| 000 | 07718cam a2200721 i 4500 | ||
|---|---|---|---|
| 001 | on1005779670 | ||
| 005 | 20250919141833.0 | ||
| 006 | m o d | ||
| 007 | cr ||||||||||| | ||
| 008 | 171004s2018 nju ob 001 0 eng | ||
| 010 | _a 2017047712 | ||
| 020 |
_a9781119293088 _q(pdf) |
||
| 020 | _a1119293081 | ||
| 020 |
_a9781119293057 _q(epub) |
||
| 020 | _a1119293057 | ||
| 020 | _a9781119293071 | ||
| 020 | _a1119293073 | ||
| 020 |
_z9781119293040 _q(cloth) |
||
| 020 | _z1119293049 | ||
| 029 | 1 |
_aCHNEW _b000979934 |
|
| 029 | 1 |
_aCHVBK _b507395840 |
|
| 035 |
_a(OCoLC)1005779670 _z(OCoLC)1031030120 |
||
| 037 |
_aCL0500000954 _bSafari Books Online |
||
| 040 |
_aDLC _beng _erda _epn _cDLC _dDG1 _dNST _dYDX _dEBLCP _dUPM _dUAB _dNLE _dMERER _dRECBK _dUMI _dSTF _dCOO _dUIU _dTOH _dOCLCF _dCEF _dKSU _dDEBBG _dDLC _dOCLCQ _dWYU _dG3B |
||
| 042 | _apcc | ||
| 049 | _aMAIN | ||
| 050 | 0 | 0 | _aTK5103.2 |
| 072 | 7 |
_aCOM _x051460 _2bisacsh |
|
| 072 | 7 |
_aCOM _x053000 _2bisacsh |
|
| 082 | 0 | 0 |
_a005.8 _223 |
| 245 | 0 | 0 |
_aComprehensive guide to 5G security / _cedited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila. |
| 264 | 1 |
_aHoboken, NJ : _bJohn Wiley & Sons, _c2018. |
|
| 300 | _a1 online resource | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 588 | 0 | _aPrint version record and CIP data provided by publisher. | |
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aThe Editors xvii About the Contributors xxi Foreword xxxiii Preface xxxv Acknowledgements xli Part I 5G Security Overview 1 1 Evolution of Cellular Systems 3; Shahriar Shahabuddin, Sadiqur Rahaman, Faisal Rehman, Ijaz Ahmad, | |
| 505 | 0 | _aWiMAX 20 1.6.3 LTE 21 1.6.3.1 Orthogonal Frequency Division Multiplexing (OFDM) 21 1.6.3.2 SC?]FDE and SC?]FDMA 21 1.6.3.3 Multi?]antenna Technique 21 1.6.4 LTE Network Architecture 21 1.7 Fourth Generation Cellular Systems 22 1.7.1 Key Technologies of 4G 23 1.7.1.1 Enhanced MINO 23 1.7.1.2 Cooperative Multipoint Transmission and Reception for LTE?]Advanced 23 1.7.1.3 Spectrum and Bandwidth Management 24 1.7.1.4 Carrier Aggregation 24 1.7.1.5 Relays 24 1.7.2 Network Architecture 24 1.7.3 Beyond 3G and 4G Cellular Systems Security 25 1.7.4 LTE Security Model 26 1.7.5 Security in WiMAX 26 1.8 Conclusion 27 References 28 2 5G Mobile Networks: Requirements, Enabling Technologies, and Research Activities 31; Van?]Giang Nguyen, Anna Brunstrom, Karl?]Johan Grinnemo, | |
| 505 | 0 | _aActivities 51 2.4.5 IETF Activities 52 2.5 5G Research Communities 52 2.5.1 European 5G Related Activities 52 2.5.1.1 5G Research in EU FP7 52 2.5.1.2 5G Research in EU H2020 52 2.5.1.3 5G Research in Celtic?]Plus 53 2.5.2 Asian 5G Related Activities 53 2.5.2.1 South Korea: 5G Forum 53 2.5.2.2 Japan: 5GMF Forum 54 2.5.2.3 China: IMT?]2020 5G Promotion Group 54 2.5.3 American 5G Related Activities 54 2.6 Conclusion 55 2.7 Acknowledgement 55 References 55 3 Mobile Networks Security Landscape 59; Ahmed Bux Abro 3.1 Introduction 59 3.2 Mobile Networks Security Landscape 59 3.2.1 Security Threats and Protection for 1G 61 3.2.2 Security Threats and Protection for 2G 61 3.2.3 Security Threats and Protection for 3G 63 3.2.4 Security Threats and Protection for 4G 63 3.2.4.1 LTE UE (User Equipment) Domain Security 64. | |
