Coverart for item
The Resource 5G enabled secure wireless networks, Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, Vishal Sharma, editors, (electronic resource)

5G enabled secure wireless networks, Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, Vishal Sharma, editors, (electronic resource)

Label
5G enabled secure wireless networks
Title
5G enabled secure wireless networks
Statement of responsibility
Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, Vishal Sharma, editors
Contributor
Subject
Language
eng
Dewey number
621.382
Index
index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Jayakody, Dushantha Nalin K
  • Srinivasan, Kathiravan
  • Sharma, Vishal
http://library.link/vocab/subjectName
  • Wireless communication systems
  • Cell phone systems
Label
5G enabled secure wireless networks, Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, Vishal Sharma, editors, (electronic resource)
Instantiates
Publication
Note
5.5 Secure Autonomous and Smart Services in 5G
Antecedent source
file reproduced from an electronic resource
Bibliography note
Includes bibliographical references and index
Contents
  • Intro; Foreword; Preface; Acknowledgment; Contents; 5G Security: Concepts and Challenges; Abbreviations; 1 Overview; 1.1 Introduction; 1.2 Evolution of Cellular Technologies; First Generation; Second Generation; Third Generation; Fourth Generation; Fifth Generation; 1.3 The Significance of 5G Security; 1.4 The Need for Security; 2 5G Security Standardization; 2.1 Internet Engineering Task Force; 3 Security Characteristics of 5G; 3.1 Drivers of 5G; 3.2 Significance of Security and Privacy; Modern Confide Models; Security for New Relevance Transmission Models; Emerging Risk Prospects
  • Raised Privacy Concerns4 Network Planning; 4.1 Objectives; 4.2 Planning Inputs; Traffic Models; Potential Site Locations; BS Model; Propagation Prediction Models; 4.3 Planning Outputs; 4.4 Types of Network Planning; Rollout Network Planning; Incremental Network Planning; 5 5G Roadmap; 5.1 Need for Roadmap; 5.2 Roadmap Process; 6 Existing Concepts of 5G; 6.1 Multiple Input and Multiple Output; 6.2 Cognitive Radio Network; 7 Security Models; 7.1 Identity Management; 7.2 UE Security; 7.3 Radio Network Security; 7.4 Flexible and Scalable Security; 7.5 Network Slicing Security
  • 7.6 Vitality Effective Security7.7 Cloud Security; 8 Security Protocols; 8.1 Informal Security Protocols; Dolev-Yao Adversary; Threat Model; Security Properties; Authentication Properties for Protocols; Channels; Attack Scenarios; 9 Channel Security; 9.1 Introduction; 9.2 Physical Layer Security Coding; LDPC Codes; Polar Codes; Lattice Codes; 9.3 Massive MIMO; Passive Eavesdropper Scenarios; Active Eavesdropper Scenarios; 9.4 Millimeter Wave (mmWave) Communications; 9.5 Heterogeneous Networks; Physical Layer Security in Heterogeneous Networks; 9.6 Non-orthogonal Multiple Access (NOMA)
  • Physical Layer Security of NOMA9.7 Full Duplex Technology; Full Duplex Receiver; Full Duplex Base Station; Full Duplex Eavesdropper; References; 5G Applications and Architectures; Brief Summary; 1 Brief Introduction to 5G; 2 Applications; 3 Novel Architectures and Implications; 4 Cross-Layer Design; 5 SDN-NFV-Based Models; 5.1 Software-Defined Network (SDN); 5.2 Network function virtualization (NFV); NFV Infrastructure; Virtualized Network Framework (VNF); Management and Network Orchestration (MNO); OSS""026E30F BSS Layer; 6 Service Architectures and Potential Direction
  • 6.1 Industry Initiatives7 Conclusion; Appendix; NEMO; References; A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks; 1 Introduction; 1.1 Applications of 5G Networks; 1.2 Attacks and Threats in 5G Networks; 2 Preliminaries: Osmotic Computing; 3 Preliminaries: Catalytic Computing; 4 Existing Surveys and Their Applicability; 5 Taxonomy of Security Concerns for 5G Networks; 5.1 Secure Resource Allocation in 5G; 5.2 Secure Mobility Management in 5G; 5.3 Secure Routing in 5G; 5.4 Secure Physical Layer Formations in 5G
Control code
on1086130747
Dimensions
unknown
Extent
1 online resource (213 p.)
File format
one file format
Form of item
online
Isbn
9783030035082
Level of compression
unknown
Note
SpringerLink
Quality assurance targets
unknown
Reformatting quality
unknown
Specific material designation
remote
System control number
(OCoLC)1086130747
Label
5G enabled secure wireless networks, Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, Vishal Sharma, editors, (electronic resource)
Publication
Note
5.5 Secure Autonomous and Smart Services in 5G
Antecedent source
file reproduced from an electronic resource
Bibliography note
Includes bibliographical references and index
Contents
  • Intro; Foreword; Preface; Acknowledgment; Contents; 5G Security: Concepts and Challenges; Abbreviations; 1 Overview; 1.1 Introduction; 1.2 Evolution of Cellular Technologies; First Generation; Second Generation; Third Generation; Fourth Generation; Fifth Generation; 1.3 The Significance of 5G Security; 1.4 The Need for Security; 2 5G Security Standardization; 2.1 Internet Engineering Task Force; 3 Security Characteristics of 5G; 3.1 Drivers of 5G; 3.2 Significance of Security and Privacy; Modern Confide Models; Security for New Relevance Transmission Models; Emerging Risk Prospects
  • Raised Privacy Concerns4 Network Planning; 4.1 Objectives; 4.2 Planning Inputs; Traffic Models; Potential Site Locations; BS Model; Propagation Prediction Models; 4.3 Planning Outputs; 4.4 Types of Network Planning; Rollout Network Planning; Incremental Network Planning; 5 5G Roadmap; 5.1 Need for Roadmap; 5.2 Roadmap Process; 6 Existing Concepts of 5G; 6.1 Multiple Input and Multiple Output; 6.2 Cognitive Radio Network; 7 Security Models; 7.1 Identity Management; 7.2 UE Security; 7.3 Radio Network Security; 7.4 Flexible and Scalable Security; 7.5 Network Slicing Security
  • 7.6 Vitality Effective Security7.7 Cloud Security; 8 Security Protocols; 8.1 Informal Security Protocols; Dolev-Yao Adversary; Threat Model; Security Properties; Authentication Properties for Protocols; Channels; Attack Scenarios; 9 Channel Security; 9.1 Introduction; 9.2 Physical Layer Security Coding; LDPC Codes; Polar Codes; Lattice Codes; 9.3 Massive MIMO; Passive Eavesdropper Scenarios; Active Eavesdropper Scenarios; 9.4 Millimeter Wave (mmWave) Communications; 9.5 Heterogeneous Networks; Physical Layer Security in Heterogeneous Networks; 9.6 Non-orthogonal Multiple Access (NOMA)
  • Physical Layer Security of NOMA9.7 Full Duplex Technology; Full Duplex Receiver; Full Duplex Base Station; Full Duplex Eavesdropper; References; 5G Applications and Architectures; Brief Summary; 1 Brief Introduction to 5G; 2 Applications; 3 Novel Architectures and Implications; 4 Cross-Layer Design; 5 SDN-NFV-Based Models; 5.1 Software-Defined Network (SDN); 5.2 Network function virtualization (NFV); NFV Infrastructure; Virtualized Network Framework (VNF); Management and Network Orchestration (MNO); OSS""026E30F BSS Layer; 6 Service Architectures and Potential Direction
  • 6.1 Industry Initiatives7 Conclusion; Appendix; NEMO; References; A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks; 1 Introduction; 1.1 Applications of 5G Networks; 1.2 Attacks and Threats in 5G Networks; 2 Preliminaries: Osmotic Computing; 3 Preliminaries: Catalytic Computing; 4 Existing Surveys and Their Applicability; 5 Taxonomy of Security Concerns for 5G Networks; 5.1 Secure Resource Allocation in 5G; 5.2 Secure Mobility Management in 5G; 5.3 Secure Routing in 5G; 5.4 Secure Physical Layer Formations in 5G
Control code
on1086130747
Dimensions
unknown
Extent
1 online resource (213 p.)
File format
one file format
Form of item
online
Isbn
9783030035082
Level of compression
unknown
Note
SpringerLink
Quality assurance targets
unknown
Reformatting quality
unknown
Specific material designation
remote
System control number
(OCoLC)1086130747

Library Locations

    • InternetBorrow it
      Albany, Auckland, 0632, NZ
Processing Feedback ...