Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Securing 5G and evolving architectures
Nair P., Addison-Wesley Professional, Boston, MA, 2021. 624 pp. Type: Book (978-0-137457-93-9)
Date Reviewed: Jun 9 2022

Security is an important aspect of architectures. Security analysis at the architecture level is very useful. Fifth-generation (5G) wireless networks have been in use for a few years now. Securing 5G network architecture has many challenges not present in fourth-generation (4G) wireless networks. This book provides an extensive analysis of 5G architectures. It is mainly written for professionals in wireless networks and can be used as a textbook in security courses.

Every chapter begins with a list of topics covered and a list of individuals/teams, so readers can identify their particular interests when choosing where to start. Each chapter ends with a summary, a list of acronyms used, and references. Many of the references are by the author himself, from Cisco, and some of them are standards and articles from 5G-related organizations.

Readers interested in more detail can read chapters 4 through 9; security domain content is discussed along with use cases. Readers starting from scratch should begin at chapter 1. A security-related introduction is first found in chapter 3. Motivational chapters 1 through 3 explain specific 5G architectural challenges with respect to security. The challenges are not only due to the way 5G is specified, but also its expected associations with modern technologies such as virtualization, the cloud, and Internet of Things (IoT) devices. For analysis purposes, standalone 5G and 5G mixed with 4G are distinguished. For each type of domain, architectures, possible threats for those architectures, ways to secure those architectures, and example use cases are described.

High-level architects can read chapter 10, which is on building end-to-end architectures secured for 5G. The identified security domains are 5G network components, devices attached to networks, and consumers. The chapter presents the tenets of 5G security architectures. Nation-state actors may use 5G architectures for supply chain management. The chapter gives some guidelines for cybersecurity agencies for securing against supply-chain-based threats. The zero trust principle is described for securing user and device access. The description includes zero trust security models for 5G and how to apply the principle for various architecture deployments. For securing inter/intra network connectivity, the chapter presents multilayer control architectures and provides checklists for various controls. For application-level security, it advocates an application-first security methodology and gives various requirements needed for vendors. It identifies key functional requirements for vulnerability management and forensics and describes monitoring architecture for security concerns related to end-to-end visibility. In the end, it briefly talks about security concerns due to 5G and 4G interoperability and 5G network slicing.

Chapter 11 describes a two-step method for prioritizing security controls. It practically shows the method being applied in two scenarios. Chapter 12 is on adaptabilities of architecture security for 5G and beyond.

Reviewer:  Maulik A. Dave Review #: CR147452 (2208-0106)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy