Comprehensive Guide to 5G Security
Inbunden, Engelska, 2018
Av Madhusanka Liyanage, Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila
1 999 kr
Beställningsvara. Skickas inom 5-8 vardagar
Fri frakt för medlemmar vid köp för minst 249 kr.The first comprehensive guide to the design and implementation of security in 5G wireless networks and devicesSecurity models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem.5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks.Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect itCovers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networksAddresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity viewsExplores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity expertsProviding a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.
Produktinformation
- Utgivningsdatum2018-03-09
- Mått174 x 246 x 28 mm
- Vikt862 g
- FormatInbunden
- SpråkEngelska
- Antal sidor480
- FörlagJohn Wiley & Sons Inc
- ISBN9781119293040
Tillhör följande kategorier
Madhusanka Liyanage, PhD, is a post-doctoral researcher at the Centre for Wireless Communications, University of Oulu, Finland. Ijaz Ahmad, MSc, is a PhD candidate at the University of Oulu, Finland. Ahmed Abro, MS, is an Enterprise Solutions Architect at VMware, Inc., United States. Andrei Gurtov, PhD, is a professor in the Department of Computer and Information Science, Linköping University, Sweden. Mika Ylianttila, PhD, is a professor at the Centre for Wireless Communications, University of Oulu, Finland.
- The Editors xviiAbout the Contributors xxiForeword xxxiiiPreface xxxvAcknowledgements xliPart I 5G Security Overview 11 Evolution of Cellular Systems 3Shahriar Shahabuddin, Sadiqur Rahaman, Faisal Rehman, Ijaz Ahmad, and Zaheer Khan1.1 Introduction 31.2 Early Development 41.3 First Generation Cellular Systems 61.3.1 Advanced Mobile Phone Service 71.3.2 Security in 1G 71.4 Second Generation Cellular Systems 81.4.1 Global System for Mobile Communications 81.4.2 GSM Network Architecture 91.4.3 Code Division Multiple Access 101.4.4 Security in 2G 101.4.5 Security in GSM 111.4.5.1 IMSI 111.4.5.2 Ki 121.4.5.3 A3 Algorithm 121.4.5.4 A8 Algorithm 131.4.5.5 COMP128 141.4.5.6 A5 Algorithm 141.4.6 Security in IS]95 141.5 Third Generation Cellular Systems 151.5.1 CDMA 2000 151.5.2 UMTS WCDMA 151.5.3 UMTS Network Architecture 161.5.4 HSPA 171.5.5 Security in 3G 171.5.6 Security in CDMA2000 171.5.7 Security in UMTS 181.6 Cellular Systems beyond 3G 201.6.1 HSPA+ 201.6.2 Mobile WiMAX 201.6.3 LTE 211.6.3.1 Orthogonal Frequency Division Multiplexing (OFDM) 211.6.3.2 SC]FDE and SC]FDMA 211.6.3.3 Multi]antenna Technique 211.6.4 LTE Network Architecture 211.7 Fourth Generation Cellular Systems 221.7.1 Key Technologies of 4G 231.7.1.1 Enhanced MINO 231.7.1.2 Cooperative Multipoint Transmission and Reception for LTE]Advanced 231.7.1.3 Spectrum and Bandwidth Management 241.7.1.4 Carrier Aggregation 241.7.1.5 Relays 241.7.2 Network Architecture 241.7.3 Beyond 3G and 4G Cellular Systems Security 251.7.4 LTE Security Model 261.7.5 Security in WiMAX 261.8 Conclusion 27References 282 5G Mobile Networks: Requirements, Enabling Technologies, and