusanka Liyanage, Shahriar Shahabuddin, Mika Ylianttila, and Andrei Gurtov -- 4.1 Introduction 75 -- 4.2 Overviews of Security Recommendations and Challenges 76 -- 4.2.1 Security Recommendations by ITU?]T 77 -- 4.2.2 Security Threats and Recommendations by NGMN 78 -- 4.2.3 Other Security Challenges 79 -- 4.2.3.1 Security Challenges in the Access Network 79 -- 4.2.3.2 DoS Attacks 79 -- 4.2.3.3 Security Challenges in the Control Layer or Core Network 80 -- 4.3 Novel Technologies for 5G Security 81 -- 4.3.1 5G Security Leveraging NFV 82 -- 4.3.2 Network Security Leveraging SDN 83 -- 4.3.3 Security Challenges in SDN 84 -- 4.3.3.1 Application Layer 84 -- 4.3.3.2 Controller Layer 85 -- 4.3.3.3 Infrastructure Layer 86 -- 4.3.4 Security Solutions for SDN 86 -- 4.3.4.1 Application Plane Security 86 -- 4.3.4.2 Control Plane Security 87 -- 4.3.4.3 Data Plane Security Solutions 87 -- 4.4 Security in SDN?]based Mobile Networks 88 -- 4.4.1 Data Link Security 88 -- 4.4.2 Control Channels Security 89 -- 4.4.3 Traffic Monitoring 91 -- 4.4.4 Access Control 91 -- 4.4.5 Network Resilience 91 -- 4.4.6 Security Systems and Firewalls 92 -- 4.4.7 Network Security Automation 92.
4.5 Conclusions and Future Directions 94 -- 4.6 Acknowledgement 95 -- References 95 -- 5 Cyber Security Business Models in 5G 99 /Julius Francis Gomes, Marika Iivari, Petri Ahokangas, Lauri Isotalo, Bengt Sahlin, and Jan Melén -- 5.1 Introduction 99 -- 5.2 The Context of Cyber Security Businesses 100 -- 5.2.1 Types of Cyber Threat 101 -- 5.2.2 The Cost of Cyber?]Attacks 102 -- 5.3 The Business Model Approach 103 -- 5.3.1 The 4C Typology of the ICT Business Model 104 -- 5.3.2 Business Models in the Context of Cyber Preparedness 105 -- 5.4 The Business Case of Cyber Security in the Era of 5G 106 -- 5.4.1 The Users and Issues of Cyber Security in 5G 108 -- 5.4.2 Scenarios for 5G Security Provisioning 109 -- 5.4.3 Delivering Cyber Security in 5G 110 -- 5.5 Business Model Options in 5G Cyber Security 112 -- 5.6 Acknowledgment 114 -- References 114 -- Part II 5G Network Security 117 -- 6 Physical Layer Security 119 /Simone Soderi, Lorenzo Mucchi, Matti Hämäläinen, Alessandro Piva, and Jari Iinatti -- 6.1 Introduction 119 -- 6.1.1 Physical Layer Security in 5G Networks 120 -- 6.1.2 Related Work 121 -- 6.1.3 Motivation 121 -- 6.2 WBPLSec System Model 123 -- 6.2.1 Transmitter 124 -- 6.2.2 Jamming Receiver 126 -- 6.2.3 Secrecy Metrics 126 -- 6.2.4 Secrecy Capacity of WBPLSec 128 -- 6.2.5 Secrecy Capacity of iJAM 129 -- 6.3 Outage Probability of Secrecy Capacity of a Jamming Receiver 131 -- 6.3.1 Simulation Scenario for Secrecy Capacity 134 -- 6.4 WBPLSec Applied to 5G networks 136 -- 6.5 Conclusions 138 -- References 139 -- 7 5G?]WLAN Security 143 /Satish Anamalamudi, Abdur Rashid Sangi, Mohammed Alkatheiri, Fahad T. Bin Muhaya, and Chang Liu -- 7.1 Chapter -- Overview 143 -- 7.2 Introduction to WiFi?]5G Networks Interoperability 143 -- 7.2.1 WiFi (Wireless Local Area Network) 143 -- 7.2.2 Interoperability of WiFi with 5G Networks 144 -- 7.2.3 WiFi Security 144 -- 7.3 Overview of Network Architecture for WiFi?]5G Networks Interoperability 146 -- 7.3.1 MAC Layer 147.
7.3.2 Network Layer 147 -- 7.3.3 Transport Layer 148 -- 7.3.4 Application Layer 149 -- 7.4 5G?]WiFi Security Challenges 150 -- 7.4.1 Security Challenges with Respect to a Large Number of Device Connectivity 151 -- 7.4.2 Security Challenges in 5G Networks and WiFi 151 -- 7.5 Security Consideration for Architectural Design of WiFi?]5G Networks 156 -- 7.5.1 User and Device Identity Confidentiality 156 -- 7.5.2 Integrity 156 -- 7.5.3 Mutual Authentication and Key Management 157 -- 7.6 LiFi Networks 158 -- 7.7 Introduction to LiFi?]5G Networks Interoperability 159 -- 7.8 5G?]LiFi Security Challenges 160 -- 7.8.1 Security Challenges with Respect to a Large Number of Device Connectivity 160 -- 7.8.2 Security Challenges in 5G Networks and LiFi 160 -- 7.9 Security Consideration for Architectural Design of LiFi?]5G Networks 160 -- 7.10 Conclusion and Future Work 161 -- References 161 -- 8 Safety of 5G Network Physical Infrastructures 165 /Rui Travanca and João André -- 8.1 Introduction 165 -- 8.2 Historical Development 168 -- 8.2.1 Typology 168 -- 8.2.2 Codes 170 -- 8.2.3 Outlook 170 -- 8.3 Structural Design Philosophy 171 -- 8.3.1 Basis 171 -- 8.3.2 Actions 174 -- 8.3.3 Structural Analysis 179 -- 8.3.4 Steel Design Verifications 180 -- 8.3.4.1 Ultimate Limit States 180 -- 8.3.4.2 Serviceability Limit States 181 -- 8.4 Survey of Problems 181 -- 8.4.1 General 181 -- 8.4.2 Design Failures 182 -- 8.4.3 Maintenance Failures 183 -- 8.4.4 Vandalism or Terrorism Failures 186 -- 8.5 Opportunities and Recommendations 188 -- 8.6 Acknowledgement 190 -- References 191 -- 9 Customer Edge Switching: A Security Framework for 5G 195 /Hammad Kabir, Raimo Kantola, and Jesus Llorente Santos -- 9.1 Introduction 195 -- 9.2 State?]of?]the?]art in Mobile Networks Security 197 -- 9.2.1 Mobile Network Challenges and Principles of Security Framework 200 -- 9.2.2 Trust Domains and Trust Processing 202 -- 9.3 CES Security Framework 203 -- 9.3.1 DNS to Initiate Communication 205 -- 9.3.2 CETP Policy?]based Communication 206.
