Foreword |
|
xiv | |
Preface |
|
xv | |
Acknowledgments |
|
xx | |
About the Author |
|
xxi | |
|
Part I Evolution of Cellular Technologies to 5G, Security Enhancements, and Challenges |
|
|
|
Chapter 1 Evolution from 4G to 5G |
|
|
2 | (24) |
|
Mobile Network Evolution from 4G to 5G |
|
|
4 | (1) |
|
|
5 | (2) |
|
Disaggregated Architecture |
|
|
7 | (3) |
|
|
10 | (2) |
|
Service-Based Architecture |
|
|
12 | (2) |
|
Adoption of Cloud-Native Technology |
|
|
14 | (1) |
|
Multi-access Edge Computing (MEC) |
|
|
15 | (1) |
|
|
16 | (2) |
|
Key 5G Features in 3GPP Releases |
|
|
18 | (2) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (2) |
|
|
24 | (2) |
|
Chapter 2 Deployment Modes in 5G |
|
|
26 | (30) |
|
5G NSA and SA Deployments |
|
|
27 | (1) |
|
5G Non-Standalone (NSA) Deployments |
|
|
28 | (3) |
|
5G Standalone (SA) Deployments |
|
|
31 | (9) |
|
Network Slice as a Service (NSaaS) |
|
|
40 | (2) |
|
5G Time-Sensitive Networks |
|
|
42 | (2) |
|
5G Local Area Network-Type Service |
|
|
44 | (2) |
|
Private 5G/Non-Public Networks |
|
|
46 | (1) |
|
Standalone Non-Public Network (SNPN) |
|
|
46 | (2) |
|
Public Network Integrated Non-Public Networks (PNI-NPN) |
|
|
48 | (4) |
|
|
52 | (1) |
|
|
52 | (2) |
|
|
54 | (2) |
|
Chapter 3 Securing 5G Infrastructure |
|
|
56 | (26) |
|
3GPP 5G Security Enhancements |
|
|
57 | (1) |
|
5G Trust Model: Non-Roaming |
|
|
57 | (2) |
|
|
59 | (1) |
|
Integration of Non-3GPP Network to the 5G Core Network |
|
|
59 | (7) |
|
Other Key Security Enhancements in Release 16 |
|
|
66 | (8) |
|
Security Challenges in 5G |
|
|
74 | (1) |
|
|
75 | (1) |
|
Perimeter-Less Deployments |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (2) |
|
|
79 | (1) |
|
|
80 | (2) |
|
Part II Securing 5G Architectures, Deployment Modes, and Use Cases |
|
|
|
Chapter 4 Securing RAN and Transport Deployments in 5G |
|
|
82 | (60) |
|
5G RAN and Transport Threats |
|
|
84 | (1) |
|
Vulnerabilities in Air Interface |
|
|
84 | (3) |
|
Vulnerabilities in the Transport Network |
|
|
87 | (4) |
|
Rogue/Fake Base Station Vulnerabilities |
|
|
91 | (1) |
|
Securing 5G RAN and Transport |
|
|
92 | (1) |
|
Securing the Air Interface |
|
|
93 | (1) |
|
Using Trusted Transport Network Elements |
|
|
94 | (1) |
|
Secure Deployments and Updates Using Secure ZTP |
|
|
95 | (2) |
|
Using Security Gateway (SecGW/SEG) to Secure the RAN and Transport Layer |
|
|
97 | (28) |
|
Real Scenario Case Study: Examples of Threat Surfaces and Their Mitigation |
|
|
125 | (1) |
|
A The Attacker Takes Control of loT Devices with Weak Security and Launches DDoS Attack |
|
|
126 | (1) |
|
B The Attacker Uses the Vulnerability in S1 and Insecure Transport to Use Rogue eNBs and Uses MitM Attacks in the 5G NSA Deployment |
|
|
127 | (1) |
|
C The Attacker Uses the Insecure Transport and Carries Out MitM Attacks in Back Haul |
