5G Explained : Security and Deployment of Advanced Mobile Communications
5G Explained : Security and Deployment of Advanced Mobile Communications
Click to enlarge
Author(s): Penttinen, Jyrki T. J.
ISBN No.: 9781119275688
Pages: 328
Year: 201904
Format: Trade Cloth (Hard Cover)
Price: $ 184.85
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Preface Achnowledgements Abrevations list 1 Introduction 10 1.1 Overview 10 1.2 What is 5G? 11 1.3 Background 12 1.4 Research 13 1.5 Challenges for electronics 13 1.6 Expected 5G in practice 14 1.7 5G and security 15 1.


8 Motivations 16 1.9 5G standardization and regulation 16 1.9.1 ITU 16 1.9.2 3GPP 18 1.10 Global standardization in 5G era 20 1.10.


1 GlobalPlatform 20 1.10.2 ITU 20 1.10.3 IETF 21 1.10.4 3GPP/3GPP2 21 1.10.


5 ETSI 21 1.10.6 IEEE 21 1.10.7 SIMalliance 22 1.10.8 Smart Card Alliance 22 1.10.


9 GSMA 22 1.10.10 NIST 22 1.10.11 NHTSA 23 1.10.12 ISO/IEC 23 1.10.


13 ISO/IEC JTC1 23 1.10.14 OMA 23 1.10.15 CEPT/ECC 23 1.10.16 NERC 24 1.10.


17 OWASP 24 1.10.18 OneM2M 24 1.10.19 Global Standards Collaboration 24 1.10.20 CSA 24 1.10.


21 NGMN 25 1.10.22 Car-to-Car Communication Consortium 25 1.10.23 5GAA 25 1.10.24 Trusted Computing Group 25 1.10.


25 InterDigital 25 1.11 Introduction to the book 26 2 Requirements 31 2.1 Overview 31 2.2 Background 32 2.3 5G requirements based on ITU 33 2.3.1 Process 33 2.3.


2 Documents 35 2.3.3 Peak data rate 36 2.3.4 Peak spectral efficiency 37 2.3.5 User experienced data rate 37 2.3.


6 5th percentile user spectral efficiency 37 2.3.7 Average spectral efficiency 37 2.3.8 Area traffic capacity 38 2.3.9 Latency 38 2.3.


10 Connection density 38 2.3.11 Energy efficiency 38 2.3.12 Reliability 39 2.3.13 Mobility 39 2.3.


14 Mobility interruption time 39 2.3.15 Bandwidth 39 2.4 The technical specifications of 3GPP 40 2.4.1 Releases 40 2.4.2 Security requirements for 5G 41 2.


5 NGMN 49 2.5.1 User experience 49 2.5.2 Device Requirements 51 2.5.3 Enhanced Services 51 2.5.


4 The 5G security 52 2.6 Mobile Network Operators 54 2.7 Mobile Device Manufacturers 54 3 Positioning of 5G 58 3.1 Overview 58 3.2 Mobile Generations 58 3.2.1 1G 59 3.2.


2 2G 60 3.2.3 3G 60 3.2.4 4G 61 3.2.5 5G 62 3.3 The role of 3GPP in LPWA and IoT 67 3.


3.1 Overall LPWA market landscape 67 3.3.2 General IoT requirements 68 3.3.3 LTE-IoT mode comparison 69 3.3.4 Statistics and projections 70 3.


3.5 Standardization 70 3.3.6 Deployments 71 3.3.7 Comparison of LPWAs 72 3.3.8 Security aspects of IoT devices 72 3.


3.9 What will 5G offer in IoT landscape vs. Non-IMSI LPWA? 74 3.4 The role of 5G in automotive (V2X) 74 3.5 The role of 5G in Cyber World 75 3.5.1 Introduction 75 3.5.


2 Cyber and IoT 75 3.5.3 What Cyber is? 76 3.5.4 Standardization 77 3.5.5 Origin and Development 78 3.5.


6 Machine learning and AI in 5G 79 4 Architecture 83 4.1 Overview 83 4.1.1 Architecture of the previous 3GPP generations 84 4.1.2 Architecture options for 5G 86 4.2 Gradual deployment of 5G 89 4.2.


1 5G User and Control Plane 91 4.3 NG-RAN architecture 93 4.3.1 Interfaces 93 4.3.2 Functions of gNB and ng-eNB 94 4.4 5G system architecture 95 4.4.


1 Network Functions (NF) 95 4.4.2 Architecture of 5G 96 4.5 Renewed functionality of the 5G system 105 4.5.1 Network Slicing 105 4.5.2 Network Function Virtualization 109 4.


5.3 Open Source 110 4.5.4 Mobile Edge Computing 110 4.5.5 All-IP Technology 111 4.5.6 Service based architecture 111 4.


6 Supporting solutions for 5G 111 4.6.1 Adaptive antennas 111 4.6.2 SON 111 4.6.3 QoS in 5G 112 4.7 Control and User Plane Separation of EPC nodes (CUPS) 114 5 Radio Network 119 5.


1 Overview 119 5.2 5G performance 120 5.2.1 General 120 5.2.2 Radio performance figures 120 5.3 5G spectrum 121 5.3.


1 Overall advances of 5G frequencies 121 5.3.2 ITU-R WRC-19 Expectations 122 5.3.3 5G Bands 122 5.4 5G Radio Access Technologies 127 5.4.1 Key specifications 127 5.


4.2 Frequency bands 128 5.4.3 5G channel modeling 128 5.4.4 Radio technology principles 129 5.4.5 OFDM Transceiver Chain 132 5.


4.6 Cyclic prefix 133 5.4.7 Channel Estimation and Equalization 135 5.4.8 Modulation 138 5.4.9 Coding 138 5.


4.10 Signal processing chain 139 5.5 Uplink OFDM of 5G: CP-OFDM and DFT-s-OFDM 139 5.6 Downlink 140 5.7 New Radio (NR) interface of 3GPP 141 5.7.1 Radio network architecture and interfaces 142 5.7.


2 5G network elements 143 5.7.3 Modulation 145 5.7.4 Frame structure 146 5.7.5 Physical Channels 146 5.7.


6 General protocol architecture 147 5.7.7 Multiple access 148 5.7.8 4.2.3 Channel coding 148 5.7.


9 4.2.4 Physical layer procedures 148 5.7.10 4.2.5 Physical layer measurements 148 5.7.


11 Quality of Service 148 5.8 User devices 149 5.9 Other aspects 149 5.10 CBRS 149 5.10.1 Background 149 5.10.2 Use cases for CBRS 150 5.


10.3 The Concept 151 5.10.4 Frequency sharing 151 5.10.5 CBRS interface 152 6 Core Network 155 6.1 Overview 155 6.2 Preparing the core for 5G 157 6.


2.1 Cloud-concept 157 6.2.2 Data center as a base for 5G architecture 157 6.2.3 Service level assurance 159 6.2.4 Resiliency 162 6.


2.5 Redundancy 164 6.2.6 Recovery classes 165 6.2.7 Connectivity Service Network 167 6.2.8 Network as a Service 167 6.


2.9 Security certification of 5G SIM and subscription management 168 6.2.10 Security certification of data centers 169 6.3 5G core network elements 170 6.3.1 5G-EIR 171 6.3.


2 AF 171 6.3.3 AMF 172 6.3.4 AUSF 172 6.3.5 LMF 172 6.3.


6 N3IWF 173 6.3.7 NEF 173 6.3.8 NRF 174 6.3.9 NSSF 175 6.3.


10 NWDAF 175 6.3.11 PCF 176 6.3.12 SEPP 176 6.3.13 SMF 177 6.3.


14 SMSF 178 6.3.15 UDM 179 6.3.16 UDR 180 6.3.17 UDSF 180 6.3.


18 UPF 181 6.4 5G functionalities implemented in 5G core 181 6.4.1 Network slicing 181 6.4.2 SDN 183 6.4.3 NFV 183 6.


4.4 Optimization of the core and transport 184 6.4.5 Cloud RAN 184 6.4.6 User and data plane separation 186 6.5 Transport network 187 6.5.


1 Conceptual examples 188 6.6 Protocols and interfaces 189 6.6.1 RAN 190 6.6.2 Layers 191 6.6.3 Layer 1 192 6.


6.4 Layer 2 192 6.6.5 Layer 3 193 6.6.6 The split-architecture of RAN 193 6.6.7 Core network protocols 194 6.


6.8 Control Plane protocols 195 6.6.9 User Plane protocols 201 6.7 5G core network services 203 7 Services and Applications 207 7.1 Overview 207 7.2 Network procedures 208 7.2.


1 General 208 7.2.2 5G states 209 7.3 5G services 210 7.3.1 Registration and mobility management 210 7.3.2 Connection establishment: Session management 210 7.


4 Specific 5G services 212 7.4.1 IMS call 212 7.4.2 SMS 212 7.4.3 Public warning system 212 7.4.


4 Location based services 212 7.5 Dual connectivity 216 7.6 Network function -related cases 216 7.6.1 Network exposure 216 7.6.2 Policy 216 7.6.


3 Network function service framework 216 7.7 V2I 216 7.7.1 How V2V works? 217 7.7.2 V2V system overview 217 7.7.3 V2V reference architecture 218 7.


7.4 Development of V2X 219 7.7.5 Security 219 7.7.6 NHTSA requirements 219 7.7.7 IEEE 802.


11p vs. LTE-based short-range communications 219 7.7.8 Security threats 221 7.7.9 MNO role in V2V 221 7.7.10 Markets for Peer to Peer and Cellular connectivity 222 7.


8 Machine Learning and Artificial Intelligence 222 8 Security 225 8.1 Introduction 225 8.2 Overview 226 8.3 5G Security Threats and Challenges 228 8.3.1 Trends 228 8.3.2 Needs in mobile environment 229 8.


3.3 Network Slicing 230 8.3.4 Network Virtualization 231 8.3.5 Open Source 231 8.3.6 Mobile Edge Computing and All IP 232 8.


3.7 Other 5G safety considerations 232 8.4 Development 233 8.4.1 LTE Evolution 233 8.4.2 NB-IoT vs. Low Power Wide Area 233 8.


4.3 Ramping up 5G 233 8.5 Security implications in 5G environments and use cases 234 8.5.1 Network Operations 234 8.5.2 Enhanced Mobile Broadband 235 8.5.


3 Massive Internet of Things 236 8.5.4 Critical Communications 238 8.6 5G Security Layers 239 8.7 Device Security 241 8.7.1 Differentiating the Devices 241 8.7.


2 Spectrum 241 8.7.3 Number of applications 241 8.7.4 Type of network 242 8.7.5 Type of access 242 8.7.


6 Type of credential 242 8.7.7 Device to Network Security 242 8.7.8 Device-to-Service and Device-to-Application Security 244 8.7.9 Device-to-Device Security 245 8.7.


10 Device-to-User Security 245 8.7.11 Summary of the Device Security Requirements 245 8.8 Security between Network Entities 246 8.8.1 Protection of the Mobile Edge 246 8.8.2 Authentication Framework 247 8.


9 Security opportunities for stakeholders 247 8.9.1 Evolution of the SIM - Scalable Device Security.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...