top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
5G Wireless Network Security and Privacy / / DongFeng Fang, Yi Qian, and Rose Qingyang Hu
5G Wireless Network Security and Privacy / / DongFeng Fang, Yi Qian, and Rose Qingyang Hu
Autore Fang Dongfeng
Edizione [First edition.]
Pubbl/distr/stampa Chichester, England : , : John Wiley & Sons Ltd, , [2024]
Descrizione fisica 1 online resource (131 pages)
Disciplina 621.3845/6
Collana IEEE Press Series
Soggetto topico 5G mobile communication systems - Security measures
ISBN 1-119-78431-X
1-119-78434-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright -- Contents -- About the Authors -- Preface -- Acknowledgments -- Introduction -- Chapter 1 Introduction to 5G Wireless Systems -- 1.1 Motivations and Objectives of 5G Wireless Networks -- 1.2 Security Drives and Requirements -- 1.3 5G Wireless Network Architecture -- 1.3.1 Overview of the 5G Wireless Network Architecture -- 1.3.2 Comparison Between the Legacy Cellular Network and the 5G Wireless Network -- 1.4 Conclusion -- Chapter 2 Security from Legacy Wireless Systems to 5G Networks -- 2.1 Network Security for Legacy Systems -- 2.2 Security Attacks and Security Services in 5G Wireless Networks -- 2.2.1 Security Attacks -- 2.2.2 Security Services -- 2.2.2.1 Authentication -- 2.2.2.2 Confidentiality -- 2.2.2.3 Availability -- 2.2.2.4 Integrity -- 2.3 The Evolution of Wireless Security Architectures from 3G to 5G -- 2.3.1 3G Security Architecture -- 2.3.2 4G Security Architecture -- 2.3.3 5G Wireless Security Architecture -- 2.3.3.1 Overview of the Proposed 5G Wireless Security Architecture -- 2.3.3.2 Security Domains -- 2.4 Summary -- Chapter 3 Security Mechanisms in 5G Wireless Systems -- 3.1 Cryptographic Approaches and Physical Layer Security -- 3.2 Authentication -- 3.3 Availability -- 3.4 Data Confidentiality -- 3.5 Key Management -- 3.6 Privacy -- 3.7 Conclusion -- Chapter 4 An Efficient Security Solution Based on Physical Layer Security in 5G Wireless Networks -- 4.1 Enhancing 5G Security Through Artificial Noise and Interference Utilization -- 4.2 A HetNet System Model and Security Analysis -- 4.2.1 System Model and Threat Model -- 4.2.2 Security Analysis -- 4.3 Problem Formulation and Analysis -- 4.3.1 Maximum Secrecy Rate -- 4.3.2 The Proposed Algorithm -- 4.4 Numerical and Simulation Results -- 4.5 Conclusion.
Chapter 5 Flexible and Efficient Security Schemes for IoT Applications in 5G Wireless Systems -- 5.1 IoT Application Models and Current Security Challenges -- 5.2 A General System Model for IoT Applications Over 5G -- 5.2.1 System Architecture -- 5.2.2 Trust Models -- 5.2.3 Threat Models and Design Objectives -- 5.3 The 5G Authentication and Secure Data Transmission Scheme -- 5.3.1 Overview of the 5G Authentication and Secure Data Transmission Scheme -- 5.3.2 The Detailed Scheme -- 5.3.2.1 Phase 1 - System Initialization -- 5.3.2.2 Phase 2 - Authentication and Initial Session Key Agreement -- 5.3.2.3 Phase 3 - Data Transmission -- 5.3.2.4 Phase 4 - Data Receiving -- 5.3.2.5 Phase 5 - T2 IoT Devices Authentication and Initial Session Key Agreement -- 5.4 Security Analysis -- 5.4.1 Protocol Verification -- 5.4.2 Security Objectives -- 5.4.2.1 Mutual Authentication -- 5.4.2.2 Initial Session Key Agreement -- 5.4.2.3 Data Confidentiality and Integrity -- 5.4.2.4 Contextual Privacy -- 5.4.2.5 Forward Security -- 5.4.2.6 End‐to‐End Security -- 5.4.2.7 Key Escrow Resilience -- 5.5 Performance Evaluation -- 5.5.1 Security Services -- 5.5.2 Computational Overhead -- 5.5.3 Communication Overhead -- 5.6 Conclusion -- Chapter 6 Secure and Efficient Mobility Management in 5G Wireless Networks -- 6.1 Handover Issues and Requirements Over 5G Wireless Networks -- 6.2 A 5G CN Model and HetNet System Model -- 6.3 5G Handover Scenarios and Procedures -- 6.3.1 Handover Scenarios -- 6.3.2 Handover Procedures -- 6.4 A New Authentication Protocol for 5G Networks -- 6.4.1 Assumptions -- 6.4.2 Pre‐Authentication -- 6.4.3 Full Authentication -- 6.4.4 Fast Authentication -- 6.4.4.1 Handover Between APs -- 6.4.4.2 Handover Between BSs -- 6.5 Security Analysis of the New 5G Authentication Protocols -- 6.6 Performance Evaluations -- 6.6.1 Communication Overhead.
