Full download The Wiley 5G REF: Security 1st Edition Rahim Tafazolli file pdf all chapter on 2024

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 44

The Wiley 5G REF: Security 1st Edition

Rahim Tafazolli
Visit to download the full and correct content document:
https://ebookmass.com/product/the-wiley-5g-ref-security-1st-edition-rahim-tafazolli/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

5G Wireless Network Security and Privacy Dongfeng Fang

https://ebookmass.com/product/5g-wireless-network-security-and-
privacy-dongfeng-fang/

Impact 1st Edition Ali Rahim

https://ebookmass.com/product/impact-1st-edition-ali-rahim/

UAV Communications for 5G and Beyond (Wiley - IEEE) 1st


Edition Yong Zeng (Editor)

https://ebookmass.com/product/uav-communications-for-5g-and-
beyond-wiley-ieee-1st-edition-yong-zeng-editor/

Vannithamby, R: 5G Verticals (Wiley - IEEE) Rath


Vannithamby (Editor)

https://ebookmass.com/product/vannithamby-r-5g-verticals-wiley-
ieee-rath-vannithamby-editor/
Comparative Homeland Security: Global Lessons (Wiley
Series on Homeland Defense and Security) – Ebook PDF
Version

https://ebookmass.com/product/comparative-homeland-security-
global-lessons-wiley-series-on-homeland-defense-and-security-
ebook-pdf-version/

Exam Ref AZ-104 Microsoft Azure Administrator 1st


Edition Harshul Patel

https://ebookmass.com/product/exam-ref-az-104-microsoft-azure-
administrator-1st-edition-harshul-patel/

5G & Beyond For Dummies Larry Miller

https://ebookmass.com/product/5g-beyond-for-dummies-larry-miller/

Rights As Security: The Theoretical Basis Of Security


Of Person 1st Edition Rhonda Powell

https://ebookmass.com/product/rights-as-security-the-theoretical-
basis-of-security-of-person-1st-edition-rhonda-powell/

People-centric security : transforming your enterprise


security culture 1st Edition Hayden

https://ebookmass.com/product/people-centric-security-
transforming-your-enterprise-security-culture-1st-edition-hayden/
The Wiley 5G REF: Security
The Wiley 5G REF: Security

Editors-in-Chief
Rahim Tafazolli
University of Surrey, UK

Chin-Liang Wang
National Tsing Hua University, Taiwan, R.O.C.

Periklis Chatzimisios
International Hellenic University, Greece

Section Editor
Madhusanka Liyanage
University College Dublin, Ireland
This edition first published 2021
© 2021 John Wiley & Sons, Ltd

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or
transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise,
except as permitted by law. Advice on how to obtain permission to reuse material from this title is available
at http://www.wiley.com/go/permissions.

The right of Rahim Tafazolli, Chin-Liang Wang, Periklis Chatzimisios, and Madhusanka Liyanage to be
identified as the authors of the editorial material in this work has been asserted in accordance with law.

Registered Offices
John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA
John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK

Editorial Office
The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK

For details of our global editorial offices, customer services, and more information about Wiley products
visit us at www.wiley.com.

Wiley also publishes its books in a variety of electronic formats and by print-on-demand. Some content that
appears in standard print versions of this book may not be available in other formats.

Limit of Liability/Disclaimer of Warranty


While the publisher and authors have used their best efforts in preparing this work, they make no
representations or warranties with respect to the accuracy or completeness of the contents of this work and
specifically disclaim all warranties, including without limitation any implied warranties of merchantability or
fitness for a particular purpose. No warranty may be created or extended by sales representatives, written
sales materials or promotional statements for this work. The fact that an organization, website, or product is
referred to in this work as a citation and/or potential source of further information does not mean that the
publisher and authors endorse the information or services the organization, website, or product may provide
or recommendations it may make. This work is sold with the understanding that the publisher is not engaged
in rendering professional services. The advice and strategies contained herein may not be suitable for your
situation. You should consult with a specialist where appropriate. Further, readers should be aware that
websites listed in this work may have changed or disappeared between when this work was written and when
it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial
damages, including but not limited to special, incidental, consequential, or other damages.

Library of Congress Cataloging-in-Publication Data Applied for:


ISBN: 9781119820314

Cover Design: Wiley


Cover Image: © Blackboard/Shutterstock

Set in 10/12pt WarnockPro by Straive, Chennai, India

10 9 8 7 6 5 4 3 2 1
v

Contents

Foreword xiii
List of Contributors xv

1 5G Mobile Networks Security Landscape and Major Risks 1


Rupendra Nath Mitra and Mahesh K. Marina
Introduction 1
4G to 5G: A Paradigm Shift 2
5G System Architecture 2
Salient Features of 5G Network 5
The Threat Landscape and Security Roadmap 7
5G Network Threat Surface 7
Inspecting 3GPP Security Proposals 10
Security Research Groups and Visions 11
Why Securing 5G is Challenging? 12
Billions of Hackable IoT Devices 12
The Convergence of IT and Telecom Infrastructure 13
Open-source Softwarization 13
AI vs AI 14
Real-time E2E Security Monitoring at Scale 14
Physical Layer Security 14
Can 3GPP Recommendations Solely Secure the 5GS? 15
Current State of the Arts and Open Research Areas 16
Conclusion 17
Acronyms 18
Related Articles 18
References 19
Further Reading 23

