The Wiley 5G REF
eBook - ePub

The Wiley 5G REF

Security

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

The Wiley 5G REF

Security

About this book

THE WILEY 5G REF

Explore cutting-edge subjects in 5G privacy and security

In The Wiley 5G REF: Security, a team of distinguished researchers delivers an insightful collection of articles selected from the online-only The Wiley 5G Reference. The editors introduce the security landscape of 5G, including the significant security and privacy risks associated with 5G networks. They also discuss different security solutions for various segments of the 5G network, like the radio, edge, access, and core networks.

The book explores the security threats associated with key network softwarization technologies, like SDN, NFV, NS, and MEC, as well as those that come with new 5G and IoT services. There is also a detailed discussion on the privacy of 5G networks.

The included articles are written by leading international experts in security and privacy for telecommunication networks. They offer learning opportunities for everyone from graduate-level students to seasoned engineering professionals.

The book also offers:

  • A thorough introduction to the 5G mobile network security landscape and the major risks associated with it
  • Comprehensive explorations of SDMN security, the complex challenges associated with 5G security, and physical-layer security for 5G and future networks
  • Practical discussions of security for Handover and D2D communication in 5G HetNets, authentication and access control for 5G, and G5-Core network security
  • In-depth examinations of MEC and cloud security, as well as VNF placement and sharing in NFV-based cellular networks

Perfect for researchers and practitioners in the fields of 5G security and privacy, The Wiley 5G REF: Security is an indispensable resource for anyone seeking a solid educational foundation in the latest 5G developments.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weโ€™ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere โ€” even offline. Perfect for commutes or when youโ€™re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access The Wiley 5G REF by Madhusanka Liyanage in PDF and/or ePUB format, as well as other popular books in Technology & Engineering & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

1
5G Mobile Networks Security Landscape and Major Risks

Rupendra Nath Mitra and Mahesh K. Marina
The University of Edinburgh, Edinburgh, UK

Introduction

Mobile communication networks since its emergence in the mid-1980s have been rapidly transforming our everyday life. Beginning with a first-generation analog voice communication system on the go, the fourth generation of the mobile networks currently guarantees high-speed Internet and ubiquitous connectivity among numerous smart devices. The present-day cellular networks cater to diversified services such as banking, health, governance, e-commerce, education, and mobile TV, to name a few (Liyanage et al. 2017). Yet today's mobile network infrastructure requires another quantum leap to its next-generation called the 5th generation (5G) to fulfill the growing demand of higher data rates in mobile Internet and the need for extremely low-latency communication links, enabling futuristic applications such as mission-critical communications, augmented reality, self-driving cars, virtual reality, and so on (Qayyum et al. 2019).
The 5G mobile networks are not just a technologically advanced version of currently deployed 4th generation (4G) systems but a completely new telecommunication paradigm powered by software-defined networking (SDN), network function virtualization (NFV), and cloud computing. The adoption of these new technologies in telecommunication system design brings unprecedented network agility and offers service providers the ability to implement 5G infrastructures incredibly rapidly, and that is too at a low cost. However, along with the unmatched network flexibility and advantages mentioned above, 5G networks bring in an increased concern for security and privacy. The unrestricted usage of open-source software and machine learning techniques, provision of virtualized services over shared physical infrastructure, connecting almost everything, and finally, the softwarization of the telecommunication network functions increase the cybersecurity threat to 5G networks (Belmonte Martin et al. 2016).
5G will play a pivotal role in building a networked society because critical services such as public transportation (i.e. railways and city transports), energy sectors, national security, governance, and healthcare, which currently operate on exclusive networks, will heavily rely on the pervasive 5G infrastructures. Therefore, any adversary may launch malicious attacks to the 5G networks and, if successful, can bring large-scale catastrophe to the society (Kumar et al. 2018). So, the hasty adoption of open-source software, authentication protocols, large-scale machine learning (ML) models, and multi-tenant public cloud-based network operations need to be overseen and scrutinized formally before being integrated to the 5G infrastructure. A systematic study on privacy-preserving techniques and policies in 5G securing it from innumerable cyber threats is essential and timely (Hodges 2019).
In this article, we provide a fresh insight into the end-to-end (E2E) 5G security threat landscape, analyze the recommendations to secure the 5GS, identify evolved attack vectors, recognize the vulnerabilities, and categorize the major risks to highlight the crucial gaps currently prevailing in the way of 5G to become a trustworthy ecosystem. We also introduce the research groups working toward a safe and secure 5G network infrastructure and briefly review their lines of works.

4G to 5G: A Paradigm Shift

Today's cyber world is well connected through physical transoceanic cables, numerous satellite links, long haul optical or unguided media, wide-area connectivities, and local wireless and wired networks. Traditionally, end users connect to the worldwide cyber networks using user equipment, typically a general-purpose computer or a smartphone through the mobile network's radio access network or the locally available access network. With the advent of smart devices, exponential growth has been projected in the number of connected Internet of Things (IoT) in the coming years, as illustrated in Figure 1. With the growing demand for staying always connected everywhere and accessing high volume traffic on the go, cellular data service emerged as the predominant way to provide ubiquitous connectivity to the users. Thus, 5G network is designed in a very different way than its 4G counterpart so that 5G can cater to the massive amount of connectivities to numerous futuristic services and many smart IoT devices for billions of its subscribers, providing high-speed cellular broadband (University of Surrey 2017).

5G System Architecture

5G architecture is proposed to be fundamentally different than the network architecture of 4G because 5G necessitates backward compatibility and an agile, modular architecture for an expeditious low-cost deployment and smooth technical augmentation in the future. The present-day 4G network inherits architectural features from its previous generations of traditional mobile networks. The 4G network has three segments, the user equipment (UE), the Radio Access Network (RAN) that connects to the UE over the air interface, and Evolved Packet Core (EPC) networks that connect to the RAN through transmission networks. However, 5G system (5GS) architecture has UE, multifaceted radio access networks called New Radio (NR), Multi-access Edge Cloud for reduced network latency, and the cloud-native 5G core networks (5G-CN) (Arfaoui et al. 2018; Belmonte Martin et al. 2016; Ericsson 2018). A piece of mobile equipment (ME) equipped with a universal subscriber identity module (USIM) constitutes the UE by which the users can access the 5G network over the air interface.
w5GRef145fgz001
Figure 1 The pro...

Table of contents

  1. Cover
  2. Table of Contents
  3. Title Page
  4. Copyright
  5. Foreword
  6. List of Contributors
  7. 1 5G Mobile Networks Security Landscape and Major Risks
  8. 2 SDMN Security
  9. 3 5G Security โ€“ Complex Challenges
  10. 4 Physical-Layer Security for 5G and Beyond
  11. 5 Security for Handover and D2D Communication in 5G HetNets
  12. 6 Authentication and Access Control for 5G
  13. 7 5G-Core Network Security
  14. 8 MEC and Cloud Security
  15. 9 Security in Network Slicing
  16. 10 VNF Placement and Sharing in NFV-Based Cellular Networks
  17. 11 Security Monitoring and Management in 5G
  18. 12 Security for Vertical Industries
  19. 13 Introduction to IoT Security
  20. 14 Privacy in the 5G World: The GDPR in a Datafied Society
  21. 15 Structural Safety Assessment of 5G Network Infrastructures
  22. Index
  23. End User License Agreement