| 505 | 0 | _a3.2.4.2 LTE (Remote Access Network) Domain Security 65 3.2.4.3 LTE Core Network Domain Security 65 3.2.4.4 Security Threat Analysis for 4G 65 3.2.5 Security Threats and Protection for 5G 66 3.2.5.1 Next Generation Threat Landscape for 5G 68 3.2.5.2 IoT Threat Landscape 68 3.2.5.3 5G Evolved Security Model 68 3.2.5.4 5G Security Threat Analysis 69 3.3 Mobile Security Lifecycle Functions 70 3.3.1 Secure Device Management 71 3.3.2 Mobile OS and App Patch Management 71 3.3.3 Security Threat Analysis and Assessment 71 3.3.4 Security Monitoring 72 3.4 Conclusion 73 References 73 4 Design Principles for 5G Security 75; Ijaz Ahmad, Madhusanka Liyanage, Shahriar Shahabuddin, Mika Ylianttila, | |
| 505 | 0 | _a4.4.2 Control Channels Security 89 4.4.3 Traffic Monitoring 91 4.4.4 Access Control 91 4.4.5 Network Resilience 91 4.4.6 Security Systems and Firewalls 92 4.4.7 Network Security Automation 92 4.5 Conclusions and Future Directions 94 4.6 Acknowledgement 95 References 95 5 Cyber Security Business Models in 5G 99; Julius Francis Gomes, Marika Iivari, Petri Ahokangas, Lauri Isotalo, Bengt Sahlin, | |
| 520 | _aThe first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: -Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it -Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks -Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views -Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment. | ||
| 650 | 0 |
_aMobile communication systems _xSecurity measures. |
|
| 650 | 0 |
_aWireless communication systems _xSecurity measures. |
|
| 650 | 7 |
_aCOMPUTERS _xProgramming _xMobile Devices. _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
| 650 | 7 |
_aWireless communication systems _xSecurity measures. _2fast _0(OCoLC)fst01176222 |
|
| 655 | 4 | _aElectronic books. | |
| 700 | 1 |
_aLiyanage, Madhusanka, _eeditor. |
|
| 700 | 1 |
_aAhmad, Ijaz, _d1985- _eeditor. |
|
| 700 | 1 |
_aAbro, Ahmed Bux, _eeditor. |
|
| 700 | 1 |
_aGurtov, Andrei, _eeditor. |
|
| 700 | 1 |
_aYlianttila, Mika, _eeditor. |
|
| 776 | 0 | 8 |
_iPrint version: _tComprehensive guide to 5G security. _dHoboken, NJ : John Wiley & Sons, 2018 _z9781119293040 _w(DLC) 2017040682 |
| 856 | 4 | 0 |
_uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=https://doi.org/10.1002/9781119293071 _zWiley Online Library |
| 907 |
_a.b16814691 _b2022-11-08 _c2020-07-17 |
||
| 942 | _n0 | ||
| 998 |
_a1 _b2020-07-17 _cm _da _feng _gnju _y0 _z.b16814691 |
||
| 999 |
_c648879 _d648879 |
||