Professional Documents
Culture Documents
Full download The Wiley 5G REF: Security 1st Edition Rahim Tafazolli file pdf all chapter on 2024
Full download The Wiley 5G REF: Security 1st Edition Rahim Tafazolli file pdf all chapter on 2024
Full download The Wiley 5G REF: Security 1st Edition Rahim Tafazolli file pdf all chapter on 2024
Rahim Tafazolli
Visit to download the full and correct content document:
https://ebookmass.com/product/the-wiley-5g-ref-security-1st-edition-rahim-tafazolli/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...
https://ebookmass.com/product/5g-wireless-network-security-and-
privacy-dongfeng-fang/
https://ebookmass.com/product/impact-1st-edition-ali-rahim/
https://ebookmass.com/product/uav-communications-for-5g-and-
beyond-wiley-ieee-1st-edition-yong-zeng-editor/
https://ebookmass.com/product/vannithamby-r-5g-verticals-wiley-
ieee-rath-vannithamby-editor/
Comparative Homeland Security: Global Lessons (Wiley
Series on Homeland Defense and Security) – Ebook PDF
Version
https://ebookmass.com/product/comparative-homeland-security-
global-lessons-wiley-series-on-homeland-defense-and-security-
ebook-pdf-version/
https://ebookmass.com/product/exam-ref-az-104-microsoft-azure-
administrator-1st-edition-harshul-patel/
https://ebookmass.com/product/5g-beyond-for-dummies-larry-miller/
https://ebookmass.com/product/rights-as-security-the-theoretical-
basis-of-security-of-person-1st-edition-rhonda-powell/
https://ebookmass.com/product/people-centric-security-
transforming-your-enterprise-security-culture-1st-edition-hayden/
The Wiley 5G REF: Security
The Wiley 5G REF: Security
Editors-in-Chief
Rahim Tafazolli
University of Surrey, UK
Chin-Liang Wang
National Tsing Hua University, Taiwan, R.O.C.
Periklis Chatzimisios
International Hellenic University, Greece
Section Editor
Madhusanka Liyanage
University College Dublin, Ireland
This edition first published 2021
© 2021 John Wiley & Sons, Ltd
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise,
except as permitted by law. Advice on how to obtain permission to reuse material from this title is available
at http://www.wiley.com/go/permissions.
The right of Rahim Tafazolli, Chin-Liang Wang, Periklis Chatzimisios, and Madhusanka Liyanage to be
identified as the authors of the editorial material in this work has been asserted in accordance with law.
Registered Offices
John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA
John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK
Editorial Office
The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK
For details of our global editorial offices, customer services, and more information about Wiley products
visit us at www.wiley.com.
Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that
appears in standard print versions of this book may not be available in other formats.
10 9 8 7 6 5 4 3 2 1
v
Contents
Foreword xiii
List of Contributors xv
2 SDMN Security 25
Edgardo Montes de Oca
Software-defined Mobile Network (SDMN) Security 25
Introduction 25
SDN Concepts 25
SDN Vulnerabilities 27
vi Contents
SDN Security 30
Security Monitoring and Policy Enforcement 33
Conclusion and Future Trends 36
Related Articles 38
References 38
Further Reading 42
Index 305
xiii
Foreword
The Wiley 5G Ref: Security offers a stellar collection of articles selected from the
online-only Work, The Wiley 5G Reference. It aims to provide a solid educational
foundation for researchers and practitioners in the field of 5G Security and Privacy to
expand their knowledge base by including the latest developments in these disciplines.
Security and Privacy have become the primary concern in the 5G and Beyond 5G
(B5G) network as risks can have high consequences. The security and Privacy of 5G and
B5G networks can be broadly categorized into three main components. First, most of the
security threats and security requirements related to pre-5G mobile generations are still
applicable in 5G and B5G networks. Second, 5G will have a new set of security challenges
due to connectivity offered to new IoT-based vertical industries such as healthcare,
smart grid, smart transportation, smart industries, etc. Each vertical will have a new
set of security and privacy concerns due to increased users, heterogeneity of connected
devices, new network services, and new stakeholders. Third, network softwarization and
utilization of new technologies such as SDN (Software Defined Networking), NFV (Net-
work Function Virtualization), MEC (Multi-access Edge Computing), and NS (Network
Slicing) will introduce a brand-new set of security and privacy challenges.
However, most of the security models in pre-5G (i.e., 2G, 3G, and 4G) networks
cannot be directly utilized in 5G due to new architecture and new service. Also,
most of the security challenges in 5G are yet to be identified since 5G is under the
development phase. Moreover, the 5G and B5G security solutions must address the
new technical and performance requirements such as high scalability to connect
billions of devices, high throughput to support Gbps connectivity, and ultra-low latency
to support sub-millisecond range applications. Therefore, it is necessary to identify
these threats and integrate the security and privacy solutions already at the design
phase. Furthermore, the EU coordinated risk assessment of the cybersecurity of 5G
networks report1 published in October 2019 highlights several necessary processes or
configuration-related vulnerabilities that should be considered. For example, from the
perspective of a mobile network operator, a poor network design and architecture and
the lack of security requirements in the procurement process may lead to unwanted
exposure or a disruption of service.
In addition, present-day mobile networks suffer from many security limitations such
as securing only the perimeter, distributed and uncoordinated security mechanisms,
security functions tightly coupled to physical resources, lack of adaptation and inter-
operability, over-provisioned security mechanisms, scalability issues, vulnerability to
various IP based attacks, lack of visibility and high network monitoring overhead, and
xiv Foreword
List of Contributors
Calilah-wa-Dimnah, 14
Catherine II., and French literature, 29;
and comedy, 36;
biographical sketch and extracts, 405 seq., and see 28 et
passim
Catholic, contamination, 5;
religion in Russia, 134
Ceremonial songs, 24
Chanson de Roland, 80
Charms, 178, 188 seq.
Child, Prof. F. J., 20, 163
Christianity, its influence on Russia, 4 seq.
Chronicles, 15
Chrysostom in Russ. literature, 11, 116
Church, its opposition to popular literature, 16, 19, 23, 24;
its contact with the West, 17;
its reform, 212 seq., 219;
union of Churches, 17, 135 seq.
Church fathers, their influence on Russ. literature, 8;
and Iván the Terrible, 121
Church-Slavic, its relation to Bulgarian, 7;
and see Bulgaria
City songs, 24 seq.
Collections, literary, 11 seq.;
of Svyatosláv, 11
Comedy, 36, 211, 272 seq., 308, 311 seq., 342 seq., 370 seq., 397
seq.
Constantinople, in pilgrimages, 14;
and see Byzantium
Cox, G., on Russ. literature, ix.
Coxe, W., account of Russ. literature, vii.
Curtin, J., on fairy tales, 189
Cyril of Túrov, his sermons, 11, 62 seq.
Cyril and Methodius, preaching in Bulgarian, 6