A Comprehensive Guide to 5G Security -  - E-Book

A Comprehensive Guide to 5G Security E-Book

0,0
123,99 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: * Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it * Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks * Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views * Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, A Comprehensive Guide to 5G Security is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 909

Veröffentlichungsjahr: 2018

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

Title Page

The Editors

About the Contributors

Foreword

Preface

Acknowledgements

Part I: 5G Security Overview

1 Evolution of Cellular Systems

1.1 Introduction

1.2 Early Development

1.3 First Generation Cellular Systems

1.4 Second Generation Cellular Systems

1.5 Third Generation Cellular Systems

1.6 Cellular Systems beyond 3G

1.7 Fourth Generation Cellular Systems

1.8 Conclusion

References

2 5G Mobile Networks

2.1 Introduction

2.2 5G Requirements

2.3 5G Enabling Technologies

2.4 5G Standardization Activities

2.5 5G Research Communities

2.6 Conclusion

2.7 Acknowledgement

References

3 Mobile Networks Security Landscape

3.1 Introduction

3.2 Mobile Networks Security Landscape

3.3 Mobile Security Lifecycle Functions

3.4 Conclusion

References

4 Design Principles for 5G Security

4.1 Introduction

4.2 Overviews of Security Recommendations and Challenges

4.3 Novel Technologies for 5G Security

4.4 Security in SDN‐based Mobile Networks

4.5 Conclusions and Future Directions

4.6 Acknowledgement

References

5 Cyber Security Business Models in 5G

5.1 Introduction

5.2 The Context of Cyber Security Businesses

5.3 The Business Model Approach

5.4 The Business Case of Cyber Security in the Era of 5G

5.5 Business Model Options in 5G Cyber Security

5.6 Acknowledgement

References

Part II: 5G Network Security

6 Physical Layer Security

6.1 Introduction

6.2 WBPLSec System Model

6.3 Outage Probability of Secrecy Capacity of a Jamming Receiver

6.4 WBPLSec Applied to 5G networks

6.5 Conclusions

References

7 5G‐WLAN Security

7.1 Chapter Overview

7.2 Introduction to WiFi‐5G Networks Interoperability

7.3 Overview of Network Architecture for WiFi‐5G Networks Interoperability

7.4 5G‐WiFi Security Challenges

7.5 Security Consideration for Architectural Design of WiFi‐5G Networks

7.6 LiFi Networks

7.7 Introduction to LiFi‐5G Networks Interoperability

7.8 5G‐LiFi Security Challenges

7.9 Security Consideration for Architectural Design of LiFi‐5G Networks

7.10 Conclusion and Future Work

References

8 Safety of 5G Network Physical Infrastructures

8.1 Introduction

8.2 Historical Development

8.3 Structural Design Philosophy

8.4 Survey of Problems

8.5 Opportunities and Recommendations

8.6 Acknowledgement

References

9 Customer Edge Switching

9.1 Introduction

9.2 State‐of‐the‐art in Mobile Networks Security

9.3 CES Security Framework

9.4 Evaluation of CES Security

9.5 Deployment in 5G Networks

9.6 Conclusion

References

10 Software Defined Security Monitoring in 5G Networks

10.1 Introduction

10.2 Existing Monitoring Techniques

10.3 Limitations of Current Monitoring Techniques

10.4 Use of Monitoring in 5G

10.5 Software‐Defined Monitoring Architecture

10.6 Expected Advantages of Software Defined Monitoring

10.7 Expected Challenges in Software Defined Monitoring

10.8 Conclusion

References

Part III: 5G Device and User Security

11 IoT Security

11.1 Introduction

11.2 Related Work

11.3 Literature Overview and Research Motivation

11.4 Distributed Security Platform

11.5 Mobile Cloud Robot Security Scenarios

11.6 Conclusion

References

12 User Privacy, Identity and Trust in 5G

12.1 Introduction

12.2 Background

