A Comprehensive Guide to 5G Security /

The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face addi...

Full description

Bibliographic Details
Main Authors: Liyanage, Madhusanka (Author), Aḥmad, Iʻjāz (Author), Abro, Ahmed (Author), Gurtov, Andrei (Author), Ylianttila, Mika (Author)
Corporate Author: Safari, an O'Reilly Media Company
Format: eBook
Language:English
Published: Wiley, 2018.
Edition:1st edition.
Subjects:
Online Access:Connect to this electronic resource

MARC

LEADER 00000uam a2200000 a 4500
001 in00004143960
005 20201020071026.0
006 m o d
007 cr cn
008 230318s2018 xx o eng
020 |z 9781119293040 
020 |z 9781119293057 
035 |a (CaSebORM)9781119293040 
040 |d UtOrBLW 
041 0 |a eng 
100 1 |a Liyanage, Madhusanka,  |e author.  |0 http://id.loc.gov/authorities/names/n2015015841 
245 1 2 |a A Comprehensive Guide to 5G Security /  |c Liyanage, Madhusanka. 
250 |a 1st edition. 
264 1 |b Wiley,  |c 2018. 
300 |a 1 online resource (474 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment. 
533 |a Electronic reproduction.  |b Boston, MA :  |c Safari,  |n Available via World Wide Web.  |d 2017. 
538 |a Mode of access: World Wide Web. 
542 |f Copyright © 2017 by John Wiley & Sons  |g 2017 
588 |a Online resource; Title from title page (viewed March 19, 2018) 
500 |a Electronic resource. 
655 7 |a Electronic books.  |2 local 
700 1 |a Aḥmad, Iʻjāz,  |e author.  |0 http://id.loc.gov/authorities/names/n91024587 
700 1 |a Abro, Ahmed,  |e author. 
700 1 |a Gurtov, Andrei,  |e author.  |0 http://id.loc.gov/authorities/names/n2008010304 
700 1 |a Ylianttila, Mika,  |e author.  |0 http://id.loc.gov/authorities/names/nb2011013513 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://go.oreilly.com/TAMU/library/view/-/9781119293040/?ar  |z Connect to this electronic resource  |t 0 
999 f f |s 3f2f848d-557c-30ed-984b-07ffded7e48e  |i 0f2e2540-4ea7-3825-9d16-c602c41d01c9  |t 0 
952 f f |a Texas A&M University  |b College Station  |c Electronic Resources  |d Available Online  |t 0  |h No information provided 
998 f f |t 0  |l Available Online