دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Rahim Tafazolli, Chin-Liang Wang, Periklis Chatzimisios, Madhusanka Liyanage سری: ISBN (شابک) : 9781119820314 ناشر: Willey سال نشر: 2021 تعداد صفحات: زبان: English فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 25 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب The Wiley 5G REF: Security به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب Wiley 5G REF: امنیت نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
THE WILEY 5G REF موضوعات پیشرفته را در حریم خصوصی و امنیت 5G کاوش کنید در The Wiley 5G REF: Security، تیمی از محققان برجسته مجموعهای روشنگر از مقالات انتخاب شده از مرجع آنلاین Wiley 5G را ارائه میدهند. ویراستاران چشم انداز امنیتی 5G را معرفی می کنند، از جمله خطرات امنیتی و حریم خصوصی مرتبط با شبکه های 5G. آنها همچنین راهحلهای امنیتی مختلف را برای بخشهای مختلف شبکه 5G، مانند شبکههای رادیویی، لبه، دسترسی، و شبکههای اصلی مورد بحث قرار میدهند. این کتاب تهدیدات امنیتی مرتبط با فناوریهای کلیدی نرمافزاری شبکه، مانند SDN، NFV، NS، و MEC، و همچنین تهدیداتی که با سرویسهای جدید 5G و IoT همراه هستند را بررسی میکند. همچنین بحث مفصلی در مورد حریم خصوصی شبکه های 5G وجود دارد. مقالات ارائه شده توسط کارشناسان برجسته بین المللی در زمینه امنیت و حریم خصوصی شبکه های مخابراتی نوشته شده است. آنها فرصت های یادگیری را برای همه از دانشجویان مقطع تحصیلات تکمیلی گرفته تا متخصصان حرفه ای مهندسی ارائه می دهند. این کتاب همچنین ارائه می دهد: مقدمه ای کامل بر چشم انداز امنیت شبکه تلفن همراه 5G و خطرات عمده مرتبط با آن کاوش های جامع امنیت SDMN، چالش های پیچیده مرتبط با امنیت 5G، و امنیت لایه فیزیکی برای شبکه های 5G و آینده بحث های عملی در مورد امنیت برای ارتباطات انتقال و D2D در هتنتهای 5G، احراز هویت و کنترل دسترسی برای امنیت شبکه 5G و G5-Core بررسیهای عمیق امنیت MEC و ابر، و همچنین قرار دادن و اشتراکگذاری VNF در شبکههای سلولی مبتنی بر NFV، ایدهآل برای محققان و پزشکان در زمینههای امنیت و حریم خصوصی 5G، The Wiley 5G REF: امنیت یک منبع ضروری برای هر کسی است که به دنبال یک پایه آموزشی قوی در آخرین پیشرفتهای 5G است.
THE WILEY 5G REF Explore cutting-edge subjects in 5G privacy and security In The Wiley 5G REF: Security, a team of distinguished researchers delivers an insightful collection of articles selected from the online-only The Wiley 5G Reference. The editors introduce the security landscape of 5G, including the significant security and privacy risks associated with 5G networks. They also discuss different security solutions for various segments of the 5G network, like the radio, edge, access, and core networks. The book explores the security threats associated with key network softwarization technologies, like SDN, NFV, NS, and MEC, as well as those that come with new 5G and IoT services. There is also a detailed discussion on the privacy of 5G networks. The included articles are written by leading international experts in security and privacy for telecommunication networks. They offer learning opportunities for everyone from graduate-level students to seasoned engineering professionals. The book also offers: A thorough introduction to the 5G mobile network security landscape and the major risks associated with it Comprehensive explorations of SDMN security, the complex challenges associated with 5G security, and physical-layer security for 5G and future networks Practical discussions of security for Handover and D2D communication in 5G HetNets, authentication and access control for 5G, and G5-Core network security In-depth examinations of MEC and cloud security, as well as VNF placement and sharing in NFV-based cellular networks Perfect for researchers and practitioners in the fields of 5G security and privacy, The Wiley 5G REF: Security is an indispensable resource for anyone seeking a solid educational foundation in the latest 5G developments.
