A Comprehensive Guide to 5G Security

Cover Image Copyright Year: 2017
Author(s): Madhusanka Liyanage; Ijaz Ahmad; Ahmed Bux Abro; Andrei Gurtov; Mika Ylianttila
Book Type: Wiley Telecom
Content Type : Books
Topics: Communication, Networking & Broadcasting ;  Components, Circuits, Devices & Systems ;  Computing & Processing
  • Print

Abstract

<p> <strong>The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices </strong> <p> Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. <p> 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and prevent ve maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. <p>Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: <ul> <li>Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it</li> <li>Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks</li> <li>Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views</li> <li>Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile n twork virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts</li> </ul> <br> <p> Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, <em>A Comprehensive Guide to 5G Security</em> is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.

  •   Click to expandTable of Contents

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Front Matter

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      The prelims comprise: Half‐Title Page Title Page Copyright Page Table of Contents The Editors About the Contributors Foreword Preface Acknowledgements View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Evolution of Cellular Systems

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      This chapter covers the brief and comprehensive analysis of evolution of cellular systems from 1st generation to 4th generation mobile cellular systems. It also covers the basic introduction of the architecture and security protocols that are used in each generation of mobile cellular systems, along with the brief history of wireless communications. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      5G Mobile Networks

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      In this chapter, we first review the vision of the 5G mobile networks and typical use cases considered by standards organizations. Next, we discuss key requirements and key capabilities that are expected to achieve in 5G, followed by the discussion of key enabling technologies. Finally, we summarize the main research activities being conducted around the world from standards organization bodies to regional and global research communities. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Mobile Networks Security Landscape

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      This chapter covers the brief and comprehensive analysis of evolution of cellular systems from 1st generation to 4th generation mobile cellular systems. It also covers the basic introduction of the architecture and security protocols that are used in each generation of mobile cellular systems, along with the brief history of wireless communications. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Design Principles for 5G Security

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      In this chapter, overview of the security challenges and requirements, and their possible solutions, are discussed. Starting from the recommendations and security challenges that will face 5G networks, the chapter goes in depth into the possible security technologies. Also provided are new technological concepts that are highly important in 5G with their security implications. Furthermore, the chapter provides an overview of how the new technologies such as Software Defined Networking (SDN) and Network Function Virtualization (NFV) will be used to enhance the security of 5G networks. The chapter concludes with future directions and research challenges in 5G security. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Cyber Security Business Models in 5G

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      Cyber security has been a major issue for sectors such as financial services, defence, healthcare, media and online social media. From a technical point of view, significant research efforts have been made into standardizing 5G and cyber security in recent years. Although, one of 5GPPP's recent publications mentions that 5G is business driven in a European context, research results from a business and management perspective remain negligible. Since 5G is deemed to be business driven, how to monetize security as a service in 5G is a significant question. It can be argued that the more monetizable the security is, the more business entities will be interested to deliver secure services and products by investing more in it View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Physical Layer Security

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      Wireless communications’ infrastructures are frequently selected as a cable replacement in many applications, giving an immediate advantage on the wireless investment. However, the worldwide proliferation of wireless local area network (WLAN) imposed large investments on the network security. In the early days of the Internet, its layered protocol stack did not consider security as a primary concern. Since then a significant amount of literature has been published. This chapter proposes a watermark‐based blind physical layer security (WBPLSec) utilizing a jamming receiver in conjunction with the spread spectrum watermarking technique. The outage probability of the secrecy capacity is analytically derived, regardless of the eavesdropper position. The theoretical analysis let us draw a secure region around the legitimate receiver. Results indicate how the WBPLSec aims to be a valuable technique for deploying physical layer security. Authors utilized the outage probability of secrecy capacity for assessing the secure communication. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      5G‐WLAN Security

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      This chapter briefly describes the security considerations of WiFi and LiFi network interconnections with 5G Networks. When designing 5G networks with short range WiFi and LiFi connectivity, architectural considerations must be accompanied with respective security considerations, and such security considerations are expected to influence the architectural decisions. This chapter proposes a security‐based architectural model for short range wireless networks (WiFi) and high‐speed backbone wireless networks (5G networks). In addition, this chapter explains the security considerations of the LiFi interconnection with 5G networks. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Safety of 5G Network Physical Infrastructures

