Ebook: A Comprehensive Guide to 5G Security
This book is one of the first attempts to comprehensively address the key security
areas and domains for 5G networks, starting from a 5G security landscape overview
and physical infrastructure security to an in‐depth discussion around security mecha-
nisms for different components of 5G mobile networks. It also provides important
insights into the current and future threats to mobile networks and mapping those to
the various threat vectors for different mobile generations, including 5G, by using a
detailed threat analysis approach. Readers will find an opportunity to explore the
evolved security model and lifecycle functions for 5G. This book has taken a fresh per-
spective on addressing security and privacy for new areas evolving with 5G, including
Device to Device (D2D) connectivity, cloud services, SDMN (Software Defined Mobile
Networks), NFV (Network Function Virtualization) and IoT (Internet of Things).
The book will be helpful to a range of 5G stakeholders: researchers looking for chal-
lenging new problems, mobile network operators (MNOs) and virtual network opera-
tors (MVNOs), seeking to plan for the new threat environment, owners of infrastructure
investigating how 5G can improve their operations, telecom equipment vendors, and
standardization bodies working on network and IoT standards.
areas and domains for 5G networks, starting from a 5G security landscape overview
and physical infrastructure security to an in‐depth discussion around security mecha-
nisms for different components of 5G mobile networks. It also provides important
insights into the current and future threats to mobile networks and mapping those to
the various threat vectors for different mobile generations, including 5G, by using a
detailed threat analysis approach. Readers will find an opportunity to explore the
evolved security model and lifecycle functions for 5G. This book has taken a fresh per-
spective on addressing security and privacy for new areas evolving with 5G, including
Device to Device (D2D) connectivity, cloud services, SDMN (Software Defined Mobile
Networks), NFV (Network Function Virtualization) and IoT (Internet of Things).
The book will be helpful to a range of 5G stakeholders: researchers looking for chal-
lenging new problems, mobile network operators (MNOs) and virtual network opera-
tors (MVNOs), seeking to plan for the new threat environment, owners of infrastructure
investigating how 5G can improve their operations, telecom equipment vendors, and
standardization bodies working on network and IoT standards.
Download the book A Comprehensive Guide to 5G Security for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)