|
|
128 | (1) |
|
|
128 | (8) |
|
|
136 | (2) |
|
|
138 | (2) |
|
|
140 | (2) |
|
Chapter 5 Securing MEC Deployments in 5G |
|
|
142 | (92) |
|
Service Provider Network-Based MEC |
|
|
144 | (1) |
|
Enterprise Network-Based MEC |
|
|
145 | (1) |
|
|
146 | (4) |
|
Distributed UPF and MEC Application Deployment |
|
|
150 | (1) |
|
C-RAN/O-RAN/Open VRAN Deployment Enabled by MEC |
|
|
151 | (1) |
|
Enterprise MEC Deployment |
|
|
152 | (1) |
|
|
153 | (1) |
|
Threat Surfaces in 5G MEC Deployments |
|
|
154 | (1) |
|
|
155 | (1) |
|
Hardware and Software Vulnerabilities |
|
|
156 | (3) |
|
5G MEC Infrastructure and Transport Vulnerabilities |
|
|
159 | (5) |
|
Virtualization Threat Vectors |
|
|
164 | (5) |
|
5G MEC API Vulnerabilities |
|
|
169 | (5) |
|
|
174 | (4) |
|
|
178 | (1) |
|
|
178 | (1) |
|
Hardening Hardware and Software |
|
|
179 | (4) |
|
MEC Infrastructure and Transport Security |
|
|
183 | (6) |
|
Securing Virtualized Deployments in 5G MEC |
|
|
189 | (9) |
|
|
198 | (12) |
|
Validating Both Read and Write Requests |
|
|
210 | (2) |
|
|
212 | (5) |
|
Real Scenario Case Study: MEC Threats and Their Mitigation |
|
|
217 | (2) |
|
|
219 | (4) |
|
|
223 | (5) |
|
|
228 | (3) |
|
|
231 | (2) |
|
|
233 | (1) |
|
Chapter 6 Securing Virtualized 5G Core Deployments |
|
|
234 | (64) |
|
A Brief Evolution of Virtualization in Telecommunications |
|
|
235 | (5) |
|
Threats in Virtualized 5G Packet Core Deployments |
|
|
240 | (2) |
|
5GC Container Vulnerabilities |
|
|
242 | (3) |
|
Insecure Container Networking |
|
|
245 | (7) |
|
Container Host and HW Vulnerabilities |
|
|
252 | (5) |
|
Securing Virtualized 5G Packet Core Deployments |
|
|
257 | (1) |
|
|
257 | (8) |
|
Securing 5GC NFs and 5GC NF Traffic |
|
|
265 | (6) |
|
Securing 5GC NF Orchestration and Access Controls |
|
|
271 | (6) |
|
Securing 5GC CNF in Roaming Scenarios |
|
|
277 | (2) |
|
Securing the Host OS and Hardware |
|
|
279 | (2) |
|
Real Scenario Case Study: Virtualized 5GC Threats and Mitigation |
|
|
281 | (1) |
|
|
282 | (3) |
|
|
285 | (5) |
|
|
290 | (4) |
|
|
294 | (2) |
|
|
296 | (2) |
|
Chapter 7 Securing Network Slice, SDN, and Orchestration in 5G |
|
|
298 | (78) |
|
Network Slicing and Its Enablers--SDN and Orchestration |
|
|
299 | (10) |
|
Threat Surfaces in 5G Network Slice, SDN, and Orchestration Deployments |
|
|
309 | (3) |
|
Threats in the SDN Controller Layer |
|
|
312 | (4) |
|
Threats in the SDN Data Plane |
|
|
316 | (2) |
|
Threats in Orchestration Layer |
|
|
318 | (1) |
|
Insufficient Slice-Level Isolation |
|
|
319 | (3) |
|
Threats in NSaaS Deployments |
|
|
322 | (5) |
|
|
327 | (1) |
|
|
327 | (1) |
|
|
328 | (3) |
|
Securing the Software-Defined Network (SDN) |
|
|
331 | (5) |
|
Mitigating Data Exfiltration |
|
|
336 | (1) |
|
|
337 | (8) |
|
Securing NSaaS Deployments |
|
|
345 | (10) |