2 SDMN Security 25
Edgardo Montes de Oca
Software-defined Mobile Network (SDMN) Security 25
Introduction 25
SDN Concepts 25
SDN Vulnerabilities 27
vi Contents

SDN Security 30
Security Monitoring and Policy Enforcement 33
Conclusion and Future Trends 36
Related Articles 38
References 38
Further Reading 42

3 5G Security – Complex Challenges 43


Silke Holtmanns, Ian Oliver, Yoan Miche, Aapo Kalliola, Gabriela Limonta,
and German Peinado
Introduction 5G Security Building Blocks 43
Old Challenges in New Context for 5G 43
New Security Research Challenges for 5G 45
Trust 46
Dimension 1: Trust Stack 46
Dimension 2: E2E Trust 47
Dimension 3: Supply Chain Integrity 47
Dimension 4: Dynamicity 48
Malware in Mobile Core Networks 48
Measuring Security 49
Need for a Comprehensive and Regular Risk Management
Approach 51
Status Regulatory Approaches for Risk Management 51
How to Proceed Today in 5G Risk Management Approach 52
Latest Proposal for 5G Risk Management 54
Summary 54
Related Articles 55
References 55
Further Reading 56

4 Physical-Layer Security for 5G and Beyond 59


Diana P.M. Osorio, José D.V. Sánchez, and Hirley Alves
Introduction 59
Notion on Physical-Layer Security 60
Secrecy Performance Metrics 61
Secrecy Capacity 61
Secrecy Outage Probability 62
Alternative Secrecy Outage Formulation 62
Fractional Equivocation-Based Metrics 63
Intercept Probability 63
Probability of Strictly Positive Secrecy Capacity 63
Physical-Layer Security Techniques 64
Artificial Noise Generation 64
Multiantenna Diversity 65
Cooperative Diversity 65
Physical-Layer Authentication and Secret-Key Generation 67
Physical-Layer Key Generation 69
Contents vii

Physical-Layer Security for 5G Technologies 70


Massive MIMO 71
mmWave Communications 71
Full-Duplex Communications 71
Nonorthogonal Multiple Access 72
Conclusions and Future Challenges 72
Practical Channel Models 72
Secure Waveforms 73
Physical-Layer Security in Terterahertz communications 73
Physical-Layer Security for UAV-Aided Communications 73
Machine-Learning Techniques for Physical-Layer Authentication 74
Acknowledgment 74
Related Article 74
Endnote 74
References 75
Further Reading 76

5 Security for Handover and D2D Communication in 5G HetNets 77


Alican Ozhelvaci and Maode Ma
Introduction 77
Security Architecture Overview 83
3GPP 5G Network Architecture 83
3GPP 5G Security Architecture 84
Security Attacks and Mechanisms in 5G 85
Attacks in 5G 85
Key Security Technologies in 5G 88
Security Mechanisms in 5G 92
Security Evaluations Techniques 97
Security in 5G Heterogeneous Networks 98
Handover Authentication Security 99
D2D Group Authentication Security 102
Conclusions 106
Related Articles 106
References 106
Further Reading 111

6 Authentication and Access Control for 5G 113


Shanay Behrad, Emmanuel Bertin, and Noel Crespi
Introduction 113
Basics of Authentication and Access Control 114
Overall Architecture of the AAC in 3G, 4G, and 5G 115
5G Network Architecture 117
Authentication and Access Control in 5G 118
5G-AKA Protocol 119
Security Flaws in 5G-AKA 121
New Concepts in 5G 122
5G-Specific Use Cases and Requirements 123
viii Contents

Motivated Use Cases 124


Derived Requirements 124
AAC Proposal in Cellular Networks 125
Summary 127
Related Articles 128
References 128
Further Reading 130

7 5G-Core Network Security 133


Ijaz Ahmad, Jani Suomalainen, and Jyrki Huusko
Introduction 133
5G Design Principles and the Core Network 134
Security of Core Network 135
Overview of 5G Security Architecture 135
Security of Core Network Elements 137
Security of Interfaces/Protocols 139
UE and Network Authentication 141
Security of Emerging New Network Technologies 141
Security of Cloud Platforms 142
Security of SDN 142
Security of Network Virtualization 144
Discussion and Conclusion 146
Related Article 146
References 146
Further Reading 149

8 MEC and Cloud Security 151


Aaron Yi Ding
Introduction 151
5G MEC-Cloud Overview 152
Edge and Cloud Computing for 5G 152
Features and Synergies 153
MEC and Cloud Security in 5G 156
Threat Models 156
Security Challenges and Considerations for Integrating MEC
and Cloud to 5G 158
Open Research Directions 163
Conclusions 164
References 164
Further Reading/Resources 165

9 Security in Network Slicing 167


Pawani Porambage and Madhusanka Liyanage
Introduction 167
Network Slicing Architecture 168
Security Threats of NS High-Level Functional Roles 169
Security Considerations in Network Slicing and Related Work 171
Contents ix

Security Considerations in Network Slicing 171


State of the Art for NS Security 174
Future Research Directions 175
Artificial Intelligence 175
One Slice for Security 175
Context-Aware Security 176
Security Orchestration and Automation 176
Security-By-Design 176
Security-as-a-Service 177
Conclusions 177
References 177
Further Reading 178

