O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

A Comprehensive Guide to 5G Security

Book Description

The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices

 Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem.

5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks.

Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book:

  • Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it
  • Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks
  • Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views
  • Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts
Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.

Table of Contents

  1. Cover
  2. Title Page
  3. The Editors
  4. About the Contributors
  5. Foreword
  6. Preface
  7. Acknowledgements
  8. Part I: 5G Security Overview
    1. 1 Evolution of Cellular Systems
      1. 1.1 Introduction
      2. 1.2 Early Development
      3. 1.3 First Generation Cellular Systems
      4. 1.4 Second Generation Cellular Systems
      5. 1.5 Third Generation Cellular Systems
      6. 1.6 Cellular Systems beyond 3G
      7. 1.7 Fourth Generation Cellular Systems
      8. 1.8 Conclusion
      9. References
    2. 2 5G Mobile Networks
      1. 2.1 Introduction
      2. 2.2 5G Requirements
      3. 2.3 5G Enabling Technologies
      4. 2.4 5G Standardization Activities
      5. 2.5 5G Research Communities
      6. 2.6 Conclusion
      7. 2.7 Acknowledgement
      8. References
    3. 3 Mobile Networks Security Landscape
      1. 3.1 Introduction
      2. 3.2 Mobile Networks Security Landscape
      3. 3.3 Mobile Security Lifecycle Functions
      4. 3.4 Conclusion
      5. References
    4. 4 Design Principles for 5G Security
      1. 4.1 Introduction
      2. 4.2 Overviews of Security Recommendations and Challenges
      3. 4.3 Novel Technologies for 5G Security
      4. 4.4 Security in SDN‐based Mobile Networks
      5. 4.5 Conclusions and Future Directions
      6. 4.6 Acknowledgement
      7. References
    5. 5 Cyber Security Business Models in 5G
      1. 5.1 Introduction
      2. 5.2 The Context of Cyber Security Businesses
      3. 5.3 The Business Model Approach
      4. 5.4 The Business Case of Cyber Security in the Era of 5G
      5. 5.5 Business Model Options in 5G Cyber Security
      6. 5.6 Acknowledgement
      7. References
  9. Part II: 5G Network Security
    1. 6 Physical Layer Security
      1. 6.1 Introduction
      2. 6.2 WBPLSec System Model
      3. 6.3 Outage Probability of Secrecy Capacity of a Jamming Receiver
      4. 6.4 WBPLSec Applied to 5G networks
      5. 6.5 Conclusions
      6. References
    2. 7 5G‐WLAN Security
      1. 7.1 Chapter Overview
      2. 7.2 Introduction to WiFi‐5G Networks Interoperability
      3. 7.3 Overview of Network Architecture for WiFi‐5G Networks Interoperability
      4. 7.4 5G‐WiFi Security Challenges
      5. 7.5 Security Consideration for Architectural Design of WiFi‐5G Networks
      6. 7.6 LiFi Networks
      7. 7.7 Introduction to LiFi‐5G Networks Interoperability
      8. 7.8 5G‐LiFi Security Challenges
      9. 7.9 Security Consideration for Architectural Design of LiFi‐5G Networks
      10. 7.10 Conclusion and Future Work
      11. References
    3. 8 Safety of 5G Network Physical Infrastructures
      1. 8.1 Introduction
      2. 8.2 Historical Development
      3. 8.3 Structural Design Philosophy
      4. 8.4 Survey of Problems
      5. 8.5 Opportunities and Recommendations
      6. 8.6 Acknowledgement
      7. References
    4. 9 Customer Edge Switching
      1. 9.1 Introduction
      2. 9.2 State‐of‐the‐art in Mobile Networks Security
      3. 9.3 CES Security Framework
      4. 9.4 Evaluation of CES Security
      5. 9.5 Deployment in 5G Networks
      6. 9.6 Conclusion
      7. References
    5. 10 Software Defined Security Monitoring in 5G Networks
      1. 10.1 Introduction
      2. 10.2 Existing Monitoring Techniques
      3. 10.3 Limitations of Current Monitoring Techniques
      4. 10.4 Use of Monitoring in 5G
      5. 10.5 Software‐Defined Monitoring Architecture
      6. 10.6 Expected Advantages of Software Defined Monitoring
      7. 10.7 Expected Challenges in Software Defined Monitoring
      8. 10.8 Conclusion
      9. References
  10. Part III: 5G Device and User Security
    1. 11 IoT Security
      1. 11.1 Introduction
      2. 11.2 Related Work
      3. 11.3 Literature Overview and Research Motivation
      4. 11.4 Distributed Security Platform
      5. 11.5 Mobile Cloud Robot Security Scenarios
      6. 11.6 Conclusion
      7. References
    2. 12 User Privacy, Identity and Trust in 5G
      1. 12.1 Introduction
      2. 12.2 Background
      3. 12.3 User Privacy
      4. 12.4 Identity Management
      5. 12.5 Trust Models
      6. 12.6 Discussion
      7. 12.7 Conclusion
      8. References
    3. 13 5G Positioning
      1. 13.1 Introduction
      2. 13.2 Outdoor versus Indoor Positioning Technologies
      3. 13.3 Passive versus Active Positioning
      4. 13.4 Brief Overview of 5G Positioning Mechanisms
      5. 13.5 Survey of Security Threats and Privacy Issues in 5G Positioning
      6. 13.6 Main Privacy Concerns
      7. 13.7 Passive versus Active Positioning Concepts
      8. 13.8 Physical‐Layer Based Security Enhancements Mechanisms for Positioning in 5G
      9. 13.9 Enhancing Trustworthiness
      10. 13.10 Cryptographic Techniques for Security and Privacy of Positioning
      11. 13.11 Legislation on User Location Privacy in 5G
      12. 13.12 Landscape of the European and International Projects related to Secure Positioning
      13. References
  11. Part IV: 5G Cloud and Virtual Network Security
    1. 14 Mobile Virtual Network Operators (MVNO) Security
      1. 14.1 Introduction
      2. 14.2 Related Work
      3. 14.3 Cloudification of the Network Operators
      4. 14.4 MVNO Security
      5. 14.5 TaaS Deployment Security
      6. 14.6 Future Directions
      7. 14.7 Conclusion
      8. References
    2. 15 NFV and NFV-based Security Services
      1. 15.1 Introduction
      2. 15.2 5G, NFV and Security
      3. 15.3 A Brief Introduction to NFV
      4. 15.4 NFV, SDN and a Telco Cloud
      5. 15.5 Common NFV Drivers
      6. 15.6 NFV Security: Challenges and Opportunities
      7. 15.7 NFV-based Security Services
      8. 15.8 Conclusions
      9. References
    3. 16 Cloud and MEC Security
      1. 16.1 Introduction
      2. 16.2 Cloud Computing in 5G Networks
      3. 16.3 MEC in 5G Networks
      4. 16.4 Security Challenges in 5G Cloud
      5. 16.5 Security Challenges in 5G MEC
      6. 16.6 Security Architectures for 5G Cloud and MEC
      7. 16.7 5GMEC, Cloud Security Research and Standardizations
      8. 16.8 Conclusions
      9. References
    4. 17 Regulatory Impact on 5G Security and Privacy
      1. 17.1 Introduction
      2. 17.2 Regulatory Objectives for Security and Privacy
      3. 17.3 Legal Framework for Security and Privacy
      4. 17.4 Security and Privacy Issues in New 5G Technologies
      5. 17.5 Relevance Assessment of Security and Privacy Issues for Regulation
      6. 17.6 Analysis of Potential Regulatory Approaches
      7. 17.7 Summary of Issues and Impact of New Technologies on Security and Privacy Regulation
      8. References
  12. Index
  13. End User License Agreement