9.3.3 Policy Architecture 208 -- 9.3.4 CES Security Mechanisms 209 -- 9.3.5 Realm Gateway 210 -- 9.3.6 RGW Security Mechanisms 211 -- 9.3.6.1 Name Server Classification and Allocation Model 212 -- 9.3.6.2 Preventing DNS Abuse 212 -- 9.3.6.3 Bot?]Detection Algorithm 213 -- 9.3.6.4 TCP?]Splice 213 -- 9.4 Evaluation of CES Security 213 -- 9.4.1 Evaluating the CETP Policy?]based Communication 214 -- 9.4.1.1 Security Testing 216 -- 9.4.1.2 Outcomes of the Security Testing 216 -- 9.4.2 Evaluation of RGW Security 217 -- 9.5 Deployment in 5G Networks 222 -- 9.5.1 Use Case 1: Mobile Broadband 224 -- 9.5.1.1 Deployment and Operations 224 -- 9.5.1.2 Security Benefits 224 -- 9.5.1.3 Scalability 225 -- 9.5.1.4 Reliability 225 -- 9.5.2 Use Case 2: Corporate Gateway 225 -- 9.5.2.1 Deployment and Operations 225 -- 9.5.2.2 Security Benefits 226 -- 9.5.2.3 Scalability 226 -- 9.5.2.4 Reliability 226 -- 9.5.3 Use Case 3: National CERT Centric Trust Domain 226 -- 9.5.3.1 Deployment and Operations 226 -- 9.5.3.2 Security Benefits 227 -- 9.5.3.3 Scalability 227 -- 9.5.3.4 Reliability 227 -- 9.5.4 Use Case 4: Industrial Internet for Road Traffic and Transport 227 -- 9.5.4.1 Deployment and Operations 227 -- 9.5.4.2 Security Benefits 228 -- 9.5.4.3 Scalability 228 -- 9.5.4.4 Reliability 228 -- 9.6 Conclusion 228 -- References 230 -- 10 Software Defined Security Monitoring in 5G Networks 231 /Madhusanka Liyanage, Ijaz Ahmad, Jude Okwuibe, Edgardo Montes de Oca, Mai Hoang Long, Oscar Lopez Perez, and Mikel Uriarte Itzazelaia -- 10.1 Introduction 231 -- 10.2 Existing Monitoring Techniques 232 -- 10.3 Limitations on Current Monitoring Techniques 233 -- 10.4 Use of Monitoring in 5G 234 -- 10.5 Software?]Defined Monitoring Architecture 235 -- 10.6 Expected Advantages of Software Defined Monitoring 238 -- 10.7 Expected Challenges in Software Defined Monitoring 240 -- 10.8 Conclusion 242 -- References 243 -- Part III 5G Device and User Security 245 -- 11 IoT Security 247 /Mehrnoosh Monshizadeh, and Vikramajeet Khatri.
11.1 Introduction 247 -- 11.2 Related Work 248 -- 11.3 Literature Overview and Research Motivation 249 -- 11.3.1 IoT Devices, Services and Attacks on Them 250 -- 11.3.2 Research Motivation 253 -- 11.4 Distributed Security Platform 254 -- 11.4.1 Robot Data Classification 254 -- 11.4.2 Robot Attack Classification 255 -- 11.4.3 Robot Security Platform 256 -- 11.4.3.1 Robot Section 257 -- 11.4.3.2 Mobile Network Section 257 -- 11.5 Mobile Cloud Robot Security Scenarios 259 -- 11.5.1 Robot with SIMcard 259 -- 11.5.2 SIMless Robot 260 -- 11.5.3 Robot Attack 263 -- 11.5.4 Robot Communication 263 -- 11.6 Conclusion 263 -- References 265 -- 12 User Privacy, Identity and Trust 267 /Tanesh Kumar, Madhusanka Liyanage, Ijaz Ahmad, An Braeken, and Mika Ylianttila -- 12.1 Introduction 267 -- 12.2 Background 268 -- 12.3 User Privacy 269 -- 12.3.1 Data Privacy 269 -- 12.3.2 Location Privacy 271 -- 12.3.3 Identity Privacy 272 -- 12.4 Identity Management 273 -- 12.5 Trust Models 274 -- 12.6 Discussion 277 -- 12.7 Conclusion 278 -- References 279 -- 13 5G Positioning: Security and Privacy Aspects 281 /Elena Simona Lohan, Anette Alén?]Savikko, Liang Chen, Kimmo Järvinen, Helena Leppäkoski, Heidi Kuusniemi, and Päivi Korpisaari -- 13.1 Introduction 281 -- 13.2 Outdoor versus Indoor Positioning Technologies 283 -- 13.3 Passive versus Active Positioning 283 -- 13.4 Brief Overview of 5G Positioning Mechanisms 285 -- 13.5 Survey of Security Threats and Privacy Issues in 5G Positioning 291 -- 13.5.1 Security Threats in 5G Positioning 291 -- 13.5.1.1 Security Threats Affecting Several or All Players 291 -- 13.5.1.2 Security Threats Affecting LISP 292 -- 13.5.1.3 Security Threats Affecting LBSP 293 -- 13.5.1.4 Security Threats Affecting the 5G User Device or LIC 293 -- 13.6 Main Privacy Concerns 294 -- 13.7 Passive versus Active Positioning Concepts 295 -- 13.8 Physical?] Layer Based Security Enhancements Mechanisms for Positioning in 5G 296 -- 13.8.1 Reliability Monitoring and Outlier Detection Mechanisms 296.
13.8.2 Detection, Location and Estimation of Interference Signals 297 -- 13.8.3 Backup Systems 298 -- 13.9 Enhancing Trustworthiness 299 -- 13.10 Cryptographic Techniques for Security and Privacy of Positioning 299 -- 13.10.1 Cryptographic Authentication in Positioning 300 -- 13.10.2 Cryptographic Distance?]Bounding 301 -- 13.10.3 Cryptographic Techniques for Privacy?]Preserving Location?]based Services 303 -- 13.11 Legislation on User Location Privacy in 5G 304 -- 13.11.1 EU Policy and Legal Framework 304 -- 13.11.2 Legal Aspects Related to the Processing of Location Data 306 -- 13.11.3 Privacy Protection by Design and Default 306 -- 13.11.4 Security Protection 307 -- 13.11.5 A Closer Look at the e?]Privacy Directive 307 -- 13.11.6 Summary of EU Legal Instruments 308 -- 13.11.7 International Issues 308 -- 13.11.8 Challenges and Future Scenarios in Legal Frameworks and Policy 309 -- 13.12 Landscape of the European and International Projects related to Secure Positioning 311 -- References 312 -- Part IV 5G Cloud and Virtual Network Security 321 -- 14 Mobile Virtual Network Operators (MVNO) Security 323 /Mehrnoosh Monshizadeh and Vikramajeet Khatri -- 14.1 Introduction 323 -- 14.2 Related Work 324 -- 14.3 Cloudification of the Network Operators 325 -- 14.4 MVNO Security 326 -- 14.4.1 Data Security in TaaS 327 -- 14.4.2 Hypervisor and VM Security in TaaS 328 -- 14.4.2.1 SDN Security in TaaS 329 -- 14.4.2.2 NFV Security in TaaS 331 -- 14.4.2.3 OPNFV Security 332 -- 14.4.3 Application Security in TaaS 333 -- 14.4.4 Summary 334 -- 14.4.5 MVNO Security Benchmark 335 -- 14.5 TaaS Deployment Security 338 -- 14.5.1 IaaS 338 -- 14.5.2 PaaS 340 -- 14.5.3 SaaS 340 -- 14.6 Future Directions 340 -- 14.7 Conclusion 341 -- References 342 -- 15 NFV and NFV?]based Security Services 347 /Wenjing Chu -- 15.1 Introduction 347 -- 15.2 5G, NFV and Security 347 -- 15.3 A Brief Introduction to NFV 348 -- 15.4 NFV, SDN, and a Telco Cloud 351 -- 15.5 Common NFV Drivers 353 -- 15.5.1 Technology Curve 353.
15.5.2 Opportunity Cost and Competitive Landscape 353 -- 15.5.3 Horizontal Network Slicing 354 -- 15.5.4 Multi?]Tenancy 354 -- 15.5.5 Rapid Service Delivery 354 -- 15.5.6 XaaS Models 354 -- 15.5.7 One Cloud 355 -- 15.6 NFV Security: Challenges and Opportunities 355 -- 15.6.1 VNF Security Lifecycle and Trust 355 -- 15.6.2 VNF Security in Operation 358 -- 15.6.3 Multi?]Tenancy and XaaS 359 -- 15.6.4 OPNFV and Openstack: Open Source Projects for NFV 360 -- 15.7 NFV?]based Security Services 364 -- 15.7.1 NFV?]based Network Security 365 -- 15.7.1.1 Virtual Security Appliances 365 -- 15.7.1.2 Distributed Network Security Services 366 -- 15.7.1.3 Network Security as a Service 366 -- 15.7.2 Policy?]based Security Services 366 -- 15.7.2.1 Group?]based Policy 367 -- 15.7.2.2 Openstack Congress 368 -- 15.7.3 Machine Learning for NFV?]based Security Services 369 -- 15.8 Conclusions 370 -- References 370 -- 16 Cloud and MEC Security 373 /Jude Okwuibe, Madhusanka Liyanage, Ijaz Ahmed, and Mika Ylianttila -- 16.1 Introduction 373 -- 16.2 Cloud Computing in 5G Networks 374 -- 16.2.1 Overview and History of Cloud Computing 375 -- 16.2.2 Cloud Computing Architecture 376 -- 16.2.3 Cloud Deployment Models 377 -- 16.2.4 Cloud Service Models 378 -- 16.2.5 5G Cloud Computing Architecture 379 -- 16.2.6 Use Cases/Scenarios of Cloud Computing in 5G 380 -- 16.3 MEC in 5G Networks 381 -- 16.3.1 Overview of MEC Computing 381 -- 16.3.2 MEC in 5G 383 -- 16.3.3 Use Cases of MEC Computing in 5G 384 -- 16.4 Security Challenges in 5G Cloud 385 -- 16.4.1 Virtualization Security 385 -- 16.4.2 Cyber?]Physical System (CPS) Security 386 -- 16.4.3 Secure and Private Data Computation 386 -- 16.4.4 Cloud Intrusion 387 -- 16.4.5 Access Control 387 -- 16.5 Security Challenges in 5G MEC 388 -- 16.5.1 Denial of Service (DoS) Attack 389 -- 16.5.2 Man?]in?]the?]Middle (MitM) 389 -- 16.5.3 Inconsistent Security Policies 389 -- 16.5.4 VM Manipulation 390 -- 16.5.5 Privacy Leakage 390 -- 16.6 Security Architectures for 5G Cloud and MEC 391.
16.6.1 Centralized Security Architectures 391 -- 16.6.2 SDN?]based Cloud Security Systems 392 -- 16.7 5GMEC, Cloud Security Research and Standardizations 392 -- 16.8 Conclusions 394 -- References 394 -- 17 Regulatory Impact on 5G Security and Privacy 399 /Jukka Salo and Madhusanka Liyanage -- 17.1 Introduction 399 -- 17.2 Regulatory Objectives for Security and Privacy 401 -- 17.2.1 Generic Objectives 401 -- 17.3 Legal Framework for Security and Privacy 402 -- 17.3.1 General Framework 402 -- 17.3.2 Legal Framework for Security and Privacy in Cloud Computing 403 -- 17.3.3 Legal Framework for Security and Privacy in Software Defined Networking and Network Function Virtualization 405 -- 17.4 Security and Privacy Issues in New 5G Technologies 405 -- 17.4.1 Security and Privacy Issues in Cloud Computing 405 -- 17.4.2 Security and Privacy Issues in Network Functions Virtualization 407 -- 17.4.3 Security and Privacy Issues in Software Defined Networking (SDN) 409 -- 17.4.4 Summary of Security and Privacy Issues in the Context of Technologies under Study (Clouds, NFV, SDN) 410 -- 17.5 Relevance Assessment of Security and Privacy Issues for Regulation 411 -- 17.6 Analysis of Potential Regulatory Approaches 412 -- 17.7 Summary of Issues and Impact of New Technologies on Security and Privacy Regulation 413 -- References 417 -- Index.
Record Nr. UNINA-9910270880303321
Hoboken, New Jersey : , : John Wiley & Sons, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Comprehensive guide to 5G security / / edited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila
Comprehensive guide to 5G security / / edited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , 2018
Descrizione fisica 1 online resource (441 pages) : illustrations
Disciplina 005.8
Soggetto topico Mobile communication systems - Security measures
Wireless communication systems - Security measures
ISBN 1-119-29305-7
1-119-29308-1
1-119-29307-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Editors xvii -- About the Contributors xxi -- Foreword xxxiii -- Preface xxxv -- Acknowledgements xli -- Part I 5G Security Overview 1 -- 1 Evolution of Cellular Systems 3 /Shahriar Shahabuddin, Sadiqur Rahaman, Faisal Rehman, Ijaz Ahmad, and Zaheer Khan -- 1.1 Introduction 3 -- 1.2 Early Development 4 -- 1.3 First Generation Cellular Systems 6 -- 1.3.1 Advanced Mobile Phone Service 7 -- 1.3.2 Security in 1G 7 -- 1.4 Second Generation Cellular Systems 8 -- 1.4.1 Global System for Mobile Communications 8 -- 1.4.2 GSM Network Architecture 9 -- 1.4.3 Code Division Multiple Access 10 -- 1.4.4 Security in 2G 10 -- 1.4.5 Security in GSM 11 -- 1.4.5.1 IMSI 11 -- 1.4.5.2 Ki 12 -- 1.4.5.3 A3 Algorithm 12 -- 1.4.5.4 A8 Algorithm 13 -- 1.4.5.5 COMP128 14 -- 1.4.5.6 A5 Algorithm 14 -- 1.4.6 Security in IS?]95 14 -- 1.5 Third Generation Cellular Systems 15 -- 1.5.1 CDMA 2000 15 -- 1.5.2 UMTS WCDMA 15 -- 1.5.3 UMTS Network Architecture 16 -- 1.5.4 HSPA 17 -- 1.5.5 Security in 3G 17 -- 1.5.6 Security in CDMA2000 17 -- 1.5.7 Security in UMTS 18 -- 1.6 Cellular Systems beyond 3G 20 -- 1.6.1 HSPA+ 20 -- 1.6.2 Mobile WiMAX 20 -- 1.6.3 LTE 21 -- 1.6.3.1 Orthogonal Frequency Division Multiplexing (OFDM) 21 -- 1.6.3.2 SC?]FDE and SC?]FDMA 21 -- 1.6.3.3 Multi?]antenna Technique 21 -- 1.6.4 LTE Network Architecture 21 -- 1.7 Fourth Generation Cellular Systems 22 -- 1.7.1 Key Technologies of 4G 23 -- 1.7.1.1 Enhanced MINO 23 -- 1.7.1.2 Cooperative Multipoint Transmission and Reception for LTE?]Advanced 23 -- 1.7.1.3 Spectrum and Bandwidth Management 24 -- 1.7.1.4 Carrier Aggregation 24 -- 1.7.1.5 Relays 24 -- 1.7.2 Network Architecture 24 -- 1.7.3 Beyond 3G and 4G Cellular Systems Security 25 -- 1.7.4 LTE Security Model 26 -- 1.7.5 Security in WiMAX 26 -- 1.8 Conclusion 27 -- References 28 -- 2 5G Mobile Networks: Requirements, Enabling Technologies, and Research Activities 31 /Van?]Giang Nguyen, Anna Brunstrom, Karl?]Johan Grinnemo, and Javid Taheri -- 2.1 Introduction 31 -- 2.1.1 What is 5G? 31.
2.1.1.1 From a System Architecture Perspective 32 -- 2.1.1.2 From the Spectrum Perspective 32 -- 2.1.1.3 From a User and Customer Perspective 32 -- 2.1.2 Typical Use Cases 32 -- 2.2 5G Requirements 33 -- 2.2.1 High Data Rate and Ultra Low Latency 34 -- 2.2.2 Massive Connectivity and Seamless Mobility 35 -- 2.2.3 Reliability and High Availability 35 -- 2.2.4 Flexibility and Programmability 36 -- 2.2.5 Energy, Cost and Spectrum Efficiency 36 -- 2.2.6 Security and Privacy 36 -- 2.3 5G Enabling Technologies 37 -- 2.3.1 5G Radio Access Network 38 -- 2.3.1.1 mmWave Communication 38 -- 2.3.1.2 Massive MIMO 38 -- 2.3.1.3 Ultra?]Dense Small Cells 39 -- 2.3.1.4 M2M and D2D Communications 40 -- 2.3.1.5 Cloud?]based Radio Access Network 42 -- 2.3.1.6 Mobile Edge and Fog Computing 42 -- 2.3.2 5G Mobile Core Network 44 -- 2.3.2.1 Software Defined Networking 44 -- 2.3.2.2 Network Function Virtualization 44 -- 2.3.2.3 Cloud Computing 46 -- 2.3.3 G End?]to?]End System 46 -- 2.3.3.1 Network Slicing 46 -- 2.3.3.2 Management and Orchestration 47 -- 2.4 5G Standardization Activities 48 -- 2.4.1 ITU Activities 48 -- 2.4.1.1 ITU?]R 49 -- 2.4.1.2 ITU?]T 49 -- 2.4.2 3GPP Activities 49 -- 2.4.2.1 Pre?]5G Phase 49 -- 2.4.2.2 5G Phase I 50 -- 2.4.2.3 5G Phase II 50 -- 2.4.3 ETSI Activities 50 -- 2.4.4 IEEE Activities 51 -- 2.4.5 IETF Activities 52 -- 2.5 5G Research Communities 52 -- 2.5.1 European 5G Related Activities 52 -- 2.5.1.1 5G Research in EU FP7 52 -- 2.5.1.2 5G Research in EU H2020 52 -- 2.5.1.3 5G Research in Celtic?]Plus 53 -- 2.5.2 Asian 5G Related Activities 53 -- 2.5.2.1 South Korea: 5G Forum 53 -- 2.5.2.2 Japan: 5GMF Forum 54 -- 2.5.2.3 China: IMT?]2020 5G Promotion Group 54 -- 2.5.3 American 5G Related Activities 54 -- 2.6 Conclusion 55 -- 2.7 Acknowledgement 55 -- References 55 -- 3 Mobile Networks Security Landscape 59 /Ahmed Bux Abro -- 3.1 Introduction 59 -- 3.2 Mobile Networks Security Landscape 59 -- 3.2.1 Security Threats and Protection for 1G 61 -- 3.2.2 Security Threats and Protection for 2G 61.
3.2.3 Security Threats and Protection for 3G 63 -- 3.2.4 Security Threats and Protection for 4G 63 -- 3.2.4.1 LTE UE (User Equipment) Domain Security 64 -- 3.2.4.2 LTE (Remote Access Network) Domain Security 65 -- 3.2.4.3 LTE Core Network Domain Security 65 -- 3.2.4.4 Security Threat Analysis for 4G 65 -- 3.2.5 Security Threats and Protection for 5G 66 -- 3.2.5.1 Next Generation Threat Landscape for 5G 68 -- 3.2.5.2 IoT Threat Landscape 68 -- 3.2.5.3 5G Evolved Security Model 68 -- 3.2.5.4 5G Security Threat Analysis 69 -- 3.3 Mobile Security Lifecycle Functions 70 -- 3.3.1 Secure Device Management 71 -- 3.3.2 Mobile OS and App Patch Management 71 -- 3.3.3 Security Threat Analysis and Assessment 71 -- 3.3.4 Security Monitoring 72 -- 3.4 Conclusion 73 -- References 73 -- 4 Design Principles for 5G Security 75 /Ijaz Ahmad, Madhusanka Liyanage, Shahriar Shahabuddin, Mika Ylianttila, and Andrei Gurtov -- 4.1 Introduction 75 -- 4.2 Overviews of Security Recommendations and Challenges 76 -- 4.2.1 Security Recommendations by ITU?]T 77 -- 4.2.2 Security Threats and Recommendations by NGMN 78 -- 4.2.3 Other Security Challenges 79 -- 4.2.3.1 Security Challenges in the Access Network 79 -- 4.2.3.2 DoS Attacks 79 -- 4.2.3.3 Security Challenges in the Control Layer or Core Network 80 -- 4.3 Novel Technologies for 5G Security 81 -- 4.3.1 5G Security Leveraging NFV 82 -- 4.3.2 Network Security Leveraging SDN 83 -- 4.3.3 Security Challenges in SDN 84 -- 4.3.3.1 Application Layer 84 -- 4.3.3.2 Controller Layer 85 -- 4.3.3.3 Infrastructure Layer 86 -- 4.3.4 Security Solutions for SDN 86 -- 4.3.4.1 Application Plane Security 86 -- 4.3.4.2 Control Plane Security 87 -- 4.3.4.3 Data Plane Security Solutions 87 -- 4.4 Security in SDN?]based Mobile Networks 88 -- 4.4.1 Data Link Security 88 -- 4.4.2 Control Channels Security 89 -- 4.4.3 Traffic Monitoring 91 -- 4.4.4 Access Control 91 -- 4.4.5 Network Resilience 91 -- 4.4.6 Security Systems and Firewalls 92 -- 4.4.7 Network Security Automation 92.
4.5 Conclusions and Future Directions 94 -- 4.6 Acknowledgement 95 -- References 95 -- 5 Cyber Security Business Models in 5G 99 /Julius Francis Gomes, Marika Iivari, Petri Ahokangas, Lauri Isotalo, Bengt Sahlin, and Jan Melén -- 5.1 Introduction 99 -- 5.2 The Context of Cyber Security Businesses 100 -- 5.2.1 Types of Cyber Threat 101 -- 5.2.2 The Cost of Cyber?]Attacks 102 -- 5.3 The Business Model Approach 103 -- 5.3.1 The 4C Typology of the ICT Business Model 104 -- 5.3.2 Business Models in the Context of Cyber Preparedness 105 -- 5.4 The Business Case of Cyber Security in the Era of 5G 106 -- 5.4.1 The Users and Issues of Cyber Security in 5G 108 -- 5.4.2 Scenarios for 5G Security Provisioning 109 -- 5.4.3 Delivering Cyber Security in 5G 110 -- 5.5 Business Model Options in 5G Cyber Security 112 -- 5.6 Acknowledgment 114 -- References 114 -- Part II 5G Network Security 117 -- 6 Physical Layer Security 119 /Simone Soderi, Lorenzo Mucchi, Matti Hämäläinen, Alessandro Piva, and Jari Iinatti -- 6.1 Introduction 119 -- 6.1.1 Physical Layer Security in 5G Networks 120 -- 6.1.2 Related Work 121 -- 6.1.3 Motivation 121 -- 6.2 WBPLSec System Model 123 -- 6.2.1 Transmitter 124 -- 6.2.2 Jamming Receiver 126 -- 6.2.3 Secrecy Metrics 126 -- 6.2.4 Secrecy Capacity of WBPLSec 128 -- 6.2.5 Secrecy Capacity of iJAM 129 -- 6.3 Outage Probability of Secrecy Capacity of a Jamming Receiver 131 -- 6.3.1 Simulation Scenario for Secrecy Capacity 134 -- 6.4 WBPLSec Applied to 5G networks 136 -- 6.5 Conclusions 138 -- References 139 -- 7 5G?]WLAN Security 143 /Satish Anamalamudi, Abdur Rashid Sangi, Mohammed Alkatheiri, Fahad T. Bin Muhaya, and Chang Liu -- 7.1 Chapter -- Overview 143 -- 7.2 Introduction to WiFi?]5G Networks Interoperability 143 -- 7.2.1 WiFi (Wireless Local Area Network) 143 -- 7.2.2 Interoperability of WiFi with 5G Networks 144 -- 7.2.3 WiFi Security 144 -- 7.3 Overview of Network Architecture for WiFi?]5G Networks Interoperability 146 -- 7.3.1 MAC Layer 147.
7.3.2 Network Layer 147 -- 7.3.3 Transport Layer 148 -- 7.3.4 Application Layer 149 -- 7.4 5G?]WiFi Security Challenges 150 -- 7.4.1 Security Challenges with Respect to a Large Number of Device Connectivity 151 -- 7.4.2 Security Challenges in 5G Networks and WiFi 151 -- 7.5 Security Consideration for Architectural Design of WiFi?]5G Networks 156 -- 7.5.1 User and Device Identity Confidentiality 156 -- 7.5.2 Integrity 156 -- 7.5.3 Mutual Authentication and Key Management 157 -- 7.6 LiFi Networks 158 -- 7.7 Introduction to LiFi?]5G Networks Interoperability 159 -- 7.8 5G?]LiFi Security Challenges 160 -- 7.8.1 Security Challenges with Respect to a Large Number of Device Connectivity 160 -- 7.8.2 Security Challenges in 5G Networks and LiFi 160 -- 7.9 Security Consideration for Architectural Design of LiFi?]5G Networks 160 -- 7.10 Conclusion and Future Work 161 -- References 161 -- 8 Safety of 5G Network Physical Infrastructures 165 /Rui Travanca and João André -- 8.1 Introduction 165 -- 8.2 Historical Development 168 -- 8.2.1 Typology 168 -- 8.2.2 Codes 170 -- 8.2.3 Outlook 170 -- 8.3 Structural Design Philosophy 171 -- 8.3.1 Basis 171 -- 8.3.2 Actions 174 -- 8.3.3 Structural Analysis 179 -- 8.3.4 Steel Design Verifications 180 -- 8.3.4.1 Ultimate Limit States 180 -- 8.3.4.2 Serviceability Limit States 181 -- 8.4 Survey of Problems 181 -- 8.4.1 General 181 -- 8.4.2 Design Failures 182 -- 8.4.3 Maintenance Failures 183 -- 8.4.4 Vandalism or Terrorism Failures 186 -- 8.5 Opportunities and Recommendations 188 -- 8.6 Acknowledgement 190 -- References 191 -- 9 Customer Edge Switching: A Security Framework for 5G 195 /Hammad Kabir, Raimo Kantola, and Jesus Llorente Santos -- 9.1 Introduction 195 -- 9.2 State?]of?]the?]art in Mobile Networks Security 197 -- 9.2.1 Mobile Network Challenges and Principles of Security Framework 200 -- 9.2.2 Trust Domains and Trust Processing 202 -- 9.3 CES Security Framework 203 -- 9.3.1 DNS to Initiate Communication 205 -- 9.3.2 CETP Policy?]based Communication 206.
9.3.3 Policy Architecture 208 -- 9.3.4 CES Security Mechanisms 209 -- 9.3.5 Realm Gateway 210 -- 9.3.6 RGW Security Mechanisms 211 -- 9.3.6.1 Name Server Classification and Allocation Model 212 -- 9.3.6.2 Preventing DNS Abuse 212 -- 9.3.6.3 Bot?]Detection Algorithm 213 -- 9.3.6.4 TCP?]Splice 213 -- 9.4 Evaluation of CES Security 213 -- 9.4.1 Evaluating the CETP Policy?]based Communication 214 -- 9.4.1.1 Security Testing 216 -- 9.4.1.2 Outcomes of the Security Testing 216 -- 9.4.2 Evaluation of RGW Security 217 -- 9.5 Deployment in 5G Networks 222 -- 9.5.1 Use Case 1: Mobile Broadband 224 -- 9.5.1.1 Deployment and Operations 224 -- 9.5.1.2 Security Benefits 224 -- 9.5.1.3 Scalability 225 -- 9.5.1.4 Reliability 225 -- 9.5.2 Use Case 2: Corporate Gateway 225 -- 9.5.2.1 Deployment and Operations 225 -- 9.5.2.2 Security Benefits 226 -- 9.5.2.3 Scalability 226 -- 9.5.2.4 Reliability 226 -- 9.5.3 Use Case 3: National CERT Centric Trust Domain 226 -- 9.5.3.1 Deployment and Operations 226 -- 9.5.3.2 Security Benefits 227 -- 9.5.3.3 Scalability 227 -- 9.5.3.4 Reliability 227 -- 9.5.4 Use Case 4: Industrial Internet for Road Traffic and Transport 227 -- 9.5.4.1 Deployment and Operations 227 -- 9.5.4.2 Security Benefits 228 -- 9.5.4.3 Scalability 228 -- 9.5.4.4 Reliability 228 -- 9.6 Conclusion 228 -- References 230 -- 10 Software Defined Security Monitoring in 5G Networks 231 /Madhusanka Liyanage, Ijaz Ahmad, Jude Okwuibe, Edgardo Montes de Oca, Mai Hoang Long, Oscar Lopez Perez, and Mikel Uriarte Itzazelaia -- 10.1 Introduction 231 -- 10.2 Existing Monitoring Techniques 232 -- 10.3 Limitations on Current Monitoring Techniques 233 -- 10.4 Use of Monitoring in 5G 234 -- 10.5 Software?]Defined Monitoring Architecture 235 -- 10.6 Expected Advantages of Software Defined Monitoring 238 -- 10.7 Expected Challenges in Software Defined Monitoring 240 -- 10.8 Conclusion 242 -- References 243 -- Part III 5G Device and User Security 245 -- 11 IoT Security 247 /Mehrnoosh Monshizadeh, and Vikramajeet Khatri.
11.1 Introduction 247 -- 11.2 Related Work 248 -- 11.3 Literature Overview and Research Motivation 249 -- 11.3.1 IoT Devices, Services and Attacks on Them 250 -- 11.3.2 Research Motivation 253 -- 11.4 Distributed Security Platform 254 -- 11.4.1 Robot Data Classification 254 -- 11.4.2 Robot Attack Classification 255 -- 11.4.3 Robot Security Platform 256 -- 11.4.3.1 Robot Section 257 -- 11.4.3.2 Mobile Network Section 257 -- 11.5 Mobile Cloud Robot Security Scenarios 259 -- 11.5.1 Robot with SIMcard 259 -- 11.5.2 SIMless Robot 260 -- 11.5.3 Robot Attack 263 -- 11.5.4 Robot Communication 263 -- 11.6 Conclusion 263 -- References 265 -- 12 User Privacy, Identity and Trust 267 /Tanesh Kumar, Madhusanka Liyanage, Ijaz Ahmad, An Braeken, and Mika Ylianttila -- 12.1 Introduction 267 -- 12.2 Background 268 -- 12.3 User Privacy 269 -- 12.3.1 Data Privacy 269 -- 12.3.2 Location Privacy 271 -- 12.3.3 Identity Privacy 272 -- 12.4 Identity Management 273 -- 12.5 Trust Models 274 -- 12.6 Discussion 277 -- 12.7 Conclusion 278 -- References 279 -- 13 5G Positioning: Security and Privacy Aspects 281 /Elena Simona Lohan, Anette Alén?]Savikko, Liang Chen, Kimmo Järvinen, Helena Leppäkoski, Heidi Kuusniemi, and Päivi Korpisaari -- 13.1 Introduction 281 -- 13.2 Outdoor versus Indoor Positioning Technologies 283 -- 13.3 Passive versus Active Positioning 283 -- 13.4 Brief Overview of 5G Positioning Mechanisms 285 -- 13.5 Survey of Security Threats and Privacy Issues in 5G Positioning 291 -- 13.5.1 Security Threats in 5G Positioning 291 -- 13.5.1.1 Security Threats Affecting Several or All Players 291 -- 13.5.1.2 Security Threats Affecting LISP 292 -- 13.5.1.3 Security Threats Affecting LBSP 293 -- 13.5.1.4 Security Threats Affecting the 5G User Device or LIC 293 -- 13.6 Main Privacy Concerns 294 -- 13.7 Passive versus Active Positioning Concepts 295 -- 13.8 Physical?] Layer Based Security Enhancements Mechanisms for Positioning in 5G 296 -- 13.8.1 Reliability Monitoring and Outlier Detection Mechanisms 296.