12.3 User Privacy

12.4 Identity Management

12.5 Trust Models

12.6 Discussion

12.7 Conclusion

References

13 5G Positioning

13.1 Introduction

13.2 Outdoor versus Indoor Positioning Technologies

13.3 Passive versus Active Positioning

13.4 Brief Overview of 5G Positioning Mechanisms

13.5 Survey of Security Threats and Privacy Issues in 5G Positioning

13.6 Main Privacy Concerns

13.7 Passive versus Active Positioning Concepts

13.8 Physical‐Layer Based Security Enhancements Mechanisms for Positioning in 5G

13.9 Enhancing Trustworthiness

13.10 Cryptographic Techniques for Security and Privacy of Positioning

13.11 Legislation on User Location Privacy in 5G

13.12 Landscape of the European and International Projects related to Secure Positioning

References

Part IV: 5G Cloud and Virtual Network Security

14 Mobile Virtual Network Operators (MVNO) Security

14.1 Introduction

14.2 Related Work

14.3 Cloudification of the Network Operators

14.4 MVNO Security

14.5 TaaS Deployment Security

14.6 Future Directions

14.7 Conclusion

References

15 NFV and NFV-based Security Services

15.1 Introduction

15.2 5G, NFV and Security

15.3 A Brief Introduction to NFV

15.4 NFV, SDN and a Telco Cloud

15.5 Common NFV Drivers

15.6 NFV Security: Challenges and Opportunities

15.7 NFV-based Security Services

15.8 Conclusions

References

16 Cloud and MEC Security

16.1 Introduction

16.2 Cloud Computing in 5G Networks

16.3 MEC in 5G Networks

16.4 Security Challenges in 5G Cloud

16.5 Security Challenges in 5G MEC

16.6 Security Architectures for 5G Cloud and MEC

16.7 5GMEC, Cloud Security Research and Standardizations

16.8 Conclusions

References

17 Regulatory Impact on 5G Security and Privacy

17.1 Introduction

17.2 Regulatory Objectives for Security and Privacy

17.3 Legal Framework for Security and Privacy

17.4 Security and Privacy Issues in New 5G Technologies

17.5 Relevance Assessment of Security and Privacy Issues for Regulation

17.6 Analysis of Potential Regulatory Approaches

17.7 Summary of Issues and Impact of New Technologies on Security and Privacy Regulation

References

Index

End User License Agreement

List of Tables

Chapter 01

Table 1.1 Structure of an authentication vector.

Table 1.2 Structure of AUTN field of an authentication vector.

Chapter 02

Table 2.1 5G key requirements and corresponding technology candidates.

Chapter 03

Table 3.1 4G Security Threat Analysis.

Table 3.2 5G security threat analysis.

Chapter 04

Table 4.1 Security challenges in SDN.

Chapter 05

Table 5.1 The basic characteristics of different types of cyber‐attack.

Table 5.2 The security needs for different scenarios.

Chapter 06

Table 6.1

C

s

scenario parameters.

Chapter 07

Table 7.1 Security issues in 5G Networks [13].

Table 7.2 Security issues in packet switched networks [13].

Chapter 08

Table 8.1 Reliability classification in accordance with Eurocodes for ULS.

Table 8.2 Reduction factor,

K

A

, for ancillary items.

Chapter 09

Table 9.1 CETP policy elements organized into groups.

Table 9.2 CES Security testing.

Table 9.3 Security mechanisms and their performance.

Chapter 10

Table 10.1 Legacy monitoring techniques vs software defined monitoring.

Table 10.2 Packet capture storage capacity.

Chapter 11

Table 11.1 Threats classification.

Chapter 12

Table 12.1 Potential threats between stakeholders.

Chapter 13

Table 13.1 Summary of main positioning technologies and their main positioning‐related features.

Table 13.2 Summary of positioning mechanisms in 5G.

Table 13.3 Summary of EU legal instruments.

Table 13.4 Summary of main EU and international projects somehow related to secure or privacy‐preserving positioning.

Chapter 14

Table 14.1 OPNFV security focus.

Table 14.2 TaaS security benchmark.