Research Activities 31Van]Giang Nguyen, Anna Brunstrom, Karl]Johan Grinnemo, and Javid Taheri2.1 Introduction 312.1.1 What is 5G? 312.1.1.1 From a System Architecture Perspective 322.1.1.2 From the Spectrum Perspective 322.1.1.3 From a User and Customer Perspective 322.1.2 Typical Use Cases 322.2 5G Requirements 332.2.1 High Data Rate and Ultra Low Latency 342.2.2 Massive Connectivity and Seamless Mobility 352.2.3 Reliability and High Availability 352.2.4 Flexibility and Programmability 362.2.5 Energy, Cost and Spectrum Efficiency 362.2.6 Security and Privacy 362.3 5G Enabling Technologies 372.3.1 5G Radio Access Network 382.3.1.1 mmWave Communication 382.3.1.2 Massive MIMO 382.3.1.3 Ultra]Dense Small Cells 392.3.1.4 M2M and D2D Communications 402.3.1.5 Cloud]based Radio Access Network 422.3.1.6 Mobile Edge and Fog Computing 422.3.2 5G Mobile Core Network 442.3.2.1 Software Defined Networking 442.3.2.2 Network Function Virtualization 442.3.2.3 Cloud Computing 462.3.3 G End]to]End System 462.3.3.1 Network Slicing 462.3.3.2 Management and Orchestration 472.4 5G Standardization Activities 482.4.1 ITU Activities 482.4.1.1 ITU]R 492.4.1.2 ITU]T 492.4.2 3GPP Activities 492.4.2.1 Pre]5G Phase 492.4.2.2 5G Phase I 502.4.2.3 5G Phase II 502.4.3 ETSI Activities 502.4.4 IEEE Activities 512.4.5 IETF Activities 522.5 5G Research Communities 522.5.1 European 5G Related Activities 522.5.1.1 5G Research in EU FP7 522.5.1.2 5G Research in EU H2020 522.5.1.3 5G Research in Celtic]Plus 532.5.2 Asian 5G Related Activities 532.5.2.1 South Korea: 5G Forum 532.5.2.2 Japan: 5GMF Forum 542.5.2.3 China: IMT]2020 5G Promotion Group 542.5.3 American 5G Related Activities 542.6 Conclusion 552.7 Acknowledgement 55References 553 Mobile Networks Security Landscape 59Ahmed Bux Abro3.1 Introduction 593.2 Mobile Networks Security Landscape 593.2.1 Security Threats and Protection for 1G 613.2.2 Security Threats and Protection for 2G 613.2.3 Security Threats and Protection for 3G 633.2.4 Security Threats and Protection for 4G 633.2.4.1 LTE UE (User Equipment) Domain Security 643.2.4.2 LTE (Remote Access Network) Domain Security 653.2.4.3 LTE Core Network Domain Security 653.2.4.4 Security Threat Analysis for 4G 653.2.5 Security Threats and Protection for 5G 663.2.5.1 Next Generation Threat Landscape for 5G 683.2.5.2 IoT Threat Landscape 683.2.5.3 5G Evolved Security Model 683.2.5.4 5G Security Threat Analysis 693.3 Mobile Security Lifecycle Functions 703.3.1 Secure Device Management 713.3.2 Mobile OS and App Patch Management 713.3.3 Security Threat Analysis and Assessment 713.3.4 Security Monitoring 723.4 Conclusion 73References 734 Design Principles for 5G Security 75Ijaz Ahmad, Madhusanka Liyanage, Shahriar Shahabuddin, Mika Ylianttila, and Andrei Gurtov4.1 Introduction 754.2 Overviews of Security Recommendations and Challenges 764.2.1 Security Recommendations by ITU]T 774.2.2 Security Threats and Recommendations by NGMN 784.2.3 Other Security Challenges 794.2.3.1 Security Challenges in the Access Network 794.2.3.2 DoS Attacks 794.2.3.3 Security Challenges in the Control Layer or Core Network 804.3 Novel Technologies for 5G Security 814.3.1 5G Security Leveraging NFV 824.3.2 Network Security Leveraging SDN 834.3.3 Security Challenges in SDN 844.3.3.1 Application Layer 844.3.3.2 Controller Layer 854.3.3.3 Infrastructure Layer 864.3.4 Security Solutions for SDN 864.3.4.1 Application Plane Security 864.3.4.2 Control Plane Security 874.3.4.3 Data Plane Security Solutions 874.4 Security in SDN]based Mobile Networks 884.4.1 Data Link Security 884.4.2 Control Channels Security 894.4.3 Traffic Monitoring 914.4.4 Access Control 914.4.5 Network Resilience 914.4.6 Security Systems and Firewalls 924.4.7 Network Security Automation 924.5 Conclusions and Future Directions 944.6 Acknowledgement 95References 955 Cyber Security Business Models in 5G 99Julius Francis Gomes, Marika Iivari, Petri Ahokangas, Lauri Isotalo, Bengt Sahlin, and Jan Melén5.1 Introduction 995.2 The Context of Cyber Security Businesses 1005.2.1 Types of Cyber Threat 1015.2.2 The Cost of Cyber]Attacks 1025.3 The Business Model Approach 1035.3.1 The 4C Typology of the ICT Business Model 1045.3.2 Business Models in the Context of Cyber Preparedness 1055.4 The Business Case of Cyber Security in the Era of 5G 1065.4.1 The Users and Issues of Cyber Security in 5G 1085.4.2 Scenarios for 5G Security Provisioning 1095.4.3 Delivering Cyber Security in 5G 1105.5 Business Model Options in 5G Cyber Security 1125.6 Acknowledgment 114References 114Part II 5G Network Security 1176 Physical Layer Security 119Simone Soderi, Lorenzo Mucchi, Matti Hämäläinen, Alessandro Piva, and Jari Iinatti6.1 Introduction 1196.1.1 Physical Layer Security in 5G Networks 1206.1.2 Related Work 1216.1.3 Motivation 1216.2 WBPLSec System Model 1236.2.1 Transmitter 1246.2.2 Jamming Receiver 1266.2.3 Secrecy Metrics 1266.2.4 Secrecy Capacity of WBPLSec 1286.2.5 Secrecy Capacity of iJAM 1296.3 Outage Probability of Secrecy Capacity of a Jamming Receiver 1316.3.1 Simulation Scenario for Secrecy Capacity 1346.4 WBPLSec Applied to 5G networks 1366.5 Conclusions 138References 1397 5G]WLAN Security 143Satish Anamalamudi, Abdur Rashid Sangi, Mohammed Alkatheiri, Fahad T. Bin Muhaya, and Chang Liu7.1 ChapterOverview 1437.2 Introduction to WiFi]5G Networks Interoperability 1437.2.1 WiFi (Wireless Local Area Network) 1437.2.2 Interoperability of WiFi with 5G Networks 1447.2.3 WiFi Security 1447.3 Overview of Network Architecture for WiFi]5G Networks Interoperability 1467.3.1 MAC Layer 1477.3.2 Network Layer 1477.3.3 Transport Layer 1487.3.4 Application Layer 1497.4 5G]WiFi Security Challenges 1507.4.1 Security Challenges with Respect to a Large Number of Device Connectivity 1517.4.2 Security Challenges in 5G Networks and WiFi 1517.5 Security Consideration for Architectural Design of WiFi]5G Networks 1567.5.1 User and Device Identity Confidentiality 1567.5.2 Integrity 1567.5.3 Mutual Authentication and Key Management 1577.6 LiFi Networks 1587.7 Introduction to LiFi]5G Networks Interoperability 1597.8 5G]LiFi Security Challenges 1607.8.1 Security Challenges with Respect to a Large Number of Device Connectivity 1607.8.2 Security Challenges in 5G Networks and LiFi 1607.9 Security Consideration for Architectural Design of LiFi]5G Networks 1607.10 Conclusion and Future Work 161References 1618 Safety of 5G Network Physical Infrastructures 165Rui Travanca and João André8.1 Introduction 1658.2 Historical Development 1688.2.1 Typology 1688.2.2 Codes 1708.2.3 Outlook 1708.3 Structural Design Philosophy 1718.3.1 Basis 1718.3.2 Actions 1748.3.3 Structural Analysis 1798.3.4 Steel Design Verifications 1808.3.4.1 Ultimate Limit States 1808.3.4.2 Serviceability Limit States 1818.4 Survey of Problems 1818.4.1 General 1818.4.2 Design Failures 1828.4.3 Maintenance Failures 1838.4.4 Vandalism or Terrorism Failures 1868.5 Opportunities and Recommendations 1888.6 Acknowledgement 190References 1919 Customer Edge Switching: A Security Framework for 5G 195Hammad Kabir, Raimo Kantola, and Jesus Llorente Santos9.1 Introduction 1959.2 State]of]the]art in Mobile Networks Security 1979.2.1 Mobile Network Challenges and Principles of Security Framework 2009.2.2 Trust Domains and Trust Processing 2029.3 CES Security Framework 2039.3.1 DNS to Initiate Communication 2059.3.2 CETP Policy]based Communication 2069.3.3 Policy Architecture 2089.3.4 CES Security Mechanisms 2099.3.5 Realm Gateway 2109.3.6 RGW Security Mechanisms 2119.3.6.1 Name Server Classification and Allocation Model 2129.3.6.2 Preventing DNS Abuse 2129.3.6.3 Bot]Detection Algorithm 2139.3.6.4 TCP]Splice 2139.4 Evaluation of CES Security 2139.4.1 Evaluating the CETP Policy]based Communication 2149.4.1.1 Security Testing 2169.4.1.2 Outcomes of the Security Testing 2169.4.2 Evaluation of RGW Security 2179.5 Deployment in 5G Networks 2229.5.1 Use Case 1: Mobile Broadband 2249.5.1.1 Deployment and Operations 2249.5.1.2 Security Benefits 2249.5.1.3 Scalability 2259.5.1.4 Reliability 2259.5.2 Use Case 2: Corporate Gateway 2259.5.2.1 Deployment and Operations 2259.5.2.2 Security Benefits 2269.5.2.3 Scalability 2269.5.2.4 Reliability 2269.5.3 Use Case 3: National CERT Centric Trust Domain 2269.5.3.1 Deployment and Operations 2269.5.3.2 Security Benefits 2279.5.3.3 Scalability 2279.5.3.4 Reliability 2279.5.4 Use Case 4: Industrial Internet for Road Traffic and Transport 2279.5.4.1 Deployment and Operations 2279.5.4.2 Security Benefits 2289.5.4.3 Scalability 2289.5.4.4 Reliability 2289.6 Conclusion 228References 23010 Software Defined Security Monitoring in 5G Networks 231Madhusanka Liyanage, Ijaz Ahmad, Jude Okwuibe, Edgardo Montes de Oca, Mai Hoang Long, Oscar Lopez Perez, and Mikel Uriarte Itzazelaia10.1 Introduction 23110.2 Existing Monitoring Techniques 23210.3 Limitations on Current Monitoring Techniques 23310.4 Use of Monitoring in 5G 23410.5 Software]Defined Monitoring Architecture 23510.6 Expected Advantages of Software Defined Monitoring 23810.7 Expected Challenges in Software Defined Monitoring 24010.8 Conclusion 242References 243Part III 5G Device and User Security 24511 IoT Security 247Mehrnoosh Monshizadeh, and Vikramajeet Khatri11.1 Introduction 24711.2 Related Work 24811.3 Literature Overview and Research Motivation 24911.3.1 IoT Devices, Services and Attacks on Them 25011.3.2 Research Motivation 25311.4 Distributed Security Platform 25411.4.1 Robot Data Classification 25411.4.2 Robot Attack Classification 25511.4.3 Robot Security Platform 25611.4.3.1 Robot Section 25711.4.3.2 Mobile Network Section 25711.5 Mobile Cloud Robot Security Scenarios 25911.5.1 Robot with SIMcard 25911.5.2 SIMless Robot 26011.5.3 Robot Attack 26311.5.4 Robot Communication 26311.6 Conclusion 263References 26512 User Privacy, Identity and Trust 267Tanesh Kumar, Madhusanka Liyanage, Ijaz Ahmad, An Braeken, and Mika Ylianttila12.1 Introduction 26712.2 Background 26812.3 User Privacy 26912.3.1 Data Privacy 26912.3.2 Location Privacy 27112.3.3 Identity Privacy 27212.4 Identity Management 27312.5 Trust Models 27412.6 Discussion 27712.7 Conclusion 278References 27913 5G Positioning: Security and Privacy Aspects 281Elena Simona Lohan, Anette Alén]Savikko, Liang Chen, Kimmo Järvinen, Helena Leppäkoski, Heidi Kuusniemi, and Päivi Korpisaari13.1 Introduction 28113.2 Outdoor versus Indoor Positioning Technologies 28313.3 Passive versus Active Positioning 28313.4 Brief Overview of 5G Positioning Mechanisms 28513.5 Survey of Security Threats and Privacy Issues in 5G Positioning 29113.5.1 Security Threats in 5G Positioning 29113.5.1.1 Security Threats Affecting Several or All Players 29113.5.1.2 Security Threats Affecting LISP 29213.5.1.3 Security Threats Affecting LBSP 29313.5.1.4 Security Threats Affecting the 5G User Device or LIC 29313.6 Main Privacy Concerns 29413.7 Passive versus Active Positioning Concepts 29513.8 Physical] Layer Based Security Enhancements Mechanisms for Positioning in 5G 29613.8.1 Reliability Monitoring and Outlier Detection Mechanisms 29613.8.2 Detection, Location and Estimation of Interference Signals 29713.8.3 Backup Systems 29813.9 Enhancing Trustworthiness 29913.10 Cryptographic Techniques for Security and Privacy of Positioning 29913.10.1 Cryptographic Authentication in Positioning 30013.10.2 Cryptographic Distance]Bounding 30113.10.3 Cryptographic Techniques for Privacy]Preserving Location]based Services 30313.11 Legislation on User Location Privacy in 5G 30413.11.1 EU Policy and Legal Framework 30413.11.2 Legal Aspects Related to the Processing of Location Data 30613.11.3 Privacy Protection by Design and Default 30613.11.4 Security Protection 30713.11.5 A Closer Look at the e]Privacy Directive 30713.11.6 Summary of EU Legal Instruments 30813.11.7 International Issues 30813.11.8 Challenges and Future Scenarios in Legal Frameworks and Policy 30913.12 Landscape of the European and International Projects related to Secure Positioning 311References 312Part IV 5G Cloud and Virtual Network Security 32114 Mobile Virtual Network Operators (MVNO) Security 323Mehrnoosh Monshizadeh and Vikramajeet Khatri14.1 Introduction 32314.2 Related Work 32414.3 Cloudification of the Network Operators 32514.4 MVNO Security 32614.4.1 Data Security in TaaS 32714.4.2 Hypervisor and VM Security in TaaS 32814.4.2.1 SDN Security in TaaS 32914.4.2.2 NFV Security in TaaS 33114.4.2.3 OPNFV Security 33214.4.3 Application Security in TaaS 33314.4.4 Summary 33414.4.5 MVNO Security Benchmark 33514.5 TaaS Deployment Security 33814.5.1 IaaS 33814.5.2 PaaS 34014.5.3 SaaS 34014.6 Future Directions 34014.7 Conclusion 341References 34215 NFV and NFV]based Security Services 347Wenjing Chu15.1 Introduction 34715.2 5G, NFV and Security 34715.3 A Brief Introduction to NFV 34815.4 NFV, SDN, and a Telco Cloud 35115.5 Common NFV Drivers 35315.5.1 Technology Curve 35315.5.2 Opportunity Cost and Competitive Landscape 35315.5.3 Horizontal Network Slicing 35415.5.4 Multi]Tenancy 35415.5.5 Rapid Service Delivery 35415.5.6 XaaS Models 35415.5.7 One Cloud 35515.6 NFV Security: Challenges and Opportunities 35515.6.1 VNF Security Lifecycle and Trust 35515.6.2 VNF Security in Operation 35815.6.3 Multi]Tenancy and XaaS 35915.6.4 OPNFV and Openstack: Open Source Projects for NFV 36015.7 NFV]based Security Services 36415.7.1 NFV]based Network Security 36515.7.1.1 Virtual Security Appliances 36515.7.1.2 Distributed Network Security Services 36615.7.1.3 Network Security as a Service 36615.7.2 Policy]based Security Services 36615.7.2.1 Group]based Policy 36715.7.2.2 Openstack Congress 36815.7.3 Machine Learning for NFV]based Security Services 36915.8 Conclusions 370References 37016 Cloud and MEC Security 373Jude Okwuibe, Madhusanka Liyanage, Ijaz Ahmed, and Mika Ylianttila16.1 Introduction 37316.2 Cloud Computing in 5G Networks 37416.2.1 Overview and History of Cloud Computing 37516.2.2 Cloud Computing Architecture 37616.2.3 Cloud Deployment Models 37716.2.4 Cloud Service Models 37816.2.5 5G Cloud Computing Architecture 37916.2.6 Use Cases/Scenarios of Cloud Computing in 5G 38016.3 MEC in 5G Networks 38116.3.1 Overview of MEC Computing 38116.3.2 MEC in 5G 38316.3.3 Use Cases of MEC Computing in 5G 38416.4 Security Challenges in 5G Cloud 38516.4.1 Virtualization Security 38516.4.2 Cyber]Physical System (CPS) Security 38616.4.3 Secure and Private Data Computation 38616.4.4 Cloud Intrusion 38716.4.5 Access Control 38716.5 Security Challenges in 5G MEC 38816.5.1 Denial of Service (DoS) Attack 38916.5.2 Man]in]the]Middle (MitM) 38916.5.3 Inconsistent Security Policies 38916.5.4 VM Manipulation 39016.5.5 Privacy Leakage 39016.6 Security Architectures for 5G Cloud and MEC 39116.6.1 Centralized Security Architectures 39116.6.2 SDN]based Cloud Security Systems 39216.7 5GMEC, Cloud Security Research and Standardizations 39216.8 Conclusions 394References 39417 Regulatory Impact on 5G Security and Privacy 399Jukka Salo and Madhusanka Liyanage17.1 Introduction 39917.2 Regulatory Objectives for Security and Privacy 40117.2.1 Generic Objectives 40117.3 Legal Framework for Security and Privacy 40217.3.1 General Framework 40217.3.2 Legal Framework for Security and Privacy in Cloud Computing 40317.3.3 Legal Framework for Security and Privacy in Software Defined Networking and Network Function Virtualization 40517.4 Security and Privacy Issues in New 5G Technologies 40517.4.1 Security and Privacy Issues in Cloud Computing 40517.4.2 Security and Privacy Issues in Network Functions Virtualization 40717.4.3 Security and Privacy Issues in Software Defined Networking (SDN) 40917.4.4 Summary of Security and Privacy Issues in the Context of Technologies under Study (Clouds, NFV, SDN) 41017.5 Relevance Assessment of Security and Privacy Issues for Regulation 41117.6 Analysis of Potential Regulatory Approaches 41217.7 Summary of Issues and Impact of New Technologies on Security and Privacy Regulation 413References 417Index