6.6.2 Computation Overhead -- 6.7 Conclusion -- Chapter 7 Open Issues and Future Research Directions for Security and Privacy in 5G Networks -- 7.1 New Trust Models -- 7.2 New Security Attack Models -- 7.3 Privacy Protection -- 7.4 Unified Security Management -- References -- Index -- EULA.
Record Nr. UNINA-9910830427503321
Fang Dongfeng  
Chichester, England : , : John Wiley & Sons Ltd, , [2024]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Secure communication for 5G and IoT networks / / S. Velliangiri, M. Gunasekaran, P. Karthikeyan, editors
Secure communication for 5G and IoT networks / / S. Velliangiri, M. Gunasekaran, P. Karthikeyan, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (248 pages)
Disciplina 621.38456
Collana EAI/Springer Innovations in Communication and Computing
Soggetto topico 5G mobile communication systems - Security measures
Internet of things - Security measures
ISBN 3-030-79766-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Chapter 1: Security Challenges in 5G and IoT Networks: A Review -- 1.1 Introduction -- 1.2 Technologies for Securing 5G-Based IoT Networks -- 1.2.1 Authentication and Access Control -- 1.2.2 Blockchain-Based Security -- 1.2.3 Machine Learning and Big Data-Based Security -- 1.2.4 Cryptographic Algorithms-Based Security -- 1.2.5 Security in Software-Defined Framework and Virtualization -- 1.2.6 Adaptive Security Approaches -- 1.3 Securing the 5G-Based IoT Applications -- 1.3.1 Securing the Smart Grid -- 1.3.2 Securing the Smart Home -- 1.3.3 Securing the Intelligent UAV -- 1.3.4 Securing the VANET -- 1.3.5 Securing the Smart City -- 1.3.6 Securing the Smart Factory -- 1.3.7 Securing the Smart Health -- 1.3.8 Security in Other Applications -- Financial Innovation -- Environment -- Smart Agriculture -- 1.4 Research Challenges in Securing 5G-IoT Networks -- 1.4.1 Challenges Related to 5G-IoT Architecture -- 1.4.2 Challenges Related to Blockchain Technologies -- 1.4.3 Challenges Related to Energy -- 1.4.4 Challenges Related to Artificial Intelligence -- 1.4.5 Challenges Related to Software Defined Networks -- 1.5 Conclusion -- References -- Chapter 2: Energy-Efficient Network Routing Protocols for IoT Applications -- 2.1 Introduction -- 2.2 Issues and Challenges in IoT -- 2.3 Classification of Routing Protocols in IoT -- 2.3.1 Packet Forwarding -- 2.3.2 Route Discovery -- 2.3.3 Routing Schemes -- 2.3.4 Routing Operations -- Context-Based Routing -- Content-Based Routing -- Energy-Aware Routing -- Negotiation-Based Routing -- Naive-Based Routing -- Hierarchical Routing -- 2.4 Analysis of Prominent Clustering Routing Protocols -- 2.5 Research Platforms and Tools -- 2.6 Summary and Conclusion -- References -- Chapter 3: Cybersecurity in 5G and IoT Networks -- 3.1 Introduction to 5G and IoT -- 3.1.1 Overview of 5G and IoT.
3.2 Requirements of 5G and IoT -- 3.2.1 Architecture of 5G and IoT -- 3.3 Crowdsourcing Use Cases and Evolution to 5G IoT Cybersecurity -- 3.3.1 Use Case for Commercial Purpose -- 3.3.2 Mitigation of Physical Attacks -- 3.3.3 Collaboration Among End Users -- 3.4 Crowdsourcing for 5G IoT Cybersecurity -- 3.4.1 IoT Devices in 5G-A Capillary Network -- 3.4.2 Dynamic Ran Enablers in 5G IoT -- 3.5 Entity-Based Crowdsourcing Model -- 3.5.1 Applying the End-User Collaboration Crowdsourcing Model -- Users or Service Providers -- D2D Devices for 5G Infrastructure -- Digital Witness-LEA's -- 3.6 Business Model and Cybersecurity -- 3.6.1 Need for Cybersecurity in 5G IoT -- 3.7 Uses and Benefits of 5G IoT in Smart Grid -- 3.7.1 Uses of 5G IoT in Smart Grid -- 3.7.2 Advantages of 5G IoT in Smart Grid -- Advanced Metering Infrastructure (AMI) -- Improved Reliability of Power System -- SMADA (Supervisory Monitoring and Data Acquisition) Improved Functions -- 3.8 Cybersecurity Challenges in 5G IoT -- 3.8.1 Classification of Recent Attacks -- Device Attack -- Data Attack -- Privacy Attack -- Network Attack -- 3.8.2 Classification of Recent Attacks -- Access Control -- Encryption -- Authentication -- Intrusion Detection System (IDS) -- 3.9 Major Challenges Hindering the Growth of 5G and IoT Networks -- 3.9.1 Standardization of 5G IoT Protocols -- 3.9.2 Cognitive Capability in 5G IoT -- 3.9.3 High Speed 5G Networks -- 3.9.4 Privacy Issues -- 3.10 IoT Based Security Management System -- 3.10.1 Cybersecurity Oriented IoT Architecture -- 3.10.2 Cybersecurity Attacks on IoT -- 3.10.3 Attack Taxonomy -- 3.11 Key Applications of 5G and IoT in Industries -- 3.11.1 Smart Grid Applications -- 3.11.2 Tactile Robots -- 3.11.3 Heterogeneous Networks (HtNet) -- 3.11.4 5G and IoT Applications in Smart Cities Deployment -- References -- Chapter 4: 5G and IoT Networks Risk Management.