Chapter 17

Table 17.1 Summary of regulatory targets with Security and Privacy issues of high impact.

Table 17.2 Regulatory approaches for Security and Privacy.

List of Illustrations

Chapter 01

Figure 1.1 Growth of communication services encompassing the last decade.

Figure 1.2 GSM network architecture.

Figure 1.3 GSM authentication process.

Figure 1.4 The A3 algorithm.

Figure 1.5 Working principle of A3 algorithm.

Figure 1.6 The A8 algorithm.

Figure 1.7 The A5 algorithm.

Figure 1.8 UMTS Radio Access Network.

Figure 1.9 Overview of UMTS security architecture.

Figure 1.10 UMTS vs. LTE architecture.

Figure 1.11 LTE‐advanced E‐UTRAN architecture.

Figure 1.12 Authentication Process in LTE.

Chapter 02

Figure 2.1 Three main use case categories as defined by ITU in [7] and 3GPP in [8].

Figure 2.2 5G key requirements and some example values.

Figure 2.3 Millimeter‐wave bands and potential 5G bands to be studied ahead of WRC‐19.

Figure 2.4 An illustration of massive MIMO concept.

Figure 2.5 An illustration of small cells deployment.

Figure 2.6 (a) M2M communications and use case examples; and (b) D2D communications and use case examples.

Figure 2.7 (a) Cloud‐RAN concept and (b) RANaaS concept

Figure 2.8 Mobile Edge Computing architecture

Figure 2.9 (a) SDN architecture and (b) NFV architecture

Figure 2.10 An example of network slicing.

Figure 2.11 The illustration of the end‐to‐end multi‐domain management and orchestration.

Chapter 03

Figure 3.1 Mobile network security landscape.

Figure 3.2 Cell phone cloning attack in 1G network.

Figure 3.3 IMSI Catcher attack in 2G network.

Figure 3.4 4G end to end security threat landscape.

Figure 3.5 5G security threat landscape.

Figure 3.6 5G Evolved Security Model.

Figure 3.7 Mobile security lifecycle functions.

Chapter 04

Figure 4.1 5G design principles.

Figure 4.2 High‐Level 5G architecture integrating multiple access technologies.

Figure 4.3 An overview of the SDN architecture.

Figure 4.4 Secure network slices for different services.

Chapter 05

Figure 5.1 The business model’s definition

Figure 5.2 The 4C business model for ICT business

Figure 5.3 The relationship between the level of security and new revenue generation.

Figure 5.4 The users and issues in 5G security.

Figure 5.5 Scenarios for 5G security provisioning.

Figure 5.6 The 5G security arrangement landscape.

Figure 5.7 The business model options for cyber security in 5G.

Chapter 06

Figure 6.1 Block diagrams of the proposed protocol to analyze physical layer security.

Figure 6.2 iJAM’s operating principle.

Figure 6.3 Non‐degraded wiretap channel model with jamming receiver.

Figure 6.4 Transmitter structure for watermark‐based blind physical layer security.

Figure 6.5 Receiver structure for watermark‐based blind physical layer security.

Figure 6.6 Power spectra densities of proposed blind physical layer security.

Figure 6.7 Comparison between iJAM and WBPLSec.

Figure 6.8 Outage probability versus

γ

M

when Eve moves from Bob to Alice.

Figure 6.9 Protocol’s comparison of

Pout

versus

γ

M

for a selected Eve’s position.

Figure 6.10 Outage probability of the

Cs

versus

γ

M

varying the jamming energy when Eve is close to Bob.

Figure 6.11 Outage probability versus

γ

M

for different Eve’s positions.

Figure 6.12 Increment of the

M

γ

and its effect on the secure region size.

Figure 6.13 Outage probability as function of

.

Figure 6.14 WBPLSec applied to 5G network.

Figure 6.15 Enhancement of the WBPLSec security region in the context of cellular network.

Figure 6.16 Increment of the

γ

M

and its effect on the secure region size.

Chapter 07

Figure 7.1 Interoperability of WiFi with 5G Networks [3].

Figure 7.2 5G‐WiFi Interoperability at MAC layer.

Figure 7.3 5G‐WiFi Interoperability at the Network Layer.

Figure 7.4 5G‐WiFi interoperability at Transport layer.

Figure 7.5 5G‐WiFi interoperability at application layer.

Chapter 08

Figure 8.1 Examples of communication structures: (a) Monopole 50 metres high; (b) Lattice tower 50 metres high; and (c) Guyed mast 100 metres high.

Figure 8.2 Distribution of a sample of tower structures by typologies [3].

Figure 8.3 Structural health monitoring of a 45 metre high monopole: (a) General view; (b) Detail of the sensor on top; and (c) Interrogation monitor unit.

Figure 8.4 Force coefficients for three or four faces lattice structures with angle elements.

Figure 8.5 Inspection of a 30 metre high guyed mast: (a) Deterioration of the foundation; and (b) Corrosion of the cleavers.

Figure 8.6 Inspection of a 50 metre high monopole: (a) Planar imperfection; and (b) Defects in welded connections.

Figure 8.7 Inspection of a 40 metre high monopole: (a) Defects in welded connections and (b) Defects in welded connections.

Chapter 09

Figure 9.1 Customer Edge Switching.

Figure 9.2 Mobile network architecture.

Figure 9.3 CES Functionality comparison with NAT.

Figure 9.4 CETP signalling between two hosts in different CES networks.

Figure 9.5 RGW serving the connections from the legacy Internet.

Figure 9.6 Implementation of CES testbed.

Figure 9.7 CETP Connection setup delay.

Figure 9.8 Tackling DNS flood towards RGW.

Figure 9.9 Impact of inbound DNS query type (SFQDN) against versus network/ports scans.

Figure 9.10 Delay in assigning TCP half‐connection state due to TCP‐Splice.

Figure 9.11 Bot‐Detection method to mitigate SYN flood from botnets (non‐spoofed sources).

Figure 9.12 Security of SFQDN allocations against advanced hackers: (a) without; and (b) with RGW security.

Figure 9.13 CES deployment in 5G mobile networks.

Chapter 10

Figure 10.1 Software defined monitoring architecture for 5G Networks.

Figure 10.2 The deployment of the components of SDM architecture in a 5G Backhaul Network.

Figure 10.3 Benefits of network virtualization.

Figure 10.4 OpenStack monitoring based on TaaS.

Figure 10.5 Network descriptor.

Chapter 11

Figure 11.1 5G use cases and requirements [1].

Figure 11.2 5G IoT use case evolution.

Figure 11.3 IoT threats [17].

Figure 11.4 Attack scenario for robots belonging to a same brand.

Figure 11.5 Attack scenario for robots belonging to different brands.

Figure 11.6 Internet of robot security platform.

Figure 11.7 Detection dimensions.

Figure 11.8 Distributed security platform for robot with SIM.

Figure 11.9 Robot anomaly detection and mitigation procedure.

Figure 11.10 Robot authentication and sessions establishment.

Figure 11.11 Distributed security platform for SIMless robots.

Figure 11.12 Robot attack.

Figure 11.13 Robots roaming.

Chapter 12

Figure 12.1 Various elements in user privacy.

Figure 12.2 Actors/Entities in the trust model.

Figure 12.3 Evolution in the trust model.

Chapter 13

Figure 13.1 Illustration of the localization chain and players in the Location Based Services in 5G.

Figure 13.2 Positioning‐communication dichotomy in 5G: (a) cell‐ or network‐centric positioning; (b) device‐centric positioning; (c) cooperative positioning (device‐centric or network‐centric); (d) (network) or cell‐centric communication; and (e) device‐centric communication.

Figure 13.3 Principles of TOA, TDOA and AOA‐ based positioning: (a) Time of Arrival (TOA) trilateration; (b) Time Difference of Arrival (TDOA) hyperbolic positioning.

Figure 13.4 Example of TOA accuracy and principle of AOA‐based positioning: (a) Example of TOA accuracy versus bandwidth, CRLB bound; and (b) a linear antenna array in measuring the angle‐of‐arrival of an incoming signal.

Figure 13.5 Fingerprinting principle in 5G positioning.

Figure 13.6 Cloud‐GNSS positioning.

Figure 13.7 Brands and Chaum’s distance‐bounding protocol [101].

Figure 13.8 A privacy‐preserving LBSP based on FHE, which computes a position‐related function f(p) on fully homomorphically encrypted data without learning the end‐user’s position p.

Figure 13.9 Chart of steps toward location privacy protection.

Chapter 14

Figure 14.1 TaaS stack.

Figure 14.2 TaaS security classification.

Figure 14.3 Layer‐based SDN architecture.

Figure 14.4 AAA requirements for cloudified network.

Figure 14.5 Availability requirements for cloudified network.

Figure 14.6 Integrity requirements for cloudified network.

Figure 14.7 Security requirements for cloudified network.

Figure 14.8 Cloud security for operators.

Chapter 15

Figure 15.1 A simple view of NFV.

Figure 15.2 ETSI NFV reference framework.

Figure 15.3 5G Security and NFV.

Figure 15.4 NFV and SDN end-to-end reference.

Figure 15.5 A VNFs lifecycle.

Figure 15.6 A VNF

's trust relationship.

Figure 15.7 OPNFV reference platform for NFV.

Figure 15.8 vCPE example use case by OPEN-O integrated with OPNFV.

Figure 15.9 Example of GBP with NFV service chaining.

Chapter 16

Figure 16.1 A view of the cloud architecture.

Figure 16.2 Front‐end and back‐end view of the cloud architecture.

Figure 16.3 5G cloud computing architectures.

Figure 16.4 MEC system reference model.

Figure 16.5 MEC server platform.

Figure 16.6 Centralized security architecture for mobile clouds and MEC security.

Chapter 17

Figure 17.1 Approach to study the direct impact of new technologies on Security and Privacy Regulation.

Guide

Cover

Table of Contents

Begin Reading

Pages

iii

iv

xv

xvi

xvii

xix

xx

xxi

xxii

xxiii

xxiv

xxv

xxvi

xxvii

xxviii

xxix

xxxi

xxxiii

xxxiv

xxxv

xxxvi

xxxvii

xxxviii

xxxix

1

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

56

57

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

119

120

121

122

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

143

144

145

146

147

148

149

150

151

152

153

154

155

156

157

158

159

160

161

162

163

165

166

167

168

169

170

171

172

173

174

175

176

177

178

179

180

181

182

183

184

185

186

187

188

189

190

191

192

193

195

196

197

198

199

200

201

202

203

204

205

206

207

208

209

210

211

212

213

214

215

216

217

218

219

220

221

222

223

224

225

226

227

228

229

230

231

232

233

234

235

236

237

238

239

240

241

242

243

245

247

248

249

250

251

252

253

254

255

256

257

258

259

260

261

262

263

264

265

266

267

268

269

270

271

272

273

274

275

276

277

278

279

281

282

283

284

285

286

287

288

289

290

291

292

293

294

295

296

297

298

299

300

301

302

303

304

305

306

307

308

309

310

311

312

313

314

315

316

317

318

319

320

321

323

324

325

326

327

328

329

330

331

332

333

334

335

336

337

338

339

340

341

342

343

344

345

347

348

349

350

351

352

353

354

355

356

357

358

359

360

361

362

363

364

365

366

367

368

369

370

371

372

373

374

375

376

377

378

379

380

381

382

383

384

385

386

387

388

389

390

391

392

393

394

395

396

397

399

400

401

402

403

404

405

406

407

408

409

410

411

412

413

414

415

416

417

418

419

421

422

423

424

425

426

427

428

429

430

431

432

433

434

435

436

437

438

439

A Comprehensive Guide to 5G Security

Edited by

Madhusanka Liyanage

University of Oulu, Finland

Ijaz Ahmad

University of Oulu, Finland

Ahmed Bux Abro

VMware Inc., USA

Andrei Gurtov

Linköping University, Sweden

Mika Ylianttila

University of Oulu, Finland

This edition first published 2018© 2018 John Wiley & Sons Ltd

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.