Cover Title Page Copyright Contents Foreword List of Contributors Chapter 1 5G Mobile Networks Security Landscape and Major Risks Introduction 4G to 5G: A Paradigm Shift 5G System Architecture Salient Features of 5G Network The Threat Landscape and Security Roadmap 5G Network Threat Surface Inspecting 3GPP Security Proposals Security Research Groups and Visions Why Securing 5G is Challenging? Billions of Hackable IoT Devices The Convergence of IT and Telecom Infrastructure Open‐source Softwarization AI vs AI Real‐time E2E Security Monitoring at Scale Physical Layer Security Can 3GPP Recommendations Solely Secure the 5GS? Current State of the Arts and Open Research Areas Conclusion Acronyms Related Articles References Further Reading Chapter 2 SDMN Security Software‐defined Mobile Network (SDMN) Security Introduction SDN Concepts SDN Vulnerabilities SDN Security Security Function Implementations Advanced Detection Algorithms Data Plane Extensions Security Monitoring and Policy Enforcement Conclusion and Future Trends Related Articles References Further Reading Chapter 3 5G Security – Complex Challenges Introduction 5G Security Building Blocks Old Challenges in New Context for 5G New Security Research Challenges for 5G Trust Dimension 1: Trust Stack Dimension 2: E2E Trust Dimension 3: Supply Chain Integrity Dimension 4: Dynamicity Malware in Mobile Core Networks Measuring Security Need for a Comprehensive and Regular Risk Management Approach Status Regulatory Approaches for Risk Management How to Proceed Today in 5G Risk Management Approach Latest Proposal for 5G Risk Management Summary Related Articles References Further Reading Chapter 4 Physical‐Layer Security for 5G and Beyond Introduction Notion on Physical‐Layer Security Secrecy Performance Metrics Secrecy Capacity Secrecy Outage Probability Alternative Secrecy Outage Formulation Fractional Equivocation‐Based Metrics Intercept Probability Probability of Strictly Positive Secrecy Capacity Physical‐Layer Security Techniques Artificial Noise Generation Multiantenna Diversity Cooperative Diversity Trusted Relays Untrusted Relays Physical‐Layer Authentication and Secret‐Key Generation Physical‐Layer Key Generation Physical‐Layer Security for 5G Technologies Massive MIMO mmWave Communications Full‐Duplex Communications Nonorthogonal Multiple Access Conclusions and Future Challenges Practical Channel Models Secure Waveforms Physical‐Layer Security in Terterahertz communications Physical‐Layer Security for UAV‐Aided Communications Machine‐Learning Techniques for Physical‐Layer Authentication Acknowledgment Related Article References Further Reading Chapter 5 Security for Handover and D2D Communication in 5G HetNets Introduction Security Architecture Overview 3GPP 5G Network Architecture 3GPP 5G Security Architecture Security Attacks and Mechanisms in 5G Attacks in 5G Eavesdropping and Traffic Analysis Jamming DoS and DDoS Man in the Middle Attack Key Security Technologies in 5G Software‐Defined Networking (SDN) Heterogeneous Networks Security Mechanisms in 5G Authentication Cryptography Confidentiality Availability Integrity Key Management Security Evaluations Techniques Security in 5G Heterogeneous Networks Handover Authentication Security D2D Group Authentication Security Conclusions Related Articles References Further Reading Chapter 6 Authentication and Access Control for 5G Introduction Basics of Authentication and Access Control Overall Architecture of the AAC in 3G, 4G, and 5G 5G Network Architecture Authentication and Access Control in 5G 5G‐AKA Protocol Security Flaws in 5G‐AKA New Concepts in 5G 5G‐Specific Use Cases and Requirements Motivated Use Cases Derived Requirements AAC Proposal in Cellular Networks Summary Related Articles References Further Reading Chapter 7 5G‐Core Network Security Introduction 5G Design Principles and the Core Network Security of Core Network Overview of 5G Security Architecture Security of Core Network Elements Security of Interfaces/Protocols UE and Network Authentication Security of Emerging New Network Technologies Security of Cloud Platforms Security of SDN Security of Network Virtualization Discussion and Conclusion Related Article References Further Reading Chapter 8 MEC and Cloud Security Introduction 5G MEC‐Cloud Overview Edge and Cloud Computing for 5G Features and Synergies MEC and Cloud Security in 5G Threat Models Network Infrastructure Core Servers Edge Servers Virtualization End Devices Security Challenges and Considerations for Integrating MEC and Cloud to 5G Hardware Component Connected Devices System Software Networking and Communication MEC‐Cloud Service Distributed Logging at Scale Open Research Directions Conclusions References Further Reading/Resources Chapter 9 Security in Network Slicing Introduction Network Slicing Architecture Security Threats of NS High‐Level Functional Roles Security Considerations in Network Slicing and Related Work Security Considerations in Network Slicing State of the Art for NS Security Future Research Directions Artificial Intelligence One Slice for Security Context‐Aware Security Security Orchestration and Automation Security‐By‐Design Security‐as‐a‐Service Conclusions References Further Reading Chapter 10 VNF Placement and Sharing in NFV‐Based Cellular Networks Introduction Related Issues System Model and Decisions to Make Relevant Quantities for VNF Placement and Sharing Objective and Constraints The FlexShare Algorithm Placement Decisions Priority, Scaling, and Pruning Reference Scenarios and Benchmark Strategies Synthetic Scenario Real‐World Scenario Benchmark Strategies Numerical Results Conclusions Acknowledgment References Further Reading Chapter 11 Security Monitoring and Management in 5G Introduction Network Security Monitoring Software‐Defined Security Network Slicing Cognitive Network Security Management Optimization Techniques Conclusions Related Article References Further Reading Chapter 12 Security for Vertical Industries Introduction Cloudification of the Network Operators MVNO Security in 5G Networks Security Management and Orchestration TaaS Deployment Security Conclusions Related Articles References Further Reading Chapter 13 Introduction to IoT Security Introduction Attacks and Countermeasures Perception Layer Perception Nodes Sensor Nodes Gateways Network Layer Mobile Communication Cloud Computing Internet Application Layer Smart Utilities – Smart Grids and Smart Metering Consumer Wearable IoT (WIoT) Devices for Healthcare and Telemedicine Intelligent Transportation Smart Agriculture Industrial IoT (IIoT) Smart Buildings, Environments, and Cities Authentication and Authorization Authentication Authorization Authentication at IoT Layers Perception Layer Network Layer Application Layer Other Security Features and Related Issues The Simplified Layer Structure The Idea of Middleware Cross‐Layer Security Problem Privacy Risk Mitigation Discussion Future Research Directions Blockchain 5G Fog and Edge Computing Quantum Security, AI, and Predictive Data Analytics Network Slicing Conclusions References Further Reading Chapter 14 Privacy in the 5G World: The GDPR in a Datafied Society Introduction The 5G World. What Sets It Apart from Previous Communication Technologies? Data Privacy and the GDPR The Risks and Threats to Privacy in 5G Concluding Thoughts Related Article References Further Reading Chapter 15 Structural Safety Assessment of 5G Network Infrastructures Introduction Discussion Telecommunication Sector Background Communication Structures Background Safety Assessment of Communication Structures Major Concerns to 5G when Compared with Pre‐5G Networks Conclusions and Recommendations Related Articles References Further Reading Index EULA