4.1 Introduction -- 4.2 5G and IoT Risk Administration -- 4.2.1 5G and IoT Security Controls -- Network Security for 5G and IoT -- Protected System Services -- Transport Risk Procedure -- Information and Solitude -- Solitude Anxiety -- Protect Firmware for IoT Devices -- Physical Safety -- Individuality Administration -- 4.3 Healthcare Environment Risk Management -- 4.3.1 IoT Healthcare Components and Its Risks -- 4.3.2 Clinical Technology Risk Factors -- Unconstrained Failures -- Detachment Violations -- Masterminded Trouble -- Customary Disruption -- 4.3.3 5G with IoT Medical Devices Risk Management -- 4.3.4 Thriving, Security, and Usefulness of 5G with IoT Medical Devices Risk Management -- Build Security into Devices from the Outset Rather Than as an Afterthought -- Make 5G and IoT Relationship -- 4.4 IoT Cyber Risk Management -- 4.4.1 IoT Architecture Cyber Risk -- Recognition Layer -- Organization Layer -- Agreement Layer -- Application Layer -- 4.4.2 Cyber Risk Management Review -- Predominance Approaches -- Greatness Approaches -- 4.4.3 IoT Cyber Risk Management Framework -- IoT Cyber Ecosystem Layer -- Foundation Layer -- Assessment Layer -- 4.5 Smart Home Applications Risk Management -- 4.5.1 Appreciate the Smart Home Risks -- Clever Home Technology Precautions -- Three Potential Dangers Related to Clever Home Development Are -- Smart Home Systems Leave You as Unapproved -- Devices Can Leave You as Vulnerability -- Shortcoming Devices Will Leave You as -- 4.5.2 Two or Three Key Ways to Deal with Stay Before Extortion Chances Include -- Remain Safe, Stay Safe... -- Directed Attacks -- Data Fraud -- Secret Word Exploitation -- Area Tracking -- Home Intrusions -- Machine or Property Damage -- Rebel Recordings -- Outsider Flaws -- Information Manipulation -- Obsolete Software -- 4.5.3 Savvy Cities 5G and IoT Risk Management.
Safety Risks in Smart Cities -- Risk Factors -- Advancement Limitations -- Vulnerable Implementation -- 4.5.4 Hazards and Countermeasures -- Man-in-the-Center -- Information and Rebate Deception -- Gadget Getting -- Streamed Denial of Service (DDoS) -- Suffering Denial of Service (PDoS) -- References -- Chapter 5: Machine Learning IDS Models for 5G and IoT -- 5.1 Introduction -- 5.1.1 Internet of Things (IoT) -- 5.1.2 5G Technology -- 5.1.3 Intrusion Detection System (IDS) -- 5.2 Machine Learning and IDS -- 5.3 Literature Review of Algorithmic Approach to IoT and 5G -- 5.4 Conclusion -- References -- Chapter 6: Industrial Automation of IoT in 5G Era -- 6.1 Introduction -- 6.2 Increased Growth in the IoT Market -- 6.3 IOT Market Overview -- 6.3.1 By Platform -- 6.3.2 By Technology -- 6.3.3 By Component -- 6.3.4 By Application -- 6.3.5 By Region -- 6.4 Industry Digitization with IoT -- 6.4.1 Massive IoT -- 6.4.2 Broadband IoT -- 6.4.3 Critical IoT -- 6.4.4 Industrial IoT -- 6.5 Industrial IOT in a Context of Industrial Transformation -- 6.6 Mapping Industrial IoT to 5G Era -- 6.7 Conclusion -- References -- Chapter 7: IoT-Based Ensemble Method on PCG Signal Classification to Predict Heart Diseases -- 7.1 Introduction -- 7.2 Related Work -- 7.3 Proposed Heartbeat Classification Method -- 7.3.1 Dataset -- 7.3.2 Separation of s1 and s2 -- 7.3.3 Denoising -- 7.3.4 Peak Identification -- 7.3.5 Extracting Feature from PCG Signal -- 7.4 Mel-Frequency Cepstral Coefficients -- 7.4.1 MFCC Feature Extraction Algorithm -- 7.4.2 Support Vector Machine (SVM) -- 7.4.3 K Nearest Neighbor (KNN) -- 7.4.4 Ensemble Methods -- 7.4.5 Bootstrap Aggregate (Bagging) -- 7.4.6 Boosting -- 7.4.7 Evaluation Metrics -- 7.5 Result and Discussions -- 7.6 Conclusion -- References.