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      This chapter introduces the fundamental elements needed to assess the safety of communication physical structures, namely monopoles, lattice towers and guyed masts. The chapter presents the insufficiencies of current design methodologies and ends by detailing a research framework aiming to improve the resilience of communication structures. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Customer Edge Switching

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      This chapter introduces a security framework based on Customer Edge Switching (CES). The use of CES addresses the classical Internet weaknesses and proposes that all communications are controlled by policy. The chapter describes the deployment of CES framework in 5G mobile networks, its advantages, an evaluation of CES security and other potential uses cases. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Software Defined Security Monitoring in 5G Networks

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      This chapter introduces a Software Defined Security Monitoring for 5G Networks. The use of novel Software Defined Networking (SDN) and Network Function Virtualization (NFV) concepts in 5G monitoring systems can address the classical weaknesses in legacy monitoring systems. The chapter highlights new opportunities that will help achieve efficient SDN‐ and‐NFV based 5G network monitoring. Moreover, it presents the challenges introduced by SDN and NFV in 5G monitoring systems and how the 5G operators need to tackle them by using efficient network monitoring solutions View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      IoT Security

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      In this chapter, we review 5G network features for machine‐type communication and security challenges for mobile cloud robots. We propose a distributed security platform based on machine learning algorithms that would detect and mitigate malicious robots or drones in an IoT network. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      User Privacy, Identity and Trust in 5G

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      In this chapter, privacy, identity and trust issues for 5G systems are discussed from the user's perspective. The chapter starts by revisiting the brief overview of 5G technology and how privacy will be important in such scenarios. Then the chapter highlights some of the necessary background knowledge. The privacy requirements for 5G are discussed in detail by exploring each of the elements such as the data, location and identity. Furthermore, the chapter provides concepts of identity management needed during deployment of 5G technology and also elaborates on potential ways to build trust among various stockholders. The chapter is summarized with a discussion. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      5G Positioning

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      This chapter covers the brief and comprehensive analysis of evolution of cellular systems from 1st to 4th generation mobile cellular systems. It also covers the basic introduction of the architecture and security protocols that are used in each generation of mobile cellular systems, along with a brief history of wireless communications. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Mobile Virtual Network Operators (MVNO) Security

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      This chapter introduces the concept of cloudification of mobile operators and presents a new platform called TaaS in a cloud environment. In addition, new threats introduced by TaaS and the prevention mechanisms to resist them are discussed. We propose a security framework to mitigate security threats based on the cloud deployment model to achieve TaaS security. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      NFV and NFV‐based Security Services

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      In this chapter, we discuss 5G and security in the context of Network Functions Virtualization (NFV), a new transformative technology that combines the technology developments in distributed systems, software virtualization, and cloud computing to modernize telecommunication infrastructure and services. We will cover the content in three parts. The first part will discuss what NFV is and how NFV relates to 5G and security. In the second part, we survey the new security challenges that NFV brings and the new opportunities to solve security problems using NFV technologies. In the third part, we look at several exciting advancements in NFV‐based security solutions that can have a huge impact on the success of 5G and networking in general. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Cloud and MEC Security

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      This chapter presents an overview of the architecture and security challenges of cloud and mobile edge computing in the context of 5G and future networks. It first established the need for both technologies in meeting the performance demands of future computing and networking. It then went on to present the architectural framework and deployment models of both technologies together with their evolutionary trends. Different use cases and scenarios relevant to 5G and future networks were analyzed as well as the associated security and privacy threats. The chapter further proffers some key mitigation techniques against the various identified threats and concludes with a brief description of the ongoing works by various 5G MEC and Cloud Security Research and Standardizations organizations around the world. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Regulatory Impact on 5G Security and Privacy

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      This chapter presents the impact of new 5G technologies, i.e. Software‐Defined Networking (SDN), Network Function Virtualization (NFV) and Cloud Computing on existing Security and Privacy Regulations. The chapter also discuss how these current regulations on Security and Privacy have to be modified to obtain the full benefits of new 5G technologies. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Index

      Copyright Year: 2017

      Wiley Telecom eBook Chapters

      <p> <strong>The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices </strong> <p> Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. <p> 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and prevent ve maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. <p>Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: <ul> <li>Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it</li> <li>Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks</li> <li>Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views</li> <li>Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile n twork virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts</li> </ul> <br> <p> Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, <em>A Comprehensive Guide to 5G Security</em> is an important working resource for researchers, engineers and business professionals working on 5G development and deployment. View full abstract»