|
Real Scenario Case Study: Threats in the 5G Network Slice, SDN, and Orchestration Deployments and Their Mitigation |
|
|
355 | (3) |
|
|
358 | (8) |
|
|
366 | (3) |
|
|
369 | (3) |
|
|
372 | (2) |
|
|
374 | (2) |
|
Chapter 8 Securing Massive ioT Deployments in 5G |
|
|
376 | (48) |
|
Massive loT-Based Threats in 5G |
|
|
380 | (2) |
|
Device Vulnerabilities Due to Weak Built-in Security |
|
|
382 | (9) |
|
Securing mloT Deployments in 5G Networks |
|
|
391 | (1) |
|
Built-in Hardening of the Device |
|
|
392 | (22) |
|
Real Scenario Case Study: mloT Threats and Their Mitigation |
|
|
414 | (1) |
|
|
415 | (2) |
|
|
417 | (1) |
|
|
418 | (2) |
|
|
420 | (2) |
|
|
422 | (2) |
|
Chapter 9 Securing 5G Use Cases |
|
|
424 | (44) |
|
Secure 5G Smart Factory and Manufacturing |
|
|
425 | (4) |
|
Threats in 5G Smart Factory Deployments |
|
|
429 | (3) |
|
Securing the 5G Smart Factory |
|
|
432 | (3) |
|
Application-Level Security Controls |
|
|
435 | (2) |
|
|
437 | (1) |
|
|
437 | (4) |
|
Threats in the 5G-Enabled Energy Utility |
|
|
441 | (2) |
|
Securing 5G-Enabled Energy Utility |
|
|
443 | (4) |
|
5G Vehicle-to-Everything (5G-V2X) |
|
|
447 | (5) |
|
Threats in 5G-V2X Deployments |
|
|
452 | (5) |
|
Securing 5G-V2X Deployments |
|
|
457 | (6) |
|
Standards and Associations |
|
|
463 | (2) |
|
|
465 | (1) |
|
|
465 | (2) |
|
|
467 | (1) |
|
Part III End-to-End 5G Security Architecture and Prioritizing Security Investments |
|
|
|
Chapter 10 Building Pragmatic End-to-End 5G Security Architecture |
|
|
468 | (34) |
|
Foundations of 5G Security |
|
|
470 | (1) |
|
Securing 5G and Evolving Network Deployments |
|
|
471 | (1) |
|
|
471 | (1) |
|
Securing Consumers of 5G and Evolving Technologies |
|
|
472 | (1) |
|
Key Tenets of 5G Security Architecture |
|
|
472 | (1) |
|
|
473 | (1) |
|
Securing User and Device Access Using Zero-Trust Principles |
|
|
474 | (6) |
|
Secure Intra/lnter-Network Connectivity |
|
|
480 | (4) |
|
Application-Level Security |
|
|
484 | (5) |
|
Vulnerability Management and Forensics |
|
|
489 | (2) |
|
Enhanced Visibility, Monitoring, and Anomaly Detection |
|
|
491 | (3) |
|
|
494 | (3) |
|
|
497 | (1) |
|
|
497 | (1) |
|
|
498 | (3) |
|
|
501 | (1) |
|
Chapter 11 Prioritizing 5G Security Investments |
|
|
502 | (34) |
|
Method of Prioritizing Security Controls |
|
|
505 | (4) |
|
|
509 | (12) |
|
|
521 | (11) |
|
|
532 | (1) |
|
|
533 | (1) |
|
|
534 | (2) |
|
Part IV Emerging Discussions |
|
|
|
|
536 | (14) |
|
Adoption and Adaptability of 5G and Evolving Technologies |
|
|
537 | (2) |
|
Convergence of Wi-Fi and Evolving Cellular Technologies |
|
|
539 | (4) |
|
Use of Al and ML in Securing 5G and Evolving Networks |
|
|
543 | (3) |
|
Crypto Agility in 5G and Evolving Technologies |
|
|
546 | (2) |
|
|
548 | (1) |
|
|
548 | (2) |
References |
|
550 | (2) |
Index |
|
552 | |