My Library

University LibraryCatalogue

Limit search to items available for borrowing or consultation
Record 4 of 901
Result Page: Previous Next
Can't find that book? Try BONUS+
Look for full text

Search Discovery

Search CARM Centre Catalogue

Search Trove

Add record to RefWorks

Cover Art

Title 5G enabled secure wireless networks [electronic resource] / Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, Vishal Sharma, editors.

Published Cham : Springer, ©2019.


Location Call No. Status
Physical description 1 online resource (213 p.)
Series Springer Engineering eBooks 2019 English+International
Contents Intro; Foreword; Preface; Acknowledgment; Contents; 5G Security: Concepts and Challenges; Abbreviations; 1 Overview; 1.1 Introduction; 1.2 Evolution of Cellular Technologies; First Generation; Second Generation; Third Generation; Fourth Generation; Fifth Generation; 1.3 The Significance of 5G Security; 1.4 The Need for Security; 2 5G Security Standardization; 2.1 Internet Engineering Task Force; 3 Security Characteristics of 5G; 3.1 Drivers of 5G; 3.2 Significance of Security and Privacy; Modern Confide Models; Security for New Relevance Transmission Models; Emerging Risk Prospects
Raised Privacy Concerns4 Network Planning; 4.1 Objectives; 4.2 Planning Inputs; Traffic Models; Potential Site Locations; BS Model; Propagation Prediction Models; 4.3 Planning Outputs; 4.4 Types of Network Planning; Rollout Network Planning; Incremental Network Planning; 5 5G Roadmap; 5.1 Need for Roadmap; 5.2 Roadmap Process; 6 Existing Concepts of 5G; 6.1 Multiple Input and Multiple Output; 6.2 Cognitive Radio Network; 7 Security Models; 7.1 Identity Management; 7.2 UE Security; 7.3 Radio Network Security; 7.4 Flexible and Scalable Security; 7.5 Network Slicing Security
7.6 Vitality Effective Security7.7 Cloud Security; 8 Security Protocols; 8.1 Informal Security Protocols; Dolev-Yao Adversary; Threat Model; Security Properties; Authentication Properties for Protocols; Channels; Attack Scenarios; 9 Channel Security; 9.1 Introduction; 9.2 Physical Layer Security Coding; LDPC Codes; Polar Codes; Lattice Codes; 9.3 Massive MIMO; Passive Eavesdropper Scenarios; Active Eavesdropper Scenarios; 9.4 Millimeter Wave (mmWave) Communications; 9.5 Heterogeneous Networks; Physical Layer Security in Heterogeneous Networks; 9.6 Non-orthogonal Multiple Access (NOMA)
Physical Layer Security of NOMA9.7 Full Duplex Technology; Full Duplex Receiver; Full Duplex Base Station; Full Duplex Eavesdropper; References; 5G Applications and Architectures; Brief Summary; 1 Brief Introduction to 5G; 2 Applications; 3 Novel Architectures and Implications; 4 Cross-Layer Design; 5 SDN-NFV-Based Models; 5.1 Software-Defined Network (SDN); 5.2 Network function virtualization (NFV); NFV Infrastructure; Virtualized Network Framework (VNF); Management and Network Orchestration (MNO); OSS""026E30F BSS Layer; 6 Service Architectures and Potential Direction
6.1 Industry Initiatives7 Conclusion; Appendix; NEMO; References; A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks; 1 Introduction; 1.1 Applications of 5G Networks; 1.2 Attacks and Threats in 5G Networks; 2 Preliminaries: Osmotic Computing; 3 Preliminaries: Catalytic Computing; 4 Existing Surveys and Their Applicability; 5 Taxonomy of Security Concerns for 5G Networks; 5.1 Secure Resource Allocation in 5G; 5.2 Secure Mobility Management in 5G; 5.3 Secure Routing in 5G; 5.4 Secure Physical Layer Formations in 5G
Notes 5.5 Secure Autonomous and Smart Services in 5G
Bibliography Includes bibliographical references and index.
Other author Jayakody, Dushantha Nalin K.
Srinivasan, Kathiravan.
Sharma, Vishal.
SpringerLink issuing body.
Subject Wireless communication systems -- Security measures.
Cell phone systems -- Standards.
Electronic books.
ISBN 9783030035082 electronic book
3030035085 electronic book