Suchen und Finden

Titel

Autor

Inhaltsverzeichnis

Nur ebooks mit Firmenlizenz anzeigen:

 

5G Enabled Secure Wireless Networks

5G Enabled Secure Wireless Networks

Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, Vishal Sharma

 

Verlag Springer-Verlag, 2019

ISBN 9783030035082 , 214 Seiten

Format PDF, OL

Kopierschutz Wasserzeichen

Geräte

139,09 EUR

Mehr zum Inhalt

5G Enabled Secure Wireless Networks


 

Foreword

6

Preface

8

Acknowledgment

11

Contents

13

5G Security: Concepts and Challenges

17

Abbreviations

17

1 Overview

19

1.1 Introduction

19

1.2 Evolution of Cellular Technologies

19

First Generation

20

Second Generation

20

Third Generation

21

Fourth Generation

22

Fifth Generation

22

1.3 The Significance of 5G Security

23

1.4 The Need for Security

24

2 5G Security Standardization

24

2.1 Internet Engineering Task Force

25

3 Security Characteristics of 5G

26

3.1 Drivers of 5G

26

3.2 Significance of Security and Privacy

27

Modern Confide Models

27

Security for New Relevance Transmission Models

27

Emerging Risk Prospects

28

Raised Privacy Concerns

28

4 Network Planning

29

4.1 Objectives

29

4.2 Planning Inputs

30

Traffic Models

30

Potential Site Locations

31

BS Model

31

Propagation Prediction Models

31

4.3 Planning Outputs

32

4.4 Types of Network Planning

32

Rollout Network Planning

32

Incremental Network Planning

32

5 5G Roadmap

33

5.1 Need for Roadmap

33

5.2 Roadmap Process

34

6 Existing Concepts of 5G

34

6.1 Multiple Input and Multiple Output

34

6.2 Cognitive Radio Network

35

7 Security Models

36

7.1 Identity Management

37

7.2 UE Security

37

7.3 Radio Network Security

38

7.4 Flexible and Scalable Security

38

7.5 Network Slicing Security

38

7.6 Vitality Effective Security

39

7.7 Cloud Security

39

8 Security Protocols

40

8.1 Informal Security Protocols

40

Dolev-Yao Adversary

40

Threat Model

40

Security Properties

41

Authentication Properties for Protocols

41

Channels

42

Attack Scenarios

44

9 Channel Security

44

9.1 Introduction

44

9.2 Physical Layer Security Coding

45

LDPC Codes

45

Polar Codes

46

Lattice Codes

47

9.3 Massive MIMO

48

Passive Eavesdropper Scenarios

48

Active Eavesdropper Scenarios

48

9.4 Millimeter Wave (mmWave) Communications

50

9.5 Heterogeneous Networks

51

Physical Layer Security in Heterogeneous Networks

51

9.6 Non-orthogonal Multiple Access (NOMA)

52

Physical Layer Security of NOMA

52

9.7 Full Duplex Technology

53

Full Duplex Receiver

53

Full Duplex Base Station

54

Full Duplex Eavesdropper

54

References

56

5G Applications and Architectures

60

Brief Summary

60

1 Brief Introduction to 5G

61

2 Applications

61

3 Novel Architectures and Implications

62

4 Cross-Layer Design

67

5 SDN-NFV-Based Models

69

5.1 Software-Defined Network (SDN)

69

5.2 Network function virtualization (NFV)

74

NFV Infrastructure

74

Virtualized Network Framework (VNF)

74

Management and Network Orchestration (MNO)

74

OSS"026E30F BSS Layer

76

6 Service Architectures and Potential Direction

76

6.1 Industry Initiatives

76

7 Conclusion

78

Appendix

79

NEMO

79

References

79

A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks

84

1 Introduction

84

1.1 Applications of 5G Networks

85

1.2 Attacks and Threats in 5G Networks

87

2 Preliminaries: Osmotic Computing

87

3 Preliminaries: Catalytic Computing

90

4 Existing Surveys and Their Applicability

90

5 Taxonomy of Security Concerns for 5G Networks

92

5.1 Secure Resource Allocation in 5G

92

5.2 Secure Mobility Management in 5G

95

5.3 Secure Routing in 5G

98

5.4 Secure Physical Layer Formations in 5G

100

5.5 Secure Autonomous and Smart Services in 5G

102

6 CATMOSIS: A Generalized Model for 5G Security

104

7 Open Issues and Future Directions

106

8 Conclusions

109

References

110

Physical Layer Security in 5G Hybrid Heterogeneous Networks

118

1 Introduction

118

2 Background

119

3 The System Layout

120

4 System Performance Evaluation

126

4.1 Achievable Rates

126

4.2 Physical Layer Security Parameters

127

5 Simulation Results and Performance Analysis

128

6 Conclusion

133

References

134

Physical Layer Security of Energy Harvesting Machine-to-Machine Communication System

137

1 Introduction to Machine-to-Machine Communications

137

1.1 Applications of M2M Communications

138

1.2 Design and Performance Analysis of M2M Communications

140

1.3 M2M Security Challenges and State-of-the-Art Solutions

140

2 Energy Harvesting

141

2.1 Energy Harvesting Sources

142

2.2 RF Energy Harvesting

143

Recent Developments in Wireless Power Transfer

144

3 Principles of Physical Layer Security

145

3.1 Categorization of Eavesdroppers

145

Based on Cooperation

145

Based on Activity

146

3.2 Comparative Analysis of Secure Energy Harvesting Protocols

146

4 Secrecy Performance of Energy Harvesting M2M Networks

150

4.1 System Model

150

Assumptions

151

Dedicated Jamming

151

FD Destination-Assisted Jamming

153

4.2 Secrecy Outage Probability Analysis

156

Dedicated Jamming

156

FD Destination-Assisted Jamming

157

4.3 Results and Discussion

158

4.4 Conclusions

161

4.5 Future Research Directions

161

References

162

Beam-Domain Full-Duplex Massive MIMO Transmission in the Cellular System

168

1 Introduction

168

2 System and Channel Models

170

3 Beam-Domain Full-Duplex Transmission Scheme

174

3.1 Beam-Domain Channel Representation

174

3.2 Beam-Domain Full-Duplex Transmission

180

4 Practical Implementation of BDFD Scheme

184

4.1 K-Means-Based UE Grouping

184

4.2 Full-Duplex Effective Beam-Domain Channel Estimation

186

Uplink Effective Beam-Domain Channel Estimation

187

Downlink Effective Beam-Domain Channel Estimation

188

4.3 Beam-Domain Data Transmission and Achievable Rate with Noisy CSI

189

4.4 Interference Control Between Uplink and Downlink

193

5 Simulation Results

193

6 Conclusion

198

Appendix

198

References

202

Correction to: 5G Security: Concepts and Challenges

206

Index

207