<span>5G WIRELESS NETWORK</span><p><span>An expert presentation of 5G security, privacy, and network performance</span></p><p><span>In </span><span>5G Wireless Network Security and Privacy</span><span>, a team of veteran engineers delivers a robust and accessible discussion of 5G security solutions,
5G Wireless Network Security and Privacy (IEEE Press)
✍ Scribed by DongFeng Fang, Yi Qian, Rose Qingyang Hu
- Publisher
- Wiley-IEEE Press
- Year
- 2023
- Tongue
- English
- Leaves
- 131
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
5G WIRELESS NETWORK
An expert presentation of 5G security, privacy, and network performance
In 5G Wireless Network Security and Privacy, a team of veteran engineers delivers a robust and accessible discussion of 5G security solutions, including physical layer security, authentication, and mobility management. In the book, the authors expertly cover the requirements of 5G wireless network security and privacy, with explorations of existing solutions and vulnerabilities from security architecture and mechanism perspectives.
Readers will learn how to enhance the security and network performance of 5G wireless networks in contexts like vehicle‐to‐vehicle and vehicle‐to‐infrastructure communications, industrial automation, health services, smart cities, and smart homes. They will develop a comprehensive understanding of 5G wireless network security as they move through the book’s 11 insightful chapters, developing in‐depth knowledge on the current state of 5G security and coming developments in the field. Readers will also find:
- A thorough introduction to legacy cellular network security, including network performance development from 1G to 4G
- In‐depth treatments of 5G network security, including the motivation and objectives of 5G wireless network security
- Comprehensive explorations of wireless security solutions, including cryptographic approaches and physical layer security
- Fulsome discussions of the security architecture of cellular networks, including 3G and 4G security
Perfect for researchers and professionals working in the field of cybersecurity and 5G wireless networks, 5G Wireless Network Security and Privacy will also earn a place in the libraries of engineers, computer scientists, and graduate students studying 5G network security and privacy.
✦ Table of Contents
Cover
Title Page
Copyright
Contents
About the Authors
Preface
Acknowledgments
Introduction
Chapter 1 Introduction to 5G Wireless Systems
1.1 Motivations and Objectives of 5G Wireless Networks
1.2 Security Drives and Requirements
1.3 5G Wireless Network Architecture
1.3.1 Overview of the 5G Wireless Network Architecture
1.3.2 Comparison Between the Legacy Cellular Network and the 5G Wireless Network
1.4 Conclusion
Chapter 2 Security from Legacy Wireless Systems to 5G Networks
2.1 Network Security for Legacy Systems
2.2 Security Attacks and Security Services in 5G Wireless Networks
2.2.1 Security Attacks
2.2.2 Security Services
2.2.2.1 Authentication
2.2.2.2 Confidentiality
2.2.2.3 Availability
2.2.2.4 Integrity
2.3 The Evolution of Wireless Security Architectures from 3G to 5G
2.3.1 3G Security Architecture
2.3.2 4G Security Architecture
2.3.3 5G Wireless Security Architecture
2.3.3.1 Overview of the Proposed 5G Wireless Security Architecture
2.3.3.2 Security Domains
2.4 Summary
Chapter 3 Security Mechanisms in 5G Wireless Systems
3.1 Cryptographic Approaches and Physical Layer Security
3.2 Authentication
3.3 Availability
3.4 Data Confidentiality
3.5 Key Management
3.6 Privacy
3.7 Conclusion
Chapter 4 An Efficient Security Solution Based on Physical Layer Security in 5G Wireless Networks
4.1 Enhancing 5G Security Through Artificial Noise and Interference Utilization
4.2 A HetNet System Model and Security Analysis
4.2.1 System Model and Threat Model
4.2.2 Security Analysis
4.3 Problem Formulation and Analysis
4.3.1 Maximum Secrecy Rate
4.3.2 The Proposed Algorithm
4.4 Numerical and Simulation Results
4.5 Conclusion
Chapter 5 Flexible and Efficient Security Schemes for IoT Applications in 5G Wireless Systems
5.1 IoT Application Models and Current Security Challenges
5.2 A General System Model for IoT Applications Over 5G
5.2.1 System Architecture
5.2.2 Trust Models
5.2.3 Threat Models and Design Objectives
5.3 The 5G Authentication and Secure Data Transmission Scheme
5.3.1 Overview of the 5G Authentication and Secure Data Transmission Scheme
5.3.2 The Detailed Scheme
5.3.2.1 Phase 1 – System Initialization
5.3.2.2 Phase 2 – Authentication and Initial Session Key Agreement
5.3.2.3 Phase 3 – Data Transmission
5.3.2.4 Phase 4 – Data Receiving
5.3.2.5 Phase 5 – T2 IoT Devices Authentication and Initial Session Key Agreement
5.4 Security Analysis
5.4.1 Protocol Verification
5.4.2 Security Objectives
5.4.2.1 Mutual Authentication
5.4.2.2 Initial Session Key Agreement
5.4.2.3 Data Confidentiality and Integrity
5.4.2.4 Contextual Privacy
5.4.2.5 Forward Security
5.4.2.6 End‐to‐End Security
5.4.2.7 Key Escrow Resilience
5.5 Performance Evaluation
5.5.1 Security Services
5.5.2 Computational Overhead
5.5.3 Communication Overhead
5.6 Conclusion
Chapter 6 Secure and Efficient Mobility Management in 5G Wireless Networks
6.1 Handover Issues and Requirements Over 5G Wireless Networks
6.2 A 5G CN Model and HetNet System Model
6.3 5G Handover Scenarios and Procedures
6.3.1 Handover Scenarios
6.3.2 Handover Procedures
6.4 A New Authentication Protocol for 5G Networks
6.4.1 Assumptions
6.4.2 Pre‐Authentication
6.4.3 Full Authentication
6.4.4 Fast Authentication
6.4.4.1 Handover Between APs
6.4.4.2 Handover Between BSs
6.5 Security Analysis of the New 5G Authentication Protocols
6.6 Performance Evaluations
6.6.1 Communication Overhead
6.6.2 Computation Overhead
6.7 Conclusion
Chapter 7 Open Issues and Future Research Directions for Security and Privacy in 5G Networks
7.1 New Trust Models
7.2 New Security Attack Models
7.3 Privacy Protection
7.4 Unified Security Management
References
Index
EULA
📜 SIMILAR VOLUMES
5G WIRELESS NETWORK An expert presentation of 5G security, privacy, and network performance In 5G Wireless Network Security and Privacy, a team of veteran engineers delivers a robust and accessible discussion of 5G security solutions, including physical layer security, authentication, and mobi
<span>5G and Beyond Wireless Communication Networks</span><p><span>A comprehensive and up-to-date survey of 5G technologies and applications</span></p><p><span>In </span><span>5G and Beyond Wireless Communication Networks</span><span>, a team of distinguished researchers deliver an expert treatment
<span>5G and Beyond Wireless Communication Networks</span><p><span>A comprehensive and up-to-date survey of 5G technologies and applications</span></p><p><span>In </span><span>5G and Beyond Wireless Communication Networks</span><span>, a team of distinguished researchers deliver an expert treatment
<p><b>Receive comprehensive instruction on the fundamentals of wireless security from three leading international voices in the field </b> </p> <p><i>Security in Wireless Communication Networks</i> delivers a thorough grounding in wireless communication security. The distinguished authors pay partic