Chapter 8: IoT-Based Model Predictive Control Architecture for HVAC Systems and a Comprehensive Study of Security Issues of 5G and IoT -- 8.1 Introduction -- 8.2 Historical Perspective -- 8.3 MPC Typologies -- 8.3.1 Classical Model Predictive Control -- 8.3.2 Predictive Control Robust Model (RMPC) -- 8.3.3 Predictive Regulation of the Stochastic Model (SMPC) -- 8.3.4 Nonlinear Model Predictive Control (NMPC) -- 8.3.5 Predictive Management Explicit Model -- 8.4 Model Predictive Control Overview -- 8.5 Model Predictive Control in HVAC Buildings -- 8.6 MPC Models in Building and HVAC Systems -- 8.6.1 Modeling of the HVAC System and the House -- 8.6.2 IoT-Based Architecture for an HVAC System -- 8.7 Advantages and Disadvantages of Model Predictive Control -- 8.8 5G and IoT Security Issues -- 8.9 Conclusion -- References -- Chapter 9: Adaptive Multimode Decision Tree Classification Model Using Effective System Analysis in IDS for 5G and IoT Security Issues -- 9.1 Introduction -- 9.2 Related Works -- 9.3 Materials and Methods -- 9.3.1 Multimode Decision Tree Classification -- 9.3.2 Algorithm: Multimode Decision Tree Classification Model (MDTC) -- 9.3.3 Data Collection -- 9.3.4 Data Monitoring -- 9.3.5 Traffic and Network Management -- 9.3.6 Intrusion Detection System -- 9.4 Result and Discussion -- 9.4.1 Testing Systems -- 9.4.2 Traffic Bags -- 9.4.3 CPU and Memory Performance -- 9.4.4 Storage Performance -- 9.4.5 Threat Perception -- 9.5 Conclusion -- References -- Chapter 10: Enhanced Role-Based Handover Control Algorithm for Efficient Multimedia Data Communication Performance in Vehicular Network Using IoT Security Issues -- 10.1 Introduction -- 10.2 Related Work -- 10.3 Materials and Methods -- 10.3.1 Store-and-Forward (SF) Scheme -- Encryption for Video Broadcasting -- Decryption for the Video Broadcasting.
10.3.2 Vertical Handover Process Based on ERBHC.
Record Nr. UNINA-9910522996503321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and privacy preserving for IoT and 5G networks : techniques, challenges, and new directions / / editors, Ahmed A. Abd El-Latif [et al.]
Security and privacy preserving for IoT and 5G networks : techniques, challenges, and new directions / / editors, Ahmed A. Abd El-Latif [et al.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (xi, 278 pages) : illustrations (some color)
Disciplina 005.8
Collana Studies in big data
Soggetto topico 5G mobile communication systems - Security measures
Internet of things - Security measures
ISBN 3-030-85428-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authentic QR codes for Traceability and Tamper Detection in IoT Enabled Waste Management Networks Data Security Challenges in Deep Neural Network for Healthcare IoT Systems Efficacious Data Transfer Accomplished by Trustworthy Nodes in Cognitive Radio A Multi-fusion IoT Authentication System Based on Internal Deep Fusion of ECG signals Overview of information hiding algorithms for ensuring security in IoT based cyber-physical systems Survey on Mobile Edge-Cloud Computing: A Taxonomy on Computation offloading Approaches Security and Interoperability Issues with Internet of Things (IoT) in Healthcare Industry: A Survey Assisted Fog Computing Approach for Data Privacy Preservation in IoT-based Healthcare Trusted Execution Environment-Enabled Platform for 5G Security and Privacy Enhancement WSNs and IoTs for the Identification of COVID-19 Related Healthcare Issues: A Survey on Contributions, Challenges and Evolution DDoS Attack Detection in Vehicular Ad-Hoc Network (VANET) for 5G Networks
Record Nr. UNINA-9910523755103321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui