Comprehensive guide to 5G security:
The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face addi...
Gespeichert in:
Weitere beteiligte Personen: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, NJ
John Wiley & Sons
2018
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119293040/?ar |
Zusammenfassung: | The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: -Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it -Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks -Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views -Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment. |
Beschreibung: | Includes bibliographical references and index. - Print version record and CIP data provided by publisher |
Umfang: | 1 Online-Ressource |
ISBN: | 9781119293088 1119293081 9781119293057 1119293057 9781119293071 1119293073 9781119293040 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-04755357X | ||
003 | DE-627-1 | ||
005 | 20240228120340.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx |||||o 00| ||eng c | ||
020 | |a 9781119293088 |c pdf |9 978-1-119-29308-8 | ||
020 | |a 1119293081 |9 1-119-29308-1 | ||
020 | |a 9781119293057 |c epub |9 978-1-119-29305-7 | ||
020 | |a 1119293057 |9 1-119-29305-7 | ||
020 | |a 9781119293071 |9 978-1-119-29307-1 | ||
020 | |a 1119293073 |9 1-119-29307-3 | ||
020 | |a 9781119293040 |9 978-1-119-29304-0 | ||
035 | |a (DE-627-1)04755357X | ||
035 | |a (DE-599)KEP04755357X | ||
035 | |a (ORHE)9781119293040 | ||
035 | |a (DE-627-1)04755357X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Comprehensive guide to 5G security |c edited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila |
264 | 1 | |a Hoboken, NJ |b John Wiley & Sons |c 2018 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record and CIP data provided by publisher | ||
520 | |a The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: -Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it -Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks -Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views -Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment. | ||
650 | 0 | |a Mobile communication systems |x Security measures | |
650 | 0 | |a Wireless communication systems |x Security measures | |
650 | 4 | |a Radiocommunications mobiles ; Sécurité ; Mesures | |
650 | 4 | |a Transmission sans fil ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Programming ; Mobile Devices | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Wireless communication systems ; Security measures | |
700 | 1 | |a Liyanage, Madhusanka |e HerausgeberIn |4 edt | |
700 | 1 | |a Ahmad, Ijaz |d 1985- |e HerausgeberIn |4 edt | |
700 | 1 | |a Abro, Ahmed Bux |e HerausgeberIn |4 edt | |
700 | 1 | |a Gurtov, Andrei |e HerausgeberIn |4 edt | |
700 | 1 | |a Ylianttila, Mika |e HerausgeberIn |4 edt | |
776 | 1 | |z 9781119293040 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119293040 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119293040/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-04755357X |
---|---|
_version_ | 1821494883006808064 |
adam_text | |
any_adam_object | |
author2 | Liyanage, Madhusanka Ahmad, Ijaz 1985- Abro, Ahmed Bux Gurtov, Andrei Ylianttila, Mika |
author2_role | edt edt edt edt edt |
author2_variant | m l ml i a ia a b a ab aba a g ag m y my |
author_facet | Liyanage, Madhusanka Ahmad, Ijaz 1985- Abro, Ahmed Bux Gurtov, Andrei Ylianttila, Mika |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)04755357X (DE-599)KEP04755357X (ORHE)9781119293040 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04461cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-04755357X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120340.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119293088</subfield><subfield code="c">pdf</subfield><subfield code="9">978-1-119-29308-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119293081</subfield><subfield code="9">1-119-29308-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119293057</subfield><subfield code="c">epub</subfield><subfield code="9">978-1-119-29305-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119293057</subfield><subfield code="9">1-119-29305-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119293071</subfield><subfield code="9">978-1-119-29307-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119293073</subfield><subfield code="9">1-119-29307-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119293040</subfield><subfield code="9">978-1-119-29304-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04755357X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04755357X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119293040</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04755357X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Comprehensive guide to 5G security</subfield><subfield code="c">edited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">John Wiley & Sons</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record and CIP data provided by publisher</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: -Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it -Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks -Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views -Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Radiocommunications mobiles ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Transmission sans fil ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Programming ; Mobile Devices</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Liyanage, Madhusanka</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ahmad, Ijaz</subfield><subfield code="d">1985-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abro, Ahmed Bux</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gurtov, Andrei</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ylianttila, Mika</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119293040</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119293040</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119293040/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-04755357X |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:21:27Z |
institution | BVB |
isbn | 9781119293088 1119293081 9781119293057 1119293057 9781119293071 1119293073 9781119293040 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | John Wiley & Sons |
record_format | marc |
spelling | Comprehensive guide to 5G security edited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila Hoboken, NJ John Wiley & Sons 2018 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record and CIP data provided by publisher The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: -Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it -Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks -Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views -Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment. Mobile communication systems Security measures Wireless communication systems Security measures Radiocommunications mobiles ; Sécurité ; Mesures Transmission sans fil ; Sécurité ; Mesures COMPUTERS ; Programming ; Mobile Devices COMPUTERS ; Security ; General Wireless communication systems ; Security measures Liyanage, Madhusanka HerausgeberIn edt Ahmad, Ijaz 1985- HerausgeberIn edt Abro, Ahmed Bux HerausgeberIn edt Gurtov, Andrei HerausgeberIn edt Ylianttila, Mika HerausgeberIn edt 9781119293040 Erscheint auch als Druck-Ausgabe 9781119293040 |
spellingShingle | Comprehensive guide to 5G security Mobile communication systems Security measures Wireless communication systems Security measures Radiocommunications mobiles ; Sécurité ; Mesures Transmission sans fil ; Sécurité ; Mesures COMPUTERS ; Programming ; Mobile Devices COMPUTERS ; Security ; General Wireless communication systems ; Security measures |
title | Comprehensive guide to 5G security |
title_auth | Comprehensive guide to 5G security |
title_exact_search | Comprehensive guide to 5G security |
title_full | Comprehensive guide to 5G security edited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila |
title_fullStr | Comprehensive guide to 5G security edited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila |
title_full_unstemmed | Comprehensive guide to 5G security edited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila |
title_short | Comprehensive guide to 5G security |
title_sort | comprehensive guide to 5g security |
topic | Mobile communication systems Security measures Wireless communication systems Security measures Radiocommunications mobiles ; Sécurité ; Mesures Transmission sans fil ; Sécurité ; Mesures COMPUTERS ; Programming ; Mobile Devices COMPUTERS ; Security ; General Wireless communication systems ; Security measures |
topic_facet | Mobile communication systems Security measures Wireless communication systems Security measures Radiocommunications mobiles ; Sécurité ; Mesures Transmission sans fil ; Sécurité ; Mesures COMPUTERS ; Programming ; Mobile Devices COMPUTERS ; Security ; General Wireless communication systems ; Security measures |
work_keys_str_mv | AT liyanagemadhusanka comprehensiveguideto5gsecurity AT ahmadijaz comprehensiveguideto5gsecurity AT abroahmedbux comprehensiveguideto5gsecurity AT gurtovandrei comprehensiveguideto5gsecurity AT ylianttilamika comprehensiveguideto5gsecurity |