Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

A Comprehensive Guide to 5G Security - Research Book

A Comprehensive Guide to 5G Security - Research Book

Great Research Book in A Comprehensive Guide to 5G Security

Author(s) Name:  Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila

About the Book:

   Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem.
   5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks.
   Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book:

  • Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it
  • Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks
  • Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views
  • Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts

  • Table of Contents

  • Evolution of Cellular Systems
  • 5G Mobile Networks: Requirements, Enabling Technologies, and Research Activities
  • Mobile Networks Security Landscape
  • Design Principles for 5G Security
  • Cyber Security Business Models in 5G
  • Physical Layer Security
  • 5G]WLAN Security
  • Safety of 5G Network Physical Infrastructures
  • Customer Edge Switching: A Security Framework for 5G
  • Software Defined Security Monitoring in 5G Networks
  • IoT Security
  • User Privacy, Identity and Trust
  • 5G Positioning: Security and Privacy Aspects
  • Mobile Virtual Network Operators (MVNO) Security
  • NFV and NFV]based Security Services
  • Cloud and MEC Security
  • Regulatory Impact on 5G Security and Privacy
  • ISBN:  978-1-119-29304-0

    Publisher:  Wiley Telecom

    Year of Publication:  2018

    Book Link:  Home Page Url