The Wiley 5G REF: Security 1st Edition by Rahim Tafazolli, Chin-Liang Wang, Periklis Chatzimisios, Madhusanka Liyanage – Ebook PDF Instant Download/DeliveryISBN: 1119820332, 9781119820338
Full download The Wiley 5G REF: Security 1st Edition after payment
Product details:
ISBN-10 : 1119820332
ISBN-13 : 9781119820338
Author: Rahim Tafazolli, Chin Liang Wang, Periklis Chatzimisios, Madhusanka Liyanage
In The Wiley 5G REF: Security, a team of distinguished researchers delivers an insightful collection of articles selected from the online-only The Wiley 5G Reference. The editors introduce the security landscape of 5G, including the significant security and privacy risks associated with 5G networks. They also discuss different security solutions for various segments of the 5G network, like the radio, edge, access, and core networks.
The book explores the security threats associated with key network softwarization technologies, like SDN, NFV, NS, and MEC, as well as those that come with new 5G and IoT services. There is also a detailed discussion on the privacy of 5G networks.
The Wiley 5G REF: Security 1st Table of contents:
1 5G Mobile Networks Security Landscape and Major Risks
Introduction
4G to 5G: A Paradigm Shift
The Threat Landscape and Security Roadmap
Why Securing 5G is Challenging?
Can 3GPP Recommendations Solely Secure the 5GS?
Current State of the Arts and Open Research Areas
Conclusion
Acronyms
Related Articles
References
Further Reading
2 SDMN Security
Software-defined Mobile Network (SDMN) Security
Conclusion and Future Trends
Related Articles
References
Further Reading
3 5G Security – Complex Challenges
Introduction 5G Security Building Blocks
Old Challenges in New Context for 5G
New Security Research Challenges for 5G
Trust
Malware in Mobile Core Networks
Measuring Security
Summary
Related Articles
References
Further Reading
4 Physical-Layer Security for 5G and Beyond
Introduction
Notion on Physical‐Layer Security Notion on Physical‐Layer Security
Secrecy Performance Metrics
Physical-Layer Security Techniques
Physical-Layer Authentication and Secret-Key Generation
Physical-Layer Security for 5G Technologies
Conclusions and Future Challenges
Acknowledgment
Related Article
Endnote
References
Further Reading
5 Security for Handover and D2D Communication in 5G HetNets
Introduction
Security Architecture Overview
Security Attacks and Mechanisms in 5G
Security in 5G Heterogeneous Networks
Conclusions
Related Articles
References
Further Reading
6 Authentication and Access Control for 5G
Introduction
Basics of Authentication and Access Control
Overall Architecture of the AAC in 3G, 4G, and 5G
5G Network Architecture
Authentication and Access Control in 5G
New Concepts in 5G
5G-Specific Use Cases and Requirements
AAC Proposal in Cellular Networks
Summary
Related Articles
References
Further Reading
7 5G-Core Network Security
Introduction
5G Design Principles and the Core Network
Security of Core Network
Security of Emerging New Network Technologies
Discussion and Conclusion
Related Article
References
Further Reading
8 MEC and Cloud Security
Introduction
5G MEC-Cloud Overview
MEC and Cloud Security in 5G
Conclusions
References
Further Reading/Resources
9 Security in Network Slicing
Introduction
Network Slicing Architecture
Security Threats of NS High-Level Functional Roles
Security Considerations in Network Slicing and Related Work
Future Research Directions
Conclusions
References
Further Reading
10 VNF Placement and Sharing in NFV-Based Cellular Networks
Introduction
Related Issues
System Model and Decisions to Make
The FlexShare Algorithm
Reference Scenarios and Benchmark Strategies
Numerical Results
Conclusions
Acknowledgment
References
Further Reading
11 Security Monitoring and Management in 5G
Introduction
Conclusions
Related Article
References
Further Reading
12 Security for Vertical Industries
Introduction
Cloudification of the Network Operators
MVNO Security in 5G Networks
Security Management and Orchestration
TaaS Deployment Security
Conclusions
Related Articles
References
Further Reading
13 Introduction to IoT Security
Introduction
Attacks and Countermeasures
Authentication and Authorization
Other Security Features and Related Issues
Discussion
Future Research Directions
Conclusions
References
Further Reading
14 Privacy in the 5G World: The GDPR in a Datafied Society
Introduction
The 5G World. What Sets It Apart from Previous Communication Technologies?
Data Privacy and the GDPR
The Risks and Threats to Privacy in 5G
Concluding Thoughts
Related Article
References
Further Reading
15 Structural Safety Assessment of 5G Network Infrastructures
Introduction
Discussion
Conclusions and Recommendations
Related Articles
References
Further Reading
People also search for The Wiley 5G REF: Security 1st:
the wiley 5g ref security
what is 5g security
wiley security+
wiley security+ practice test
sg-1 wiley x
Tags:
The Wiley,5G REF,Security,Rahim Tafazolli,Chin Liang Wang,Periklis Chatzimisios,Madhusanka Liyanage