13.8.2 Detection, Location and Estimation of Interference Signals 297 -- 13.8.3 Backup Systems 298 -- 13.9 Enhancing Trustworthiness 299 -- 13.10 Cryptographic Techniques for Security and Privacy of Positioning 299 -- 13.10.1 Cryptographic Authentication in Positioning 300 -- 13.10.2 Cryptographic Distance?]Bounding 301 -- 13.10.3 Cryptographic Techniques for Privacy?]Preserving Location?]based Services 303 -- 13.11 Legislation on User Location Privacy in 5G 304 -- 13.11.1 EU Policy and Legal Framework 304 -- 13.11.2 Legal Aspects Related to the Processing of Location Data 306 -- 13.11.3 Privacy Protection by Design and Default 306 -- 13.11.4 Security Protection 307 -- 13.11.5 A Closer Look at the e?]Privacy Directive 307 -- 13.11.6 Summary of EU Legal Instruments 308 -- 13.11.7 International Issues 308 -- 13.11.8 Challenges and Future Scenarios in Legal Frameworks and Policy 309 -- 13.12 Landscape of the European and International Projects related to Secure Positioning 311 -- References 312 -- Part IV 5G Cloud and Virtual Network Security 321 -- 14 Mobile Virtual Network Operators (MVNO) Security 323 /Mehrnoosh Monshizadeh and Vikramajeet Khatri -- 14.1 Introduction 323 -- 14.2 Related Work 324 -- 14.3 Cloudification of the Network Operators 325 -- 14.4 MVNO Security 326 -- 14.4.1 Data Security in TaaS 327 -- 14.4.2 Hypervisor and VM Security in TaaS 328 -- 14.4.2.1 SDN Security in TaaS 329 -- 14.4.2.2 NFV Security in TaaS 331 -- 14.4.2.3 OPNFV Security 332 -- 14.4.3 Application Security in TaaS 333 -- 14.4.4 Summary 334 -- 14.4.5 MVNO Security Benchmark 335 -- 14.5 TaaS Deployment Security 338 -- 14.5.1 IaaS 338 -- 14.5.2 PaaS 340 -- 14.5.3 SaaS 340 -- 14.6 Future Directions 340 -- 14.7 Conclusion 341 -- References 342 -- 15 NFV and NFV?]based Security Services 347 /Wenjing Chu -- 15.1 Introduction 347 -- 15.2 5G, NFV and Security 347 -- 15.3 A Brief Introduction to NFV 348 -- 15.4 NFV, SDN, and a Telco Cloud 351 -- 15.5 Common NFV Drivers 353 -- 15.5.1 Technology Curve 353.
15.5.2 Opportunity Cost and Competitive Landscape 353 -- 15.5.3 Horizontal Network Slicing 354 -- 15.5.4 Multi?]Tenancy 354 -- 15.5.5 Rapid Service Delivery 354 -- 15.5.6 XaaS Models 354 -- 15.5.7 One Cloud 355 -- 15.6 NFV Security: Challenges and Opportunities 355 -- 15.6.1 VNF Security Lifecycle and Trust 355 -- 15.6.2 VNF Security in Operation 358 -- 15.6.3 Multi?]Tenancy and XaaS 359 -- 15.6.4 OPNFV and Openstack: Open Source Projects for NFV 360 -- 15.7 NFV?]based Security Services 364 -- 15.7.1 NFV?]based Network Security 365 -- 15.7.1.1 Virtual Security Appliances 365 -- 15.7.1.2 Distributed Network Security Services 366 -- 15.7.1.3 Network Security as a Service 366 -- 15.7.2 Policy?]based Security Services 366 -- 15.7.2.1 Group?]based Policy 367 -- 15.7.2.2 Openstack Congress 368 -- 15.7.3 Machine Learning for NFV?]based Security Services 369 -- 15.8 Conclusions 370 -- References 370 -- 16 Cloud and MEC Security 373 /Jude Okwuibe, Madhusanka Liyanage, Ijaz Ahmed, and Mika Ylianttila -- 16.1 Introduction 373 -- 16.2 Cloud Computing in 5G Networks 374 -- 16.2.1 Overview and History of Cloud Computing 375 -- 16.2.2 Cloud Computing Architecture 376 -- 16.2.3 Cloud Deployment Models 377 -- 16.2.4 Cloud Service Models 378 -- 16.2.5 5G Cloud Computing Architecture 379 -- 16.2.6 Use Cases/Scenarios of Cloud Computing in 5G 380 -- 16.3 MEC in 5G Networks 381 -- 16.3.1 Overview of MEC Computing 381 -- 16.3.2 MEC in 5G 383 -- 16.3.3 Use Cases of MEC Computing in 5G 384 -- 16.4 Security Challenges in 5G Cloud 385 -- 16.4.1 Virtualization Security 385 -- 16.4.2 Cyber?]Physical System (CPS) Security 386 -- 16.4.3 Secure and Private Data Computation 386 -- 16.4.4 Cloud Intrusion 387 -- 16.4.5 Access Control 387 -- 16.5 Security Challenges in 5G MEC 388 -- 16.5.1 Denial of Service (DoS) Attack 389 -- 16.5.2 Man?]in?]the?]Middle (MitM) 389 -- 16.5.3 Inconsistent Security Policies 389 -- 16.5.4 VM Manipulation 390 -- 16.5.5 Privacy Leakage 390 -- 16.6 Security Architectures for 5G Cloud and MEC 391.
16.6.1 Centralized Security Architectures 391 -- 16.6.2 SDN?]based Cloud Security Systems 392 -- 16.7 5GMEC, Cloud Security Research and Standardizations 392 -- 16.8 Conclusions 394 -- References 394 -- 17 Regulatory Impact on 5G Security and Privacy 399 /Jukka Salo and Madhusanka Liyanage -- 17.1 Introduction 399 -- 17.2 Regulatory Objectives for Security and Privacy 401 -- 17.2.1 Generic Objectives 401 -- 17.3 Legal Framework for Security and Privacy 402 -- 17.3.1 General Framework 402 -- 17.3.2 Legal Framework for Security and Privacy in Cloud Computing 403 -- 17.3.3 Legal Framework for Security and Privacy in Software Defined Networking and Network Function Virtualization 405 -- 17.4 Security and Privacy Issues in New 5G Technologies 405 -- 17.4.1 Security and Privacy Issues in Cloud Computing 405 -- 17.4.2 Security and Privacy Issues in Network Functions Virtualization 407 -- 17.4.3 Security and Privacy Issues in Software Defined Networking (SDN) 409 -- 17.4.4 Summary of Security and Privacy Issues in the Context of Technologies under Study (Clouds, NFV, SDN) 410 -- 17.5 Relevance Assessment of Security and Privacy Issues for Regulation 411 -- 17.6 Analysis of Potential Regulatory Approaches 412 -- 17.7 Summary of Issues and Impact of New Technologies on Security and Privacy Regulation 413 -- References 417 -- Index.
Record Nr. UNINA-9910821709903321
Hoboken, New Jersey : , : John Wiley & Sons, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Software defined mobile networks (SDMN) : beyond LTE network architecture / / edited by Madhusanka Liyanage, Centre for Wireless Communication, University of Oulu, Oulu, Finland, Andrei Gurtov, Helsinki Institute for Information Technology HIIT, Aalto University, Espoo, Finland, Mika Ylianttila, Centre for Internet Excellence, University of Oulu, Oulu, Finland
Software defined mobile networks (SDMN) : beyond LTE network architecture / / edited by Madhusanka Liyanage, Centre for Wireless Communication, University of Oulu, Oulu, Finland, Andrei Gurtov, Helsinki Institute for Information Technology HIIT, Aalto University, Espoo, Finland, Mika Ylianttila, Centre for Internet Excellence, University of Oulu, Oulu, Finland
Edizione [1st edition]
Pubbl/distr/stampa West Sussex, United Kingdom : , : Wiley, , 2015
Descrizione fisica 1 online resource (441 p.)
Disciplina 004.6/5
Altri autori (Persone) GurtovAndrei
YlianttilaMika
Collana Wiley series on communications networking & distributed systems
Soggetto topico Software-defined networking (Computer network technology)
ISBN 1-118-90026-X
1-118-90025-1
1-118-90027-8
Classificazione TEC061000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Foreword Ulf Ewaldsson, VP, Ericsson Foreword Lauri Oksanen, VP, Nokia Networks Part 1 : Introduction 1 Overview Madhusanka Liyanage, Mika Ylianttila, Andrei Gurtov 1.1 Present Mobile networks and its Limitations 1.2 Software Defined Mobile Network 1.3 Key Benefits of SDMN 1.4 Conclusion 2 Mobile Network History Brian Brown, Rob Gonzalez, Brian Stanford 2.1 Chapter Overview 2.2 The Evolution of the Mobile Network 2.3 Limitations and Challenges in Current Mobile Networks 2.4 Requirement in future mobile networks 3 Software Defined Networking Concepts Xenofon Foukas, Mahesh K -- Marina, Kimon Kontovasilis 3.1 Introduction 3.2 SDN History and Evolution 3.3 SDN Paradigm and Applications 3.4 Impact of SDN to Research and Industry 4 Wireless Software Defined Networking Claude Chaudet, Yoram Haddad 4.1 Introduction 4.2 SDN for wireless 4.3 Related Works 4.4 Wireless SDN opportunities 4.5 Wireless SDN challenges 4.6 Conclusion 5 Leveraging SDN for The 5G Networks: Trends, Prospects and Challenges Akram Hakiri, Pascal Berthou 5.1 Introduction 5.2 Evolution of the Wireless Communication towards the 5G 5.3 Software-Defined Networks 5.4 Network Function Virtualization 5.5 Information-Centric Networking 5.6 Mobile and Wireless Networks 5.7 Cooperative Cellular Networks 5.8 Unification of the control plane 5.9 Supporting automatic QoS provisioning 5.10 Cognitive Network Management and Operation 5.11 Role of Satellites in the 5G networks 5.12 Conclusion Part II : SDMN Architectures and Network implementation 6 LTE architecture integration with SDN Jose Costa-Requena, Raimo Kantola, Jesús Llorente Santos, Vicent Ferrer Guasch, Maël Kimmerlin, Antti Mikola, Jukka Manner 6.1 Chapter Overview 6.2 Restructuring mobile networks to SDN 6.3 Mobile Backhaul Scaling 6.4 Security and distributed FW 6.5 SDN and LTE integration benefits 6.6 SDN and LTE integration benefits for end users 6.7 Related work and Research questions 6.8 Conclusions 7 EPC in the Cloud James Kempf, Kumar Balachandran 7.1 Introduction 7.1.3 SDN and Cross-domain Service Development 7.2 EPC in the Cloud Version 1.0 7.3 EPC in the Cloud Version 2.0? 7.4 Incorporating Mobile Services into Cross-Domain Orchestration with SP-SDN 7.5 Summary and Conclusions 8 The Controller Placement Problem in Software-Defined Mobile Networks (SDMN) Hakan Selvi, Selcan Guner, Gurkan Gur, Fatih Alagoz 8.1 Introduction 8.2 SDN and Mobile Networks 8.3 Performance Objectives for SDMN Controller Placement 8.4 Controller Placement Problem (CPP) 8.5 Conclusion 9 Technology Evolution in Mobile Networks - Case of Open IaaS-cloud Platforms Antti Tolonen, Sakari Luukkainen 9.1 Introduction 9.2 Generic Technology Evolution 9.3 Study Framework 9.4 Overview on Cloud Computing 9.5 Example Platform: OpenStack 9.6 Case Analysis 9.7 Discussion 9.8 Chapter Summary Part III : Traffic Transport and Network Management 10 Mobile Network Function and Service Delivery Virtualization and Orchestration Peter Bosch, Alessandro Duminuco, Jeff Napper, Louis (Sam) Samuel, Paul Polakos 10.1 Introduction 10.2 Network Function Virtualization (NFV) 10.3 Software Defined Networking (SDN) 10.4 The Mobility use case 10.5 Virtual networking in data centers 10.6 Summary 11 Survey of Traffic Management in Software-Defined Mobile Networks Zoltan Faigl, Laszlo Bokor 11.1 Chapter Overview 11.2 Traffic management in mobile networks 11.3 QoS enforcement and policy control in 3G/4G networks 11.4 Traffic management in software-defined mobile networks 11.5 Application-layer traffic optimization in software-defined mobile networks 11.6 Conclusions 12 Software Defined Networks for mobile application services Ram Gopal Lakshmi Narayanan 12.1 Chapter Overview 12.2 Overview of 3GPP Network Architecture 12.3 Wireless network architecture evolution towards NFV and SDN 12.4 NFV/SDN Service Chaining 12.5 Open research and further study 13 Load Balancing in Software Defined Mobile Networks Ijaz Ahmad, Suneth Namal, Mika Ylianttila, Andrei Gurtov 13.1 Introduction 13.2 Load Balancing in SDMN 13.3 Future Directions and Challenges for Load-Balancing Technologies Part IV : Resource and Mobility Management 14 QoE Management Framework for Internet Services in SDN enabled mobile networks Dipl.-Ing -- Marcus Eckert, Dr.-Ing -- Thomas Martin Knoll 14.1 Chapter Overview 14.2 Introduction 14.3 State of the Art 14.4 QoE Framework Architecture 14.5 QoE Monitoring (QMON) 14.6 QoE Policy and Rules (QRULE) 14.7 QoE Enforcement (QEN) 14.8 Demonstrator 14.9 Summary 15 Software Defined Mobility Management for Mobile Internet Jun Bi, You Wang 15.1 Chapter Overview 15.2 Internet Mobility and Problem Statement 15.3 Software Defined Internet Mobility Management 15.4 Conclusion 16 Mobile Virtual Network Operators: A Software Defined Mobile Network Perspective M -- Bala Krishna 16.1 Introduction 16.2 Architecture of MVNO: A SDMN Perspective 16.3 MNO, MVNE and MVNA Interactions with MVNO 16.4 MVNO Developments in 3G, 4G and LTE 16.5 Cognitive MVNO 16.6 MVNO Business Strategies 16.7 Conclusions 16.8 Future Directions Part V : Security and Economic Aspects 17 Software Defined Mobile Network Security Ahmed Bux Abro 17.1 Introduction 17.2 Evolving threat landscape for mobile networks 17.3 Traditional ways to cope with security threats in mobile networks 17.4 Principles of adequate Security for mobile network 17.5 Typical security architecture for mobile networks 17.6 Enhanced security for SDMN 17.7 SDMN Security applications 18 Security aspects of SDMN Edgardo Montes de Oca, Wissam Mallouli 18.1 Chapter Overview 18.2 State of the art and security challenges in SDMN architectures 18.3 Monitoring techniques 18.4 Other important aspects 18.4 Conclusion 19 SDMN: Industry Architecture Evolution Paths Nan Zhang, Tapio Leva, Heikki Hammainen 19.1 Introduction 19.2 From current mobile networks to SDMN 19.3 Business roles of SDMN 19.4 Industry architectures of evolutionary SDMN 19.5 Industry architectures of revolutionary SDMN 19.6 Discussion Index .
Record Nr. UNINA-9910131379203321
West Sussex, United Kingdom : , : Wiley, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Software defined mobile networks (SDMN) : beyond LTE network architecture / / edited by Madhusanka Liyanage, Centre for Wireless Communication, University of Oulu, Oulu, Finland, Andrei Gurtov, Helsinki Institute for Information Technology HIIT, Aalto University, Espoo, Finland, Mika Ylianttila, Centre for Internet Excellence, University of Oulu, Oulu, Finland
Software defined mobile networks (SDMN) : beyond LTE network architecture / / edited by Madhusanka Liyanage, Centre for Wireless Communication, University of Oulu, Oulu, Finland, Andrei Gurtov, Helsinki Institute for Information Technology HIIT, Aalto University, Espoo, Finland, Mika Ylianttila, Centre for Internet Excellence, University of Oulu, Oulu, Finland
Edizione [1st edition]
Pubbl/distr/stampa West Sussex, United Kingdom : , : Wiley, , 2015
Descrizione fisica 1 online resource (441 p.)