The right of Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurto and Mika Ylianttila to be identified as the authors of the editorial material in this work has been asserted in accordance with law.

Registered OfficesJohn Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USAJohn Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK

Editorial OfficeThe Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, UK

For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.

Wiley also publishes its books in a variety of electronic formats and by print‐on‐demand. Some content that appears in standard print versions of this book may not be available in other formats.

Limit of Liability/Disclaimer of WarrantyWhile the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

Library of Congress Cataloging‐in‐Publication Data

Names: Liyanage, Madhusanka, editor. | Ahmad, Ijaz, 1985‐ editor. | Abro, Ahmed Bux, editor. | Gurtov, Andrei, editor. | Ylianttila, Mika, editor.Title: A Comprehensive guide to 5G security / edited by Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila.Description: Hoboken, NJ : John Wiley & Sons, 2018. | Includes index. | Identifiers: LCCN 2017040682 (print) | LCCN 2017047712 (ebook) | ISBN 9781119293088 (pdf) | ISBN 9781119293057 (epub) | ISBN 9781119293040 (cloth)Subjects: LCSH: Mobile communication systems–Security measures. | Wireless communication systems–Security measures.Classification: LCC TK5103.2 (ebook) | LCC TK5103.2 .C649 2018 (print) | DDC 005.8–dc23LC record available at https://lccn.loc.gov/2017040682

Cover Design: WileyCover Image: (Background) © cinoby/Gettyimages; (Lock overlay) © TCmake_photo/Gettyimages; (Towers) © Nikifor Todorov/Shutterstock; (Drone) © Robert Mandel/Shutterstock

The Editors

Madhusanka Liyanage

Centre for Wireless Communications, University of Oulu, Finland.

Madhusanka Liyanage received his BSc degree (First Class Honors) in Electronics and Telecommunication Engineering from the University of Moratuwa, Moratuwa, Sri Lanka, in 2009, his MEng degree from the Asian Institute of Technology, Bangkok, Thailand, in 2011, and his MSc degree from University of Nice Sophia Antipolis, Nice, France in 2011. In 2016, Liyanage received his PhD in Communication Engineering from the University of Oulu, Finland.

He is currently a post‐doctoral researcher and project manager at the Centre for Wireless Communications, University of Oulu, Finland. In 2011–2012, he was a research scientist at the I3S Laboratory and Inria, Sophia Antipolis, France. Also, he was a visiting research fellow at Data61, CSIRO, Australia, Infolabs21, Lancaster University, UK, Computer Science and Engineering, The University of New South Wales, Australia and department of computer science, University of Oxford, UK during 2016–2018. His research interests are SDN, IoT, Block Chain, mobile and virtual network security. He is a member of IEEE and ICT.

Madhusanka is a co‐author of over 40 publications including one edited book with Wiley. He is also a management committee member of EU COST Action IC1301, IC1303, CA15107, CA15127 and CA16226 projects. URL: http://madhusanka.com

Ijaz Ahmad

Centre for Wireless Communications, University of Oulu, Finland.

Ijaz Ahmad received his BSc degree in Computer Systems Engineering from the University of Engineering and Technology (UET), Peshawar, Pakistan. He completed his MSc (Technology) degree of Wireless Communications Engineering with a major in Telecommunications Engineering from the University of Oulu, Finland in 2012. After working as a research assistant in the Centre for Wireless Communications, he started his PhD at the University of Oulu, Finland in 2013.

Ijaz has received several awards including the Nokia Foundation Grant Awards, the Tuano Tonning Foundation Research Grant Awards, and the Achievement award as Inventor from University of Oulu, Finland, for excellent research during his PhD. He has contributed to over 20 publications including high impact factor journal articles, conference papers and book chapters. His research interest includes SDN, SDN‐based mobile networks, AI for networking, network security, and network load balancing.

