Call for Chapters (WILEY Publishers) - Published on August 2017

Comprehensive Guide to 5G Security

We would like to bring your attention to the edited book on " Comprehensive Guide to 5G Security". This book would be published by WILEY Publishers  and it is anticipated to be in print by August 2017 tentatively. We request you to kindly contribute chapters for the book based on your research area.

Editors

Introduction

The evolution of mobile telecommunication networks is accompanied by new demands for the performance, portability, elasticity and energy efficiency of network functions. As a results, 5G mobile networks will adopt new networking concepts such as Software Defined Networking (SDN), Network Function Virtualization (NFV) and cloud computing principles  to improve the performance. These concepts changes how the security mechanism are designed in future 5G networks.

 Motivations for attacking networks have also changed from fun loving immature script kiddies to organized cybercrime rings and hacktivists with clear political and financial objectives. In this age of digitalization where after connecting humans using Internet and mobile, we are talking about connecting things and machines. Mobile has not yet completely replaced the personal computer but has become an ideal place where personal information can be found for nefarious use. Therefore, security needs to be architected to not only protect from the current threats but to address the increased and evolving threat landscape.  Adequate security should include threat intelligence, visibility and real time protection

On the other hand, Today’s networks host various values – examples include revenue streams and brand reputation. The accessibility of these values via the internet has already attracted hacktivists, underground economies, cybercrime and cyber-terrorists. The values hosted in, and generated by, the 5G system are estimated to be even higher, and the assets (hardware, software, information and revenue streams) will be even more attractive for different types of attacks. Furthermore, considering the possible consequences of an attack, the damage may not be limited to a business or reputation; it could even have a severe impact on public safety.

 This leads to a need to strengthen certain security functional areas. Attack resistance needs to be a design consideration when defining new 5G protocols. Security and privacy are cornerstones for 5G to become a platform for the Networked Society. Cellular systems pioneered the creation of security solutions for public communication, providing a vast, trustworthy ecosystem – 5G will drive new requirements due to new business and trust models, new service delivery models, an evolved threat landscape and an increased concern for privacy.

Objective of the Book

The book provides a reference material to a comprehensive study of 5G security.  It offers an insight into the current and future threats to mobile networks and mechanisms to protect it. It covers the critical lifecycle functions and stages of 5G security, and how to build an effective security architecture for 5G based mobile networks. This is the first time mobile network security is addressed based on Network-centricity, Device-centricity, Information-centricity and most importantly People-Centricity in a single book.

This books offers security considerations for all relative stakeholders of mobile networks such as mobile network operators (MNOs), mobile network virtual operators (MVNOs), Mobile users, wireless users, IoT organizations and digital organizations. Furthermore, this book will provide very useful reference material for academic professionals and young students and researchers.

Target Audience

This books will be of key interest for:

  • Mobile Network Operators (MNOs) as they will be looking to adopt 5G technology to offer new and straight of the art secure services to their customers. This book will offer the required guidelines, methods, tools and mechanisms to secure their network while embracing for 5G.
  • Mobile network virtual operators (MVNOs) would like to equally reach the large customer base who is going to switch to 5G networks. Security is key requirement while connecting MVNOs with the core networks of large operators.
  • Telecommunication researchers: 5G security is one of the key area of interest for telecommunications researchers as security challenges outpaces the traditional tools available to market. This book will offer a single source of all the security related topics for 5G researchers and provide leads for basics of 5G security
  • Academics: Mobile network security has already been an area of research and study for major educational institutions across the world. With 5G evolvement as the future of mobile networks, there is no such reference and book available that academics can use for teaching this critical area of interest.
  • Technology Architects: 5G is going to cross the traditional mobility borders and is going to have an equal impact to enterprises and organizations who are planning to transform into digital businesses. It would be critical for architects to start aligning their technology and security architectures to the future needs of 5G standards. This books offers resources to design and build a security architecture and maintain it.

Publishing and Indexing:

This book is scheduled to be published by WILEY Publishers. For additional information regarding the publisher, please visit WILEY Publishers . This publication is anticipated to be released in August 2017. 

Publication Cost to Authors:

Free of charge. Contributors will be offered one free electronic copy. 

Inquiries and submissions can be forwarded electronically (Word document):

Madhusanka Liyanage
Project Manager,
Centre for Wireless Communication,
University of Oulu,
Finland.

E-mail: 5gbook2017@gmail.com 

Call for Chapters - Important Dates

  • Proposals Submission Deadline: 15th August 2016
  • Acceptance of Proposals: 20th September 2016
  • Full Chapter Submission: 1st December 2016
  • Submission Deadline Extended: 15th December 2016
  • Review Results: 30th January 2017
  • Final Chapters Due: 28th February 2017

Recommended topics include, but are not limited to, the following:

Part I : 5G Security Overview

    1. Evolution of Cellular Systems
  • Evolution of Mobile Networks
  • History of Mobile Networks
    2. 5G mobile networks
  • 5G requirements
  • 5G Working Groups/ Research Communities
    3. Security Standardization

    4. Mobile Networks Security Landscape
  • Evolution of Security Threats for Mobile Networks
  • Attack Vectors
  • Mitigation Mechanisms
    5. Overview of 5G Security Lifecycle Functions
  • Security Measurement (Measure the security using metrics)
  • Threat analysis, Risk Analysis, Behavior Analysis, Data Protection Analysis
  • Security Auditing, Security Monitoring
  • Security Policy Management, Security Device Management
    6. Overview of 5G Security Architecture
  • 5G Security Business and Technical Use cases
  • Security Requirements, Security Principles
  • Security Domains
    7. Building a security architecture for 5G Networks

    8. 5G Security Areas
  • 5G Network-Centric Security
  • 5G Device and People -Centric Security
  • 5G Cloud Security
  • 5G Information-Centric Security
  • 5G Industry-Centric Security

Part II : 5G Network-Centric Security

    9. 5G-Core Network Security
  • SGi Interface Security
  • S8 Security
  • EPC security
    10. Radio Access Network Security
  • S1 Interface Security
  • eNB Security
  • Physical Layer Security

    11. 5G-WLAN Security

  • WiFi security
  • LiFi Security

    12. SDMN Security

  • Control Plane Security
  • Data Plane Security
  • Application Plane Security
  • Management-Plane Security
  • Communication Channels Security

    13. Mobile Virtual Network Operator (MVNO) Security

Part III : 5G Device-Centric Security

    14. Mobile Device Security

  • USIM Security
  • Local authentication

    15. M2M (Machine to Machine) and D2D (Device to Device) Security   

    16. IoT Security

Part VI : 5G Cloud and Data Center Security

    17. Infrastructure Security

  • Virtualization layer security,Firewalls, VPNs

    18. NFV based security services

    19. Cloud Security

  • Secure Multi-Tenancy
  • Security as a Service

Part V : 5G Information and People-Centric Security

    20. Data Protection

  • Data Access Control
  • Data Encryption

    21. Big Data Analytics for 5G Security

    22. User Privacy

    23. Identity and access management

    24. Regulatory Impacts on Security

Submission Procedure

Researchers and practitioners are invited to submit, a 2-3 page chapter proposal clearly explaining the mission and concerns of his or her proposed chapter. 

Full chapters are expected to be submitted by 15th of December, 2016. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project. Please send your proposal and chapter to 5gbook2017@gmail.com 

Manuscript guidelines:

Refer to the link shown: Click here. The preparation of manuscripts submitted for the book must be original and within the scope of the book. Expected chapter length is between 8,000 to 15,000 words or more (or can be discussed with the editors).