Disciplina 004.6/5
Altri autori (Persone) GurtovAndrei
YlianttilaMika
Collana Wiley series on communications networking & distributed systems
Soggetto topico Software-defined networking (Computer network technology)
ISBN 1-118-90026-X
1-118-90025-1
1-118-90027-8
Classificazione TEC061000
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Machine generated contents note: Foreword Ulf Ewaldsson, VP, Ericsson Foreword Lauri Oksanen, VP, Nokia Networks Part 1 : Introduction 1 Overview Madhusanka Liyanage, Mika Ylianttila, Andrei Gurtov 1.1 Present Mobile networks and its Limitations 1.2 Software Defined Mobile Network 1.3 Key Benefits of SDMN 1.4 Conclusion 2 Mobile Network History Brian Brown, Rob Gonzalez, Brian Stanford 2.1 Chapter Overview 2.2 The Evolution of the Mobile Network 2.3 Limitations and Challenges in Current Mobile Networks 2.4 Requirement in future mobile networks 3 Software Defined Networking Concepts Xenofon Foukas, Mahesh K -- Marina, Kimon Kontovasilis 3.1 Introduction 3.2 SDN History and Evolution 3.3 SDN Paradigm and Applications 3.4 Impact of SDN to Research and Industry 4 Wireless Software Defined Networking Claude Chaudet, Yoram Haddad 4.1 Introduction 4.2 SDN for wireless 4.3 Related Works 4.4 Wireless SDN opportunities 4.5 Wireless SDN challenges 4.6 Conclusion 5 Leveraging SDN for The 5G Networks: Trends, Prospects and Challenges Akram Hakiri, Pascal Berthou 5.1 Introduction 5.2 Evolution of the Wireless Communication towards the 5G 5.3 Software-Defined Networks 5.4 Network Function Virtualization 5.5 Information-Centric Networking 5.6 Mobile and Wireless Networks 5.7 Cooperative Cellular Networks 5.8 Unification of the control plane 5.9 Supporting automatic QoS provisioning 5.10 Cognitive Network Management and Operation 5.11 Role of Satellites in the 5G networks 5.12 Conclusion Part II : SDMN Architectures and Network implementation 6 LTE architecture integration with SDN Jose Costa-Requena, Raimo Kantola, Jesús Llorente Santos, Vicent Ferrer Guasch, Maël Kimmerlin, Antti Mikola, Jukka Manner 6.1 Chapter Overview 6.2 Restructuring mobile networks to SDN 6.3 Mobile Backhaul Scaling 6.4 Security and distributed FW 6.5 SDN and LTE integration benefits 6.6 SDN and LTE integration benefits for end users 6.7 Related work and Research questions 6.8 Conclusions 7 EPC in the Cloud James Kempf, Kumar Balachandran 7.1 Introduction 7.1.3 SDN and Cross-domain Service Development 7.2 EPC in the Cloud Version 1.0 7.3 EPC in the Cloud Version 2.0? 7.4 Incorporating Mobile Services into Cross-Domain Orchestration with SP-SDN 7.5 Summary and Conclusions 8 The Controller Placement Problem in Software-Defined Mobile Networks (SDMN) Hakan Selvi, Selcan Guner, Gurkan Gur, Fatih Alagoz 8.1 Introduction 8.2 SDN and Mobile Networks 8.3 Performance Objectives for SDMN Controller Placement 8.4 Controller Placement Problem (CPP) 8.5 Conclusion 9 Technology Evolution in Mobile Networks - Case of Open IaaS-cloud Platforms Antti Tolonen, Sakari Luukkainen 9.1 Introduction 9.2 Generic Technology Evolution 9.3 Study Framework 9.4 Overview on Cloud Computing 9.5 Example Platform: OpenStack 9.6 Case Analysis 9.7 Discussion 9.8 Chapter Summary Part III : Traffic Transport and Network Management 10 Mobile Network Function and Service Delivery Virtualization and Orchestration Peter Bosch, Alessandro Duminuco, Jeff Napper, Louis (Sam) Samuel, Paul Polakos 10.1 Introduction 10.2 Network Function Virtualization (NFV) 10.3 Software Defined Networking (SDN) 10.4 The Mobility use case 10.5 Virtual networking in data centers 10.6 Summary 11 Survey of Traffic Management in Software-Defined Mobile Networks Zoltan Faigl, Laszlo Bokor 11.1 Chapter Overview 11.2 Traffic management in mobile networks 11.3 QoS enforcement and policy control in 3G/4G networks 11.4 Traffic management in software-defined mobile networks 11.5 Application-layer traffic optimization in software-defined mobile networks 11.6 Conclusions 12 Software Defined Networks for mobile application services Ram Gopal Lakshmi Narayanan 12.1 Chapter Overview 12.2 Overview of 3GPP Network Architecture 12.3 Wireless network architecture evolution towards NFV and SDN 12.4 NFV/SDN Service Chaining 12.5 Open research and further study 13 Load Balancing in Software Defined Mobile Networks Ijaz Ahmad, Suneth Namal, Mika Ylianttila, Andrei Gurtov 13.1 Introduction 13.2 Load Balancing in SDMN 13.3 Future Directions and Challenges for Load-Balancing Technologies Part IV : Resource and Mobility Management 14 QoE Management Framework for Internet Services in SDN enabled mobile networks Dipl.-Ing -- Marcus Eckert, Dr.-Ing -- Thomas Martin Knoll 14.1 Chapter Overview 14.2 Introduction 14.3 State of the Art 14.4 QoE Framework Architecture 14.5 QoE Monitoring (QMON) 14.6 QoE Policy and Rules (QRULE) 14.7 QoE Enforcement (QEN) 14.8 Demonstrator 14.9 Summary 15 Software Defined Mobility Management for Mobile Internet Jun Bi, You Wang 15.1 Chapter Overview 15.2 Internet Mobility and Problem Statement 15.3 Software Defined Internet Mobility Management 15.4 Conclusion 16 Mobile Virtual Network Operators: A Software Defined Mobile Network Perspective M -- Bala Krishna 16.1 Introduction 16.2 Architecture of MVNO: A SDMN Perspective 16.3 MNO, MVNE and MVNA Interactions with MVNO 16.4 MVNO Developments in 3G, 4G and LTE 16.5 Cognitive MVNO 16.6 MVNO Business Strategies 16.7 Conclusions 16.8 Future Directions Part V : Security and Economic Aspects 17 Software Defined Mobile Network Security Ahmed Bux Abro 17.1 Introduction 17.2 Evolving threat landscape for mobile networks 17.3 Traditional ways to cope with security threats in mobile networks 17.4 Principles of adequate Security for mobile network 17.5 Typical security architecture for mobile networks 17.6 Enhanced security for SDMN 17.7 SDMN Security applications 18 Security aspects of SDMN Edgardo Montes de Oca, Wissam Mallouli 18.1 Chapter Overview 18.2 State of the art and security challenges in SDMN architectures 18.3 Monitoring techniques 18.4 Other important aspects 18.4 Conclusion 19 SDMN: Industry Architecture Evolution Paths Nan Zhang, Tapio Leva, Heikki Hammainen 19.1 Introduction 19.2 From current mobile networks to SDMN 19.3 Business roles of SDMN 19.4 Industry architectures of evolutionary SDMN 19.5 Industry architectures of revolutionary SDMN 19.6 Discussion Index .
Record Nr. UNINA-9910808008703321
West Sussex, United Kingdom : , : Wiley, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Structured peer-to-peer systems : fundamentals of hierarchical organization, routing, scaling, and security / / Dmitry Korzun, Andrei Gurtov ; foreword by Ion Stoica
Structured peer-to-peer systems : fundamentals of hierarchical organization, routing, scaling, and security / / Dmitry Korzun, Andrei Gurtov ; foreword by Ion Stoica
Autore Korzun Dmitry
Pubbl/distr/stampa New York, : Springer, 2013
Descrizione fisica 1 online resource (375 p.)
Disciplina 004.652
Altri autori (Persone) GurtovAndrei
Soggetto topico Peer-to-peer architecture (Computer networks)
ISBN 1-283-90998-7
1-4614-5483-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. I. Introduction -- pt. II. Local strategies -- pt. III. Beyond the local knowledge -- pt. IV. Applications.
Record Nr. UNINA-9910437564903321
Korzun Dmitry  
New York, : Springer, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui