5G Enabled Secure Wireless Networks (eBook)

eBook Download: PDF
2019 | 1st ed. 2019
XVIII, 200 Seiten
Springer International Publishing (Verlag)
978-3-030-03508-2 (ISBN)

Lese- und Medienproben

5G Enabled Secure Wireless Networks -
Systemvoraussetzungen
139,09 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This book covers issues related to 5G network security. The authors start by providing details on network architecture and key requirements. They then outline the issues concerning security policies and various solutions that can handle these policies. Use of SDN-NFV technologies for security enhancement is also covered. The book includes intelligent solutions by utilizing the features of artificial intelligence and machine learning to improve the performance of the 5G security protocols and models. Optimization of security models is covered as a separate section with a detailed information on the security of 5G-based edge, fog, and osmotic computing. This book provides detailed guidance and reference material for academicians, professionals, and researchers.
  • Presents extensive information and data on research and challenges in 5G networks;
  • Covers basic architectures, models, security frameworks, and software-defined solutions for security issues in 5G networks;
  • Provides solutions that can help in the growth of new startups as well as research directions concerning the future of 5G networks.



DushanthaNalin K. Jayakody received the Ph. D. degree in Electronics, Electrical, and Communications Engineering in 2014, from the University College Dublin, Ireland. He received his MSc degree in Electronics and Communications Engineering from the Department of Electrical and Electronics Engineering, Eastern Mediterranean University, Turkey (under the University full graduate scholarship) and ranked as the first merit position holder of the department, and B. E. electronics engineering degree (with first-class honors) from Pakistan and was ranked as the merit position holder of the University (under SAARC Scholarship.). From 2014 - 2016, he was a Postdoc Research  Fellow at the Institute of computer science,  University of Tartu, Estonia and Department of Informatics, University of Bergen, Norway. From summer 2016, he is a Professor at the School of Computer  Science& Robotics, National Research Tomsk Polytechnic University, Russia, where he also serves as the Director of Tomsk Infocomm Lab. DrJayakody has received the best paper award from the IEEE International Conference on Communication, Management and Information Technology (ICCMIT) in 2017.

Dr. Jayakody has   published over 80 international peer reviewed journal and conference papers. His research interests  include PHY layer prospective of 5G communications, Cooperative wireless  communications, device to device communications, LDPC  codes, Unmanned  Ariel Vehicle  etc. Dr. Jayakody is a Senior Member of IEEE and he has served as workshop chair, session chair or technical program committee member for various international conferences, such as IEEE PIMRC  2013/2014, IEEE WCNC 2014-2018, IEEE  VTC 2015-2018 etc. He currently serves as anArea Editor of Elsevier Physical Communications Journal, MDPI Information journal and Wiley Internet of Technology  Letters. Also, he serves as a reviewer for various IEEE Transactions and other journals. 

Kathiravan Srinivasan, received his B.E., in Electronics and Communication Engineering and M.E., in Communication Systems Engineering from Anna University, Chennai, India. He also received his Ph.D., in Information and Communication Engineering from Anna University Chennai, India.  He is presently working as an Associate Professor in the School of Information Technology and Engineering at Vellore Institute of Technology (VIT), India.  He was previously working as a faculty in the Department of Computer Science and Information Engineering and also as the Deputy Director- Office of International Affairs at National Ilan University, Taiwan.  He has won the Best Conference Paper Award at 2018 IEEE International Conference on Applied System Innovation, Chiba, Tokyo, April 13-17, 2018. Further, he has also received the Best Service Award, Department of Computer Science & Information Engineering, National Ilan University, Taiwan. In 2017, he has won Best Paper Award at 2017 IEEE International Conference on Applied System Innovation, Sapporo, Japan, May 13-17, 2017 and Best Paper Award at International Conference on Communication, Management and Information Technology (ICCMIT 2017), Warsaw, Poland. In 2016, he received the Best Service Award as the Deputy Director at Office of International Affairs, National Ilan University. He is presently serving as the Associate Editor for IEEE Access and Editorial Board Member and reviewer for various SCI, SCIE and Scopus Indexed Journals. He has played an active role in organizing several International Conferences, Seminars and Lectures. He has been a key note speaker in many International Conferences and IEEE events

Vishal Sharma received the Ph.D. and B.Tech. degrees in computer science and engineering from Thapar University (2016) and Punjab Technical University (2012), respectively. He worked at Thapar University as a Lecturer from Apr'16-Oct'16. From Nov. 2016 to Sept. 2017, he was a joint post-doctoral researcher in MobiSec Lab. at Department of Information Security Engineering, Soonchunhyang University, and Soongsil University, Republic of Korea. Dr. Sharma is now a Research Assistant Professor in the Department of Information Security Engineering under Industry-Academia Cooperation Foundation, Soonchunhyang University, Republic of Korea. Dr. Sharma received three best paper awards from the IEEE International Conference on Communication, Management and Information Technology (ICCMIT), Warsaw, Poland in April 2017; from CISC-S'17 South Korea in June 2017; and from IoTaas Taiwan in September 2017. He is the member of IEEE, a professional member of ACM and past Chair for ACM Student Chapter (TU)-Patiala. He has authored/coauthored more than 70 journal/conference articles and book chapters. He serves as the program committee member for the Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). He was the track chair of MobiSec'16,AIMS-FSS'16 and web chair of MobiSec'18, and PC member and reviewer of MIST'16 and MIST'17, respectively. He was the TPC member of ITNAC-IEEE TCBD'17 and is serving as TPC member of ICCMIT'18, CoCoNet'18, ProvSec-Workshop'18 and ITNAC-IEEE TCBD'18. Dr. Sharma is serving as the guest editor for special issues in Drones-MDPI, WCMC-Hindawi, AutoSoft and Sensors-MDPI. Also, he serves as a reviewer for various IEEE Transactions and other journals. His areas of research and interests are 5G networks, UAVs, estimation theory, and artificial intelligence.

DushanthaNalin K. Jayakody received the Ph. D. degree in Electronics, Electrical, and Communications Engineering in 2014, from the University College Dublin, Ireland. He received his MSc degree in Electronics and Communications Engineering from the Department of Electrical and Electronics Engineering, Eastern Mediterranean University, Turkey (under the University full graduate scholarship) and ranked as the first merit position holder of the department, and B. E. electronics engineering degree (with first-class honors) from Pakistan and was ranked as the merit position holder of the University (under SAARC Scholarship.). From 2014 - 2016, he was a Postdoc Research  Fellow at the Institute of computer science,  University of Tartu, Estonia and Department of Informatics, University of Bergen, Norway. From summer 2016, he is a Professor at the School of Computer  Science& Robotics, National Research Tomsk Polytechnic University, Russia, where he also serves as the Director of Tomsk Infocomm Lab. DrJayakody has received the best paper award from the IEEE International Conference on Communication, Management and Information Technology (ICCMIT) in 2017. Dr. Jayakody has   published over 80 international peer reviewed journal and conference papers. His research interests  include PHY layer prospective of 5G communications, Cooperative wireless  communications, device to device communications, LDPC  codes, Unmanned  Ariel Vehicle  etc. Dr. Jayakody is a Senior Member of IEEE and he has served as workshop chair, session chair or technical program committee member for various international conferences, such as IEEE PIMRC  2013/2014, IEEE WCNC 2014-2018, IEEE  VTC 2015-2018 etc. He currently serves as anArea Editor of Elsevier Physical Communications Journal, MDPI Information journal and Wiley Internet of Technology  Letters. Also, he serves as a reviewer for various IEEE Transactions and other journals. Kathiravan Srinivasan, received his B.E., in Electronics and Communication Engineering and M.E., in Communication Systems Engineering from Anna University, Chennai, India. He also received his Ph.D., in Information and Communication Engineering from Anna University Chennai, India.  He is presently working as an Associate Professor in the School of Information Technology and Engineering at Vellore Institute of Technology (VIT), India.  He was previously working as a faculty in the Department of Computer Science and Information Engineering and also as the Deputy Director- Office of International Affairs at National Ilan University, Taiwan.  He has won the Best Conference Paper Award at 2018 IEEE International Conference on Applied System Innovation, Chiba, Tokyo, April 13-17, 2018. Further, he has also received the Best Service Award, Department of Computer Science & Information Engineering, National Ilan University, Taiwan. In 2017, he has won Best Paper Award at 2017 IEEE International Conference on Applied System Innovation, Sapporo, Japan, May 13-17, 2017 and Best Paper Award at International Conference on Communication, Management and Information Technology (ICCMIT 2017), Warsaw, Poland. In 2016, he received the Best Service Award as the Deputy Director at Office of International Affairs, National Ilan University. He is presently serving as the Associate Editor for IEEE Access and Editorial Board Member and reviewer for various SCI, SCIE and Scopus Indexed Journals. He has played an active role in organizing several International Conferences, Seminars and Lectures. He has been a key note speaker in many International Conferences and IEEE events Vishal Sharma received the Ph.D. and B.Tech. degrees in computer science and engineering from Thapar University (2016) and Punjab Technical University (2012), respectively. He worked at Thapar University as a Lecturer from Apr'16-Oct'16. From Nov. 2016 to Sept. 2017, he was a joint post-doctoral researcher in MobiSec Lab. at Department of Information Security Engineering, Soonchunhyang University, and Soongsil University, Republic of Korea. Dr. Sharma is now a Research Assistant Professor in the Department of Information Security Engineering under Industry-Academia Cooperation Foundation, Soonchunhyang University, Republic of Korea. Dr. Sharma received three best paper awards from the IEEE International Conference on Communication, Management and Information Technology (ICCMIT), Warsaw, Poland in April 2017; from CISC-S'17 South Korea in June 2017; and from IoTaas Taiwan in September 2017. He is the member of IEEE, a professional member of ACM and past Chair for ACM Student Chapter (TU)-Patiala. He has authored/coauthored more than 70 journal/conference articles and book chapters. He serves as the program committee member for the Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA). He was the track chair of MobiSec'16,AIMS-FSS'16 and web chair of MobiSec'18, and PC member and reviewer of MIST'16 and MIST'17, respectively. He was the TPC member of ITNAC-IEEE TCBD'17 and is serving as TPC member of ICCMIT'18, CoCoNet'18, ProvSec-Workshop'18 and ITNAC-IEEE TCBD'18. Dr. Sharma is serving as the guest editor for special issues in Drones-MDPI, WCMC-Hindawi, AutoSoft and Sensors-MDPI. Also, he serves as a reviewer for various IEEE Transactions and other journals. His areas of research and interests are 5G networks, UAVs, estimation theory, and artificial intelligence.

Foreword 6
Preface 8
Acknowledgment 11
Contents 13
5G Security: Concepts and Challenges 17
Abbreviations 17
1 Overview 19
1.1 Introduction 19
1.2 Evolution of Cellular Technologies 19
First Generation 20
Second Generation 20
Third Generation 21
Fourth Generation 22
Fifth Generation 22
1.3 The Significance of 5G Security 23
1.4 The Need for Security 24
2 5G Security Standardization 24
2.1 Internet Engineering Task Force 25
3 Security Characteristics of 5G 26
3.1 Drivers of 5G 26
3.2 Significance of Security and Privacy 27
Modern Confide Models 27
Security for New Relevance Transmission Models 27
Emerging Risk Prospects 28
Raised Privacy Concerns 28
4 Network Planning 29
4.1 Objectives 29
4.2 Planning Inputs 30
Traffic Models 30
Potential Site Locations 31
BS Model 31
Propagation Prediction Models 31
4.3 Planning Outputs 32
4.4 Types of Network Planning 32
Rollout Network Planning 32
Incremental Network Planning 32
5 5G Roadmap 33
5.1 Need for Roadmap 33
5.2 Roadmap Process 34
6 Existing Concepts of 5G 34
6.1 Multiple Input and Multiple Output 34
6.2 Cognitive Radio Network 35
7 Security Models 36
7.1 Identity Management 37
7.2 UE Security 37
7.3 Radio Network Security 38
7.4 Flexible and Scalable Security 38
7.5 Network Slicing Security 38
7.6 Vitality Effective Security 39
7.7 Cloud Security 39
8 Security Protocols 40
8.1 Informal Security Protocols 40
Dolev-Yao Adversary 40
Threat Model 40
Security Properties 41
Authentication Properties for Protocols 41
Channels 42
Attack Scenarios 44
9 Channel Security 44
9.1 Introduction 44
9.2 Physical Layer Security Coding 45
LDPC Codes 45
Polar Codes 46
Lattice Codes 47
9.3 Massive MIMO 48
Passive Eavesdropper Scenarios 48
Active Eavesdropper Scenarios 48
9.4 Millimeter Wave (mmWave) Communications 50
9.5 Heterogeneous Networks 51
Physical Layer Security in Heterogeneous Networks 51
9.6 Non-orthogonal Multiple Access (NOMA) 52
Physical Layer Security of NOMA 52
9.7 Full Duplex Technology 53
Full Duplex Receiver 53
Full Duplex Base Station 54
Full Duplex Eavesdropper 54
References 56
5G Applications and Architectures 60
Brief Summary 60
1 Brief Introduction to 5G 61
2 Applications 61
3 Novel Architectures and Implications 62
4 Cross-Layer Design 67
5 SDN-NFV-Based Models 69
5.1 Software-Defined Network (SDN) 69
5.2 Network function virtualization (NFV) 74
NFV Infrastructure 74
Virtualized Network Framework (VNF) 74
Management and Network Orchestration (MNO) 74
OSS"026E30F BSS Layer 76
6 Service Architectures and Potential Direction 76
6.1 Industry Initiatives 76
7 Conclusion 78
Appendix 79
NEMO 79
References 79
A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks 84
1 Introduction 84
1.1 Applications of 5G Networks 85
1.2 Attacks and Threats in 5G Networks 87
2 Preliminaries: Osmotic Computing 87
3 Preliminaries: Catalytic Computing 90
4 Existing Surveys and Their Applicability 90
5 Taxonomy of Security Concerns for 5G Networks 92
5.1 Secure Resource Allocation in 5G 92
5.2 Secure Mobility Management in 5G 95
5.3 Secure Routing in 5G 98
5.4 Secure Physical Layer Formations in 5G 100
5.5 Secure Autonomous and Smart Services in 5G 102
6 CATMOSIS: A Generalized Model for 5G Security 104
7 Open Issues and Future Directions 106
8 Conclusions 109
References 110
Physical Layer Security in 5G Hybrid Heterogeneous Networks 118
1 Introduction 118
2 Background 119
3 The System Layout 120
4 System Performance Evaluation 126
4.1 Achievable Rates 126
4.2 Physical Layer Security Parameters 127
5 Simulation Results and Performance Analysis 128
6 Conclusion 133
References 134
Physical Layer Security of Energy Harvesting Machine-to-Machine Communication System 137
1 Introduction to Machine-to-Machine Communications 137
1.1 Applications of M2M Communications 138
1.2 Design and Performance Analysis of M2M Communications 140
1.3 M2M Security Challenges and State-of-the-Art Solutions 140
2 Energy Harvesting 141
2.1 Energy Harvesting Sources 142
2.2 RF Energy Harvesting 143
Recent Developments in Wireless Power Transfer 144
3 Principles of Physical Layer Security 145
3.1 Categorization of Eavesdroppers 145
Based on Cooperation 145
Based on Activity 146
3.2 Comparative Analysis of Secure Energy Harvesting Protocols 146
4 Secrecy Performance of Energy Harvesting M2M Networks 150
4.1 System Model 150
Assumptions 151
Dedicated Jamming 151
FD Destination-Assisted Jamming 153
4.2 Secrecy Outage Probability Analysis 156
Dedicated Jamming 156
FD Destination-Assisted Jamming 157
4.3 Results and Discussion 158
4.4 Conclusions 161
4.5 Future Research Directions 161
References 162
Beam-Domain Full-Duplex Massive MIMO Transmission in the Cellular System 168
1 Introduction 168
2 System and Channel Models 170
3 Beam-Domain Full-Duplex Transmission Scheme 174
3.1 Beam-Domain Channel Representation 174
3.2 Beam-Domain Full-Duplex Transmission 180
4 Practical Implementation of BDFD Scheme 184
4.1 K-Means-Based UE Grouping 184
4.2 Full-Duplex Effective Beam-Domain Channel Estimation 186
Uplink Effective Beam-Domain Channel Estimation 187
Downlink Effective Beam-Domain Channel Estimation 188
4.3 Beam-Domain Data Transmission and Achievable Rate with Noisy CSI 189
4.4 Interference Control Between Uplink and Downlink 193
5 Simulation Results 193
6 Conclusion 198
Appendix 198
References 202
Correction to: 5G Security: Concepts and Challenges 206
Index 207

Erscheint lt. Verlag 5.2.2019
Zusatzinfo XVIII, 200 p. 64 illus., 62 illus. in color.
Verlagsort Cham
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Technik Elektrotechnik / Energietechnik
Technik Maschinenbau
Schlagworte 5G Communications • BSNs • cellular networks • Fog/Edge/Osmotic Computing • HetNets • internet of things • Software Defined Networks • Wireless Networking
ISBN-10 3-030-03508-5 / 3030035085
ISBN-13 978-3-030-03508-2 / 9783030035082
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 4,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99