10 VNF Placement and Sharing in NFV-Based Cellular Networks 179


Francesco Malandrino and Carla Fabiana Chiasserini
Introduction 179
Related Issues 181
System Model and Decisions to Make 183
Relevant Quantities for VNF Placement and Sharing 185
Objective and Constraints 186
The FlexShare Algorithm 186
Placement Decisions 187
Priority, Scaling, and Pruning 188
Reference Scenarios and Benchmark Strategies 189
Synthetic Scenario 189
Real-World Scenario 189
Benchmark Strategies 191
Numerical Results 192
Conclusions 194
Acknowledgment 194
References 195
Further Reading 197

11 Security Monitoring and Management in 5G 199


Edgardo Montes de Oca
Introduction 199
Network Security Monitoring 202
Software-Defined Security 206
Network Slicing 207
Cognitive Network Security Management 207
Optimization Techniques 208
Conclusions 209
Related Article 210
References 210
Further Reading 213
x Contents

12 Security for Vertical Industries 215


Mehrnoosh Monshizadeh, Vikramajeet Khatri, and Iris Adam
Introduction 215
Cloudification of the Network Operators 218
MVNO Security in 5G Networks 219
Security Management and Orchestration 223
TaaS Deployment Security 225
Conclusions 226
Related Articles 227
References 227
Further Reading 228

13 Introduction to IoT Security 229


Anca D. Jurcut, Pasika Ranaweera, and Lina Xu
Introduction 229
Attacks and Countermeasures 231
Perception Layer 231
Network Layer 235
Application Layer 237
Authentication and Authorization 244
Authentication 245
Authorization 245
Authentication at IoT Layers 246
Other Security Features and Related Issues 251
The Simplified Layer Structure 251
The Idea of Middleware 252
Cross-Layer Security Problem 253
Privacy 254
Risk Mitigation 254
Discussion 255
Future Research Directions 257
Blockchain 257
5G 258
Fog and Edge Computing 259
Quantum Security, AI, and Predictive Data Analytics 260
Network Slicing 260
Conclusions 261
Endnotes 262
References 262
Further Reading 267

14 Privacy in the 5G World: The GDPR in a Datafied Society 269


Sebastiao Teatini and Marja Matinmikko-Blue
Introduction 269
The 5G World. What Sets It Apart from Previous Communication
Technologies? 270
Data Privacy and the GDPR 271
Contents xi

The Risks and Threats to Privacy in 5G 276


Concluding Thoughts 278
Related Article 279
References 279
Further Reading 280

15 Structural Safety Assessment of 5G Network Infrastructures 283


Rui Travanca, Tiago de J. Souza, and João André
Introduction 283
Discussion 285
Telecommunication Sector Background 285
Communication Structures Background 288
Safety Assessment of Communication Structures 289
Major Concerns to 5G when Compared with Pre-5G Networks 294
Conclusions and Recommendations 295
Related Articles 299
References 299
Further Reading 303

Index 305
xiii

Foreword

The Wiley 5G Ref: Security offers a stellar collection of articles selected from the
online-only Work, The Wiley 5G Reference. It aims to provide a solid educational
foundation for researchers and practitioners in the field of 5G Security and Privacy to
expand their knowledge base by including the latest developments in these disciplines.
Security and Privacy have become the primary concern in the 5G and Beyond 5G
(B5G) network as risks can have high consequences. The security and Privacy of 5G and
B5G networks can be broadly categorized into three main components. First, most of the
security threats and security requirements related to pre-5G mobile generations are still
applicable in 5G and B5G networks. Second, 5G will have a new set of security challenges
due to connectivity offered to new IoT-based vertical industries such as healthcare,
smart grid, smart transportation, smart industries, etc. Each vertical will have a new
set of security and privacy concerns due to increased users, heterogeneity of connected
devices, new network services, and new stakeholders. Third, network softwarization and
utilization of new technologies such as SDN (Software Defined Networking), NFV (Net-
work Function Virtualization), MEC (Multi-access Edge Computing), and NS (Network
Slicing) will introduce a brand-new set of security and privacy challenges.
However, most of the security models in pre-5G (i.e., 2G, 3G, and 4G) networks
cannot be directly utilized in 5G due to new architecture and new service. Also,
most of the security challenges in 5G are yet to be identified since 5G is under the
development phase. Moreover, the 5G and B5G security solutions must address the
new technical and performance requirements such as high scalability to connect
billions of devices, high throughput to support Gbps connectivity, and ultra-low latency
to support sub-millisecond range applications. Therefore, it is necessary to identify
these threats and integrate the security and privacy solutions already at the design
phase. Furthermore, the EU coordinated risk assessment of the cybersecurity of 5G
networks report1 published in October 2019 highlights several necessary processes or
configuration-related vulnerabilities that should be considered. For example, from the
perspective of a mobile network operator, a poor network design and architecture and
the lack of security requirements in the procurement process may lead to unwanted
exposure or a disruption of service.
In addition, present-day mobile networks suffer from many security limitations such
as securing only the perimeter, distributed and uncoordinated security mechanisms,
security functions tightly coupled to physical resources, lack of adaptation and inter-
operability, over-provisioned security mechanisms, scalability issues, vulnerability to
various IP based attacks, lack of visibility and high network monitoring overhead, and
xiv Foreword

unexpected privacy breaches. The introduction of centralized controllers with the


separation of the control and data planes, programmability, NFV, the introduction
of new network functions, and even introducing new stakeholders such as Local 5G
Operators (L5GO) are expected to solve the security and privacy limitations of current
telecommunication networks. On the other side, relying on a single controller creates
a potential single point of failure. Moreover, integration of smart and agile monitoring
and decision frameworks enabled via Artificial Intelligence (AI) are promising to tackle
these security challenges. The security techniques and schemes devised and imple-
mented for this massively connected and pervasive network structure will also have an
overreaching impact on B5G systems since these traits are expected to be apparent in
those systems. In that regard, AI-based resilience techniques, Machine Learning (ML)
driven cognitive and self-X network management techniques, and privacy management
for highly sensitive data running on B5G networks should also be considered.
Well-known experts in security and Privacy for the telecommunication network field
wrote the book you are about to read. It provides the methodologies, guidance, and
suggestions on how to deliver the possible ways of developing novel security and privacy
solutions to protect the 5G telecommunication networks from strengthening critical
infrastructures and novel research directions and open challenges that will encourage
future research.
The book introduces the security landscape of 5G, and significant security and pri-
vacy risks associated with the 5G networks. Then, the security solutions for different
segments of the 5G network, i.e., radio network, edge network, access network, and
core network, are discussed. Since 5G is developed based on network softwarization,
security threats associated with key network softwarization technologies such as SDN,
NFV, NS, and MEC are also presented in detail. Then, the security issues related to the
new 5G and IoT services are delivered. Finally, a detailed discussion on the privacy of
5G networks is presented by considering Datafied Society.
This book is another step in closing this educational gap. It is intended to provide addi-
tional learning opportunities for a wide range of readers, from graduate-level students
to seasoned engineering professionals. We are confident that this book and the entire
collection of selected articles will continue Wiley’s tradition of excellence in technical
publishing and provide a lasting and positive contribution to the teaching and practice
of security and privacy of 5G and beyond networks.

Dr. Madhushanka Liyanage


Section Editor
University College Dublin
Ireland
xv

List of Contributors

Iris Adam Carla Fabiana Chiasserini


Nokia Bell Labs Germany Politecnico di Torino
Stuttgart CNR-IEIIT
Germany Torino
Italy
Ijaz Ahmad
VTT Technical Research Centre of Noel Crespi
Finland Institut Mines-Telecom
Espoo Telecom SudParis
Finland Paris
France
Hirley Alves
6G Flagship Aaron Yi Ding
University of Oulu Delft University of Technology (TU Delft)
Oulu Delft
Finland The Netherlands

João André Silke Holtmanns


National Laboratory for Nokia Bell Labs
Civil Engineering Espoo
Lisbon Finland
Portugal
Jyrki Huusko
Shanay Behrad VTT Technical Research Centre of
Orange Labs Caen Finland
Caen Oulu
France Finland

Emmanuel Bertin Anca D. Jurcut


Orange Labs Caen School of Computer Science
Caen University College Dublin
France Dublin
Ireland
xvi List of Contributors

Aapo Kalliola Yoan Miche


Nokia Bell Labs Nokia Bell Labs
Espoo Espoo
Finland Finland

Vikramajeet Khatri Rupendra Nath Mitra


Nokia Bell Labs Finland The University of Edinburgh
Helsinki Edinburgh
Finland UK
Gabriela Limonta
Mehrnoosh Monshizadeh
Nokia Bell Labs
Nokia Bell Labs France
Espoo
Nozay
Finland
France
Madhusanka Liyanage
and
Centre for Wireless Communication
University of Oulu Aalto University
Oulu Helsinki
Finland Finland
and
Edgardo Montes de Oca
School of Computer Science Montimage
University College Dublin Paris
Dublin France
Ireland
Ian Oliver
Maode Ma Nokia Bell Labs
Nanyang Technological University Espoo
Singapore Finland
Singapore
Diana P.M. Osorio
Francesco Malandrino Federal University of São Carlos (UFSCar)
CNR-IEIIT Center for Exact Sciences and
Torino Technology
Italy São Carlos
SP
Mahesh K. Marina
Brazil
The University of Edinburgh
Edinburgh and
UK
6G Flagship
Marja Matinmikko-Blue University of Oulu
University of Oulu Oulu
Oulu Finland
Finland
List of Contributors xvii

Alican Ozhelvaci Tiago de J. Souza


Nanyang Technological University American Tower of Brazil
Singapore São Paulo
Singapore Brazil

German Peinado Jani Suomalainen


Nokia VTT Technical Research Centre of
Warszaw Finland
Poland Espoo
Finland
Pawani Porambage
Centre for Wireless Communication Sebastiao Teatini
University of Oulu University of Oulu
Oulu Oulu
Finland Finland

Pasika Ranaweera Rui Travanca


School of Computer Science DIGAMA Engineering Consultants
University College Dublin Lisbon
Dublin Portugal
Ireland
Lina Xu
José D.V. Sánchez School of Computer Science
Department of Electronics University College Dublin
Telecommunications and Information Dublin
Networks Ireland
Escuela Politécnica Nacional
Quito
Ecuador
Another random document with
no related content on Scribd:
Bain, R. N., translation of fairy tales, 189
Baldwin, Prince, and Daniel the Abbot, 57 seq.
Barlaam and Josaphat, 14
Bátyushkov, 395;
translated, viii.
Bazán, E. P., on Russ. literature, x.
Beccaria, 30
Bee, The, Russ. literary collection, 100;
English periodical, 272
Beggar-songs, 178, 186 seq.
Benfey’s theory, 20
Bible, its influence on early Russ. literature, 8;
in Russian, 11;
in historical literature, 15;
quoted in literature, 100 seq.;
and Iván the Terrible, 121
Biblical Repository, The, of Andover, on Russ. literature, ix.
Bogdanóvich, I. F., at Court, 31;
his Psyche, 34, 263;
first collector of proverbs, 199;
biographical sketch and extracts, 374 seq.
Bohemia, its political status, 3;
its ancient literature, 4
Boileau’s influence on Russ. literature, 29, 30, 230
Borrow, G., translations from the Russian, viii.
Bowl-songs, 178, 179
Bowring, Sir John, his translations from the Russian, vii., 178, 242,
291, 306, 379, 392, 395, 398, 422, 429;
his imitators, viii.
Boyán, 22, 81
Boyár, 46 (note)
Bradford, Mrs. W., editor of Princess Dáshkov’s Memoirs, 316
Brandes, G., on Russ. literature, x.
Brockes, 378
Bulgaria, its political status, 3;
its ancient literature, 4;
its language in the Church, 6;
in Russia, 7;
apocrypha travelling over, 13;
its legends, 14
Bylínas, of Vladímir’s cycle, 9 seq.;
their development, 21;
their relation to the Word, 22
Byzantium’s influence on Russia, 5;
Greek tradition, 8;
apocrypha in Russia, 13;
legends, 14;
repression, 22;
chronographers, 65

Calilah-wa-Dimnah, 14
Catherine II., and French literature, 29;
and comedy, 36;
biographical sketch and extracts, 405 seq., and see 28 et
passim
Catholic, contamination, 5;
religion in Russia, 134
Ceremonial songs, 24
Chanson de Roland, 80
Charms, 178, 188 seq.
Child, Prof. F. J., 20, 163
Christianity, its influence on Russia, 4 seq.
Chronicles, 15
Chrysostom in Russ. literature, 11, 116
Church, its opposition to popular literature, 16, 19, 23, 24;
its contact with the West, 17;
its reform, 212 seq., 219;
union of Churches, 17, 135 seq.
Church fathers, their influence on Russ. literature, 8;
and Iván the Terrible, 121
Church-Slavic, its relation to Bulgarian, 7;
and see Bulgaria
City songs, 24 seq.
Collections, literary, 11 seq.;
of Svyatosláv, 11
Comedy, 36, 211, 272 seq., 308, 311 seq., 342 seq., 370 seq., 397
seq.
Constantinople, in pilgrimages, 14;
and see Byzantium
Cox, G., on Russ. literature, ix.
Coxe, W., account of Russ. literature, vii.
Curtin, J., on fairy tales, 189
Cyril of Túrov, his sermons, 11, 62 seq.
Cyril and Methodius, preaching in Bulgarian, 6

Dal’s proverbs, 199


d’Alembert, 29, 272
Daniel the Abbot, his feeling of Russ. unity, 3;
his pilgrimage, 14;
extract, 56 seq.
Daniel the Prisoner, 100 seq.
Danílov, Kírsha, 163
Danílov, M. V., extract from his Memoirs, 269 seq.
Dante, in Servian literature, 4;
his Divine Comedy, 13, 96
Dáshkov, Princess, 308;
biographical sketch and extract, 316 seq.
Demetrius the Impostor, Sumarókov’s, translated into English, 255
Derzhávin, G. R., at Court, 31;
his lyrics, 34;
biographical sketch and extracts, 377 seq., and see 33, 241,
272, 358 seq., 405
Destouches, 308
Diderot and Russ. educational system, 29;
and see 272, 316
Dietrich, A., Russ. fairy tales, 189
Digenis Akritas, 14
Dmítriev, I. I., his odes, 33;
his lyrics, 34;
biographical sketch and extracts, 428 seq.
Dole, N. H., his translations from the Russian, x., 50, 379
Dolgorúki, I. M., biographical sketch and extracts, 422 seq.
Dolgorúki, Princess, biographical sketch and extract, 233 seq.
Domostróy, 12, 126 seq., 219
“Double faith,” 16, 19
Drama, 35 seq., 150, 254 seq., 308 seq., 418;
and see Comedy
Drone, The, 327
Druzhína, 46 (note)
Dupuy, E., on Russ. literature, x.

Eastern Church separated from Rome, 6


Eastman, S. C., translator of Brandes, x.
“Ecstatic” poetry, 33
Edmands, J. L., translator of Vogüé, x.
Edwards, S., on Russ. literature, ix., 306
Elizabeth, Queen, appealed to by King Sigismund, 5
Emerald, The, 11, 100
Émin, F., 327
Encyclopedias on Russ. literature, xi.
English, interest in Russ. literature, vii. seq.;
influence on Russ. literature, 30, 36, 291;
Masons in Russia, 32
Englishmen, in Moscow, 26;
speaking Russian, vii.;
reading Platón’s theology, 300
Ermák, 372 seq., 431 seq.
Esop’s fables in Russian, 34
Esprit des Lois, in Russia, 29
Eusebius, 116

F., J. G. A., translation from Lomonósov, 242


Fables, 34 seq.
Fairy tales, 25 seq., 189 seq.
Felítsa, 3, 33, 241, 272, 358 seq.
Feofán, biographical sketch and extracts, 211 seq.;
and see 12, 28, 219, 224, 233, 300
Folklore, 18 seq.;
bridging chasm, 20;
connected with that of Europe and Asia, 21
Folksongs, ix., 177 seq.
Folktales, ix.
Fon-Vízin, D. I., biographical sketch and extracts, 341 seq.;
and see 31, 36, 269
Foreign Quarterly Review on Russ. literature, viii.
Foreigners in Moscow, 26
Formalism of Russian life, 12
Franklin, 361
Fraser’s Magazine, Turner on Russ. literature, 224, 242, 272, 379,
429
Free Russia, translations from Russian, x.
French influence on Russ. literature, 29 seq., 34, 230

Gardiner, F. H., translation of Bazán, x.


Gaussen, W. F. A., on Russ. literature, x.
Gellert, in Russian, 34, 306
Geography in ancient Russ. literature, 189
German Suburb, 26
Gílferding, 163
Gillies, R. P., on Russ. literature, viii.
Gógol, 35, 36, 397
Golden Beam, The, 11
Golden Chain, The, 11
Grahame, F. R., ix., 242, 306, 398
Great-Russians of the South, 9, 10;
exterminated by Tartars, 23
Grech, on Russ. literature, viii.
Greek traditions in Byzantium, 8;
taught in Russia, 17;
treaties with the Greeks, 4
Gribóvski, A. M., biographical sketch and extract, 405 seq.
Griboyédov, 36, 397
Grimm’s mythological theory, 20
Griswold, M. W., bibliography of Russ. literature, x.
Günther, 29
Gundulić, his epic, 4

Hakluyt Society, translation of Nikítin, 111


Haller, 378
Hamartolos, 15
Hansa, 21
Hapgood, Miss I. F., translator of epic songs, 163
Heard, J. A., 233
Hell’s Post, 327
Henningsen, C. F., on Russ. literature, ix.
Herzen, 272, 287
Historical songs, 23, 172
History in Russ. literature, 15, 36 seq., 219 seq.
Hodgetts, E. M. S., translation of fairy tales, 189
Holy Land, visited by Russians, 8, 56 seq.
Holy Virgin’s Descent into Hell, The, 96 seq.
Homer, a Russian, 298
Horace, in Russ. literature, 34, 397
Humour, in translation, x.

Ígor, see Word of Ígor’s Armament


Ilarión, eulogy of Vladímir, 11, 48 seq.
Ilyá of Múrom, 165 seq.;
known to the West, 9, 24
Index librorum prohibitorum, 13
Instructions in literature, 12;
Catherine’s, 30;
Vladímir’s, 11, 50 seq.;
Tatíshchev’s, 219
Ipáti manuscript, 71
Isidor, at Council of Florence, 15, 17
Istómin, Karión, 26
Iván the Terrible, 17, 23, 26, 115 seq., 121 seq., 126, 172 seq.

Jacob, gospel of, 13


James, Richard, collector of songs, vii., 23, 130 seq.
Johnson’s Cyclopedia, on Russ. literature, xi.
Journey to Europe in literature, 15

Kámenev, G. P., biographical sketch and extract, 411 seq.


Kantemír, A., biographical sketch and extract, 223 seq.;
and see 26, 28, 35, 211
Kapníst, V. V., his lyrics, 34;
biographical sketch and extracts, 397 seq.
Karamzín, 34, 36, 255, 395, 418, 428
Khémnitser, I. I., biographical sketch and extracts, 306 seq.;
and see 34
Kheráskov, M. M., biographical sketch and extract, 298 seq.;
and see 33
Khorovód, 178
Kíev, metropolis of Russia, 9;
its poetic tradition, 10;
has no bylínas, 22;
chronicle, 15, 71 seq., 80;
cycle, 24, 163;
its contact with Poland, 6, 12, 33;
clergy and scholasticism, 26;
intermediary of Western culture, 17
Kiryéevski, 163
Klopstock, 378
Knyazhnín, Y. B., biographical sketch and extracts, 308 seq.;
and see 30, 36, 316
Kolyádas, 177 seq.
Kostróv, E. I., biographical sketch and extract, 358 seq.;
and see 31
Kotoshíkhin, G., biographical sketch and extracts, 136 seq.;
and see 18, 178
Kozítski, G., 326
Kozlóv, 233
Krehbiel, H. E., on popular songs, 178
Krizhánich, Y., biographical sketch and extracts, 134 seq.;
and see 15
Krylóv, 34, 306, 429;
translated, ix.
Kúrbski, A. M., biographical sketch and extracts, 115 seq.;
and see 15, 18
La Fontaine, in Russ. literature, 34, 306, 374
Lamentations, 178, 187
Language, under Peter I., 27
Latin, in the Western Church, 6 seq.;
taught in Russia, 17;
translations from, 150
Latins, hatred of, 6, 17
Laurentian manuscript, 65
Legends, in ancient Russia, 8;
apocryphal, 12 seq.;
profane, 14 seq.
Lewis, W. D., his translations from the Russian, viii., 379, 392, 429
Liberation of the serfs, 361
Lineff, Mrs. E., translations of popular songs, 178
Literary coteries, 32
Literature, in Russia, of recent growth, 3 seq.;
rarely produced outside the Church, 12;
in Slavic countries, 3 seq.
Little-Russians, their characteristics, 9;
whence come, 10
Lomonósov, M. V., biographical sketch and extracts, 241 seq.;
and see 28, 29, 33, 150, 378, 429
Love songs, 178, 179 seq.
Lowell lectures on Russ. literature, x.
Lucidarius in Russia, 8
Ludolf, author of first Russ. grammar, vii.
Luká Zhidyáta, biographical sketch and extract, 44 seq.;
his style, 9
Lyrics, in Russ. literature, 34
Maksím the Greek, 116
Malalas, source of history, 15
Marlowe’s Tamerlane in Russian, 26
Martinists, 32, 361
Martinof, J., translator of Tatíshchev, 219
Masons and Russ. literature, 32, 272, 327
Máykov, V. I., biographical sketch and extracts, 263 seq.;
and see 34, 374
Medvyédev, 18
Meshchérski, Prince, 375 seq.
Metastasio imitated, 308
Milton’s Paradise Lost translated, 291
Modern Language Association, on fairy tales, 189
Molière in Russia, 26
Montesquieu, 29, 30, 272
More, Sir Thomas, 287
Morfill, W. R., translations from the Russian, ix., x., 130, 172
Moscow, as a political centre, 3, 10;
chronicles, 15;
its foreign colony, 17;
influenced by the West, 17, 26, 33;
cycle of songs, 24;
et passim
Mozharóvski’s stories of the Fox, 26, 198 seq.
Munro, H. H., translator of the Word, 81
Muravév, M. N., 395 seq.
Músin-Púshkin, A. I., discoverer of the Word, 81
Mysteries and Moralities, 35
Mythological theory of folklore, 20

Naake, J. T., translations of fairy tales, 189


Nekrásov, 233
Neledínski-Melétski, Y. A., his lyrics, 34;
biographical sketch and extracts, 392 seq.
Néstor, his style, 9;
his chronicle, 15, 41 seq., 50 seq., 65 seq., 71 seq.;
its discovery, 81
New Testament apocrypha in Russ. literature, 13
Nibelungenlied, 80
Nicodemus, gospel of, 13
Nikítin, Afanási, his Travel to India, 15, 111 seq.
Nikón’s corrections, 12
Norse, influence in ancient Russia, 4;
tradition in Kíev, 9;
acquaintance with Ilyá of Múrom, 21, 24;
laws, 45
Novels, 36
Nóvgorod, its relations with Germany, 21;
cycle of songs, 24, 163;
its laconic style, 9, 44 seq.;
its chronicles, 15;
Domostróy, 126
Nóvikov, N. I., imprisoned, 30;
and Catherine, 31 seq.;
and the Masons, 32;
his satires, 35;
his historical investigations, 36;
biographical sketch and extracts, 326 seq.
Odes, 33;
and see Ecstatic poetry
Odoévski, 362
Ogarév, 362
Old Testament apocrypha in Russ. literature, 13
Olónetsk, bylínas, 10, 22
Opera, 370 seq.
Ossian, in Russ. literature, 358, 418
Otto, F., see Cox, G.
Ovid, in Russian, 27
Ovsén, 177
Oxford, publishing the first Russ. grammar, vii.
Ózerov, V. A., and the tragedy, 36;
biographical sketch and extract, 418 seq.

Painter, The, 32, 327


Palæa, 11, 13
Palestine, legends brought from, 14;
and see Holy Land
Panin, I., on Russ. literature, x., 355
Panslavism, Krizhánich’s, 135
Paul, Emperor, 321, 328
People, meaning of this term, 18 seq.
Periodicals, satirical, 326 seq.
Peter the Great, ode on his birth, 150 seq.;
and the Slavophiles, 4;
songs dealing with, 23;
and progress, 26 seq.;
Shcherbátov’s censures of, 288 seq.;
funeral sermon on, 214;
and see 12, 16, 18, 19, 28, 32, 35, 211, 212, 324
Petrarch in Servian literature, 4
Petróv, V. P., biographical sketch and extract, 291;
and see 31, 33
Philipps, J. T., translation of Feofán’s work, 211
Physiologus in Russia, 8
Pilgrimages, 14 seq., 56 seq.
Pinkerton, R., translation of Platón, 300;
on Russ. proverbs, 200
Platón Levshín, biographical sketch and extract, 300 seq.;
and see 12, 328
Poetry, Russian, in English translation, viii., x.
Poland, its political status, 3;
its ancient literature, 4;
a barrier to Russia, 5;
and Kíev, 12, 17;
intermediary in folklore, 21;
its scholasticism and rhetoric in Russia, 26;
its influence on Russ. literature, 33
Political Economy, Pososhkóv’s, 205
Pollen, J., translations from the Russian, x., 379
Poroshín, S. A., biographical sketch and extract, 321 seq.
Pososhkóv, I. T., biographical sketch and extracts, 205 seq.;
his diction, vi., 28
Potánin’s theory, 21
Prokopóvich, see Feofán
Pronunciation of Russian, vi., vii.
Prose story in Russ. literature, 25 seq., 36
Proverbs, 199 seq.
Pseudo-classic style, 29, 378
Pugachév’s rebellion, 30
Purse, The, 327
Púshkin, in translation, viii.;
reviewed, ix.;
and see 34, 255, 379, 411
Pýpin’s works, vi.

Quarterly Review, popular songs, 178;


fairy tales, 189;
proverbs, 200

Racine, and Russ. literature, 36


Radíshchev, A. N., and English writers, 36;
biographical sketch and extract, 361 seq.;
and see 30, 32, 272, 327
Ragusa, its literature, 4
Ralston, W. R. S., studies in Russ. literature, ix.;
popular songs, 178;
fairy tales, 189
Rambler, The, 327
Reform, beginning of, in Russia, 17 seq.
Religious lore, 11 seq.
Robinson, Dr. Ed., see Talvi
Romanists, see Latins
Romantic Movement, 3, 25
Rosicrucians, 32
Rousseau, 272
Russia, rediscovered by the English, vii.;
its political greatness, 3;
menace to Europe, 5;
its aloofness, 5 seq.;
its unprogressiveness, 6, 8, 20;
its history, by Shcherbátov, 287
Russian Code, 4, 45
Russian language, in America, v.;
supplanted by Bulgarian, 7;
its composition, 7;
perfected by Lomonósov, 241;
first grammar of, vii.
Russian literature, not all accessible to English readers, v.;
English works on, ix.
Rýbnikov, 163
Rylyéev, viii., 233, 362

S., J. T., translation of Brief Theology, 300


Sadkó the Merchant, in French, 21
St. Petersburg Gazette, 327
Satire, 35
Satirical journals, 31, 326 seq.
Saunders, W. H., translation from the Russian, viii.
Sentimentalism, Karamzín, and, 36
Serapión, his style, 9, 11;
biographical sketch and extract, 104 seq.
Sermons, in Russ. literature, 11;
and see 44 seq., 62 seq., 104 seq., 300
Servia, its political status, 3;
its ancient literature, 4;
its legends, 14
Shaw, T. B., translations from the Russian, viii.
Shchedrín, 35
Shcherbátov, M. M., biographical sketch and extract, 287 seq.;
and see 33, 36, 327
Shibánov, 115
Shuválov, Lomonósov’s letters to, 241 seq.
Sigismund’s appeal to Queen Elizabeth, 5
Simeón of Bulgaria, 11
Simeón Pólotski, biographical sketch and extracts, 149 seq.;
and see 18, 26, 34
Slavic, idea, 4;
languages in ninth century, 6;
language of religion, 6;
language, Krizhánich’s, 134;
nations, weakness of, 3;
scholarship in America, ix.;
sources of apocrypha, 13
Slavophiles, 4, 37, 327
Solomon, in Russ. literature, 13, 114
Sophia and the theatre, 26
Spectator, The, 31, 327
Spiritual Testaments, 12, 219
Spiritual Reglement, 211
Spring songs, 178
Stallybrass, J. K., translation of Ode to Deity, 379
Stanley, A. P., translation of Vladímir’s Instruction, 50
Stanley, Dr., on Platón, 300
Stásov’s theory, 21
Sterne in Russ. literature, 36, 361
Sumarókov, A. P., and the drama, 28;
his odes, 33;
his fables, 34;
and the theatre, 36;
biographical sketch and extracts, 254 seq.;
and see 306, 308, 326, 327, 378
Súzdal chronicle, 15
Svyatosláv’s Collection, 11, 12;
his glory sung, 23
Sylvester’s Domostróy, 12, 65, 115, 219
Sylvester, see Néstor

Talmud, legends, 12, 114


Talvi, on Slavic literature, ix.;
translations of historical songs, 172;
and see 178
Tartars, not alone to be blamed for stagnation, 10;
exterminating the Great-Russians of the South, 10, 23;
in bylínas, 22;
in sermon, 104 seq.;
in songs, 172
Tasso, 298
Tatíshchev, V. N., biographical sketch and extract, 218 seq.;
and see 15, 26, 36, 211
Tatler, The, 31, 327
Testaments, 50, 205;
and see Spiritual Testaments
Theatre, early, in Russia, 26;
founded, 255
Thomas, gospel of, 13
Tragedy, 35;
and see Drama
Translations, from the Russian, v.;
author’s, vi.
Transliterations from Russian, vi.
Tredyakóvski, V. K., biographical sketch and extract, 230 seq.;
and see 28, 33, 150, 254, 378
Trojan war, in legend, 14
Turgénev, 36
Turner, C. E., on Russ. literature, x., 224, 242, 272, 379

Unity of Russia, as an idea, 3


University press, 327

Vladímir, his baptism, 65 seq.;


eulogy on, 48 seq.;
cycle, 9, 22, 24, 163
Vladímir Monomákh’s Instruction, 11, 12, 50 seq., 219
Varyág, see Norse
Vergil, 298
Versailles manners in Russia, 28
Vogüé, E. M. de, on Russ. literature, x.
Volhynia chronicle, 15
Voltaire, 29, 30, 316
Voltairism, 30, 327
Voynich, E. L., translation of Russ. humour, x.

Wahl, O. W., on Russ. literature, ix.


Waliszewski, K., on Russ. literature, x.
Wedding songs, 178, 185 seq.
Westminster Review, Russ. literary biography, viii.;
on Russ. literature, viii., x.
Wielhorsky, Count, translation of Nikítin, 111 seq.
Wilson, C. T., translations from the Russian, x., 429
Wolkonsky, Prince, on Russ. literature, v., x.
Word of Ígor’s Armament, The, 80 seq.;
prose version, 71 seq.;
and see vi., 3, 9, 16, 22, 106 seq., 152

Yarosláv’s Code, 4, 9, 45 seq.


Yavórski, Stefán, 28
Yermák, given on p. 172 seq. by oversight for Ermák, q. v.
Young’s Night Thoughts, 378

Zadónshchina, 16, 80, 106 seq.


Zhukóvski, 25 seq.

You might also like