Ahmed Bux Abro

VMware Inc. USA.

Ahmed Abro received his Bachelor degree in Computer Science in 1999 from the Shah Abdul Latif University and his Masters degree in Computer Science and Information Technology in 2002 from the University of Sindh with exceptional grades, he is currently a doctorate student at University of Wisconsin‐Whitewater, USA. He holds top level professional recognitions and certifications from various industry leaders such as Cisco, IBM, ISC2, Juniper, VMware. A few to name here: CCDE (Cisco Certified Design Expert), CCIE (Cisco Certified Internetwork Expert) Security, VMware Certified Implementation Expert (VCIX), and CISSP (Certified Information Systems Security Professional).

Ahmed is a technologist, strategist and contributor in multiple technology fronts such as software‐defined networking, security, cloud and data center. He has 16 years of widespread experience with focus around designing and architecting networks, cloud and virtualized data centers for Fortune 100 customers in diverse markets (North America, EMEA, Asia) and various industry sectors. Currently, he is playing a staff solution architect role at VMware, where part of his job is to help customers transform their legacy business into a digital business and legacy IT into a software‐defined enterprise IT using an architecture led approach.

He has contributed in his current and previous role for various new frameworks, architectures and standards around Cloud, Network Function Virtualization, SDN and Security. Ahmed is a chapter co‐author of a book on Software Defined Mobile Networks (SDMN), multiple drafts and research papers on the topic of SDN, security and mobility for IEEE and IETF organizations.

Andrei Gurtov

Department of Computer and Information Science, Linköping University, Sweden.

Andrei Gurtov received his MSc in 2000 and his PhD in 2004 in Computer Science from the University of Helsinki, Finland. He is presently a Professor in Linköping University, Sweden. He is also an adjunct professor at Aalto University, University of Helsinki and University of Oulu. He visited ICSI in Berkeley multiple times. He is an ACM Distinguished Scientist, IEEE ComSoc Distinguished Lecturer and Vice Chair of IEEE Finland section. Andrei co‐authored about 200 publications, including 4 books, 5 IETF RFCs, 6 patents, over 50 journal and 100 conference articles. He supervised 12 PhD theses, serves as an editor of IEEE Internet of Things. URL: http://gurtov.com

Mika Ylianttila

Centre for Wireless Communications, University of Oulu, Finland.

Mika Ylianttila is a full‐time professor at the Centre for Wireless Communications (CWC), at the Faculty of Information Technology and Electrical Engineering (ITEE), University of Oulu, Finland. Previously he was the director of the Center for Internet Excellence (2012–2015) and associate director of the MediaTeam research group (2009‐2011), and professor (pro tem) in Information Networks (2005–2010). He is also adjunct professor in Computer Science and Engineering (since 2007). He received his doctoral degree on Communications Engineering at the University of Oulu in 2005. He co‐authored more than 100 international peer‐reviewed articles on broadband communications networks and systems, including aspects on network security, mobility management, distributed systems and novel applications. His research interests include 5G applications and services, software‐defined networking and edge computing. He is a Senior Member of IEEE, and Editor of Wireless Networks journal. URL: http://www.ee.oulu.fi/~over/

About the Contributors

Abdur Rashid Sangi served as Software Engineer/Product Manager in Hisense International Co. Ltd, Qingdao, China and was Assistant Manager, I.T. in the public sector R&D, Karachi, Pakistan. He received a Bachelor’s degree in Computer Science and Engineering from Shah A. Latif University, Khairpur, Pakistan and his Master’s degree in Communication Networks from Bahria University, Karachi Campus, Pakistan. He was awarded with full‐scholarship and finished his PhD in Communication Network Security from Beijing University of Aeronautics and Astronautics (Beihang), China. Currently he is a Senior Engineer in the Huawei R&D center, Beijing, China. His current research interests include IoT security, Contiki, 6LoWPAN and Routing Protocol optimization and design.

Alessandro Piva (SMIEEE) received his MS degree in Electronics Engineering and his PhD in Computer Science and Telecommunications Engineering from the University of Florence, in 1995 and 1999, respectively. He is Associate Professor at the Department of Information Engineering of the University of Florence. His research interests lie in the areas of Information Forensics and Security, including data hiding, signal processing in the encrypted domain, and multimedia forensics, and Image and Video Processing. In the above research topics he has been co‐author of more than 40 papers published in international journals and 100 papers published in international conference proceedings. He is currently a Senior Area Editor of the Journal of Visual Communication and Image Representation, Associate Editor of IEEE Transactions on Dependable and Secure Computing and EURASIP Journal on Information Security.

An Braeken obtained her MSc Degree in Mathematics from the University of Ghent in 2002. In 2006, she received her PhD in engineering sciences from the KU Leuven at the research group COSIC (Computer Security and Industrial Cryptography). In 2007, she became professor at Erasmushogeschool Brussels (currently since 2013, Vrije Universiteit Brussel (VUB)) in the Industrial Sciences Department. Her current interests include security protocols for sensor networks.

Anette Alén‐Savikko is a postdoctoral researcher at the Faculty of Law, University of Helsinki and University of Lapland. Her research covers new media, digitization, intellectual property (IP) and data protection while she is particularly interested in EU law dimensions thereof. Anette has published and been involved in numerous projects in the fields of media law, IP and data protection law, with her research interests currently including human centered models of personal data management. In addition, Anette has provided national expertise with regard to her areas of interest. She is currently involved in the Academy‐funded project “Information Security of Location Estimation and Navigation Applications (INSURE)”.

Anna Brunstrom received her BSc in Computer Science and Mathematics from Pepperdine University, CA, in 1991, and her MSc and PhD in Computer Science from the College of William & Mary, VA, in 1993 and 1996, respectively. She joined the Department of Computer Science at Karlstad University, Sweden, in 1996, where she is currently a Full Professor and Research Manager for the Distributed Systems and Communications Research Group. Her research interests include transport protocol design, techniques for low latency Internet communication, cross‐layer interactions, multi‐path communication and performance evaluation of mobile broadband systems. She has led several externally funded research projects within these areas and served as the principal investigator and coordinator from Karlstad University (KaU) in additional national and international projects. She is currently the KaU principal investigator within two EU H2020 projects, the NEAT project aiming to design a new, evolutive API and transport‐layer architecture for the Internet, and the MONROE project proposing to design and operate a European transnational open platform for independent, multi‐homed, large‐scale monitoring and assessment of mobile broadband performance. She is a co‐chair of the RTP Medi Congestion Avoidance Techniques (RMCAT) working group within the IETF. She has authored/coauthored 10 book chapters and over 100 international journal and conference papers.

Bengt Sahlin received his MSc in Computer Science from Aalto University (former Helsinki University of Technology (TKK)). At TKK, he has also lectured on Modern Data Communications as well as on DNS and DNS security. He is a Certified Information Systems Security Professional (CISSP). Bengt has worked in the fields of data‐ and telecommunications for 19 years, mostly with security aspects. In 2000, he joined Ericsson where he has worked on mobile systems security and product security. He was also technical coordinator for Ericsson’s security implementation projects, and is now a manager of a security research group within Ericsson. Bengt Sahlin was 3GPP TSG SA WG3 chairman 2010–2013.

Chang Liu received a BS degree in Electronic Information Engineering from Dalian Maritime University, Dalian, China, in 2012. He is currently pursuing his PhD in the School of Information and Communication Engineering, Dalian University of Technology, China. From 2015 to 2016, he was a visiting scholar in Department of Electrical Engineering and Computer Science at University of Tennessee, Knoxville, USA. His research interests include Spectrum Sensing in Cognitive Radio, Statistical Signal Processing, Random Matrix Theory, Array Signal Processing and 5G networks.

Edgardo Montes de Oca graduated in Engineering in 1985 from Paris XI University, Orsay. He has worked as a research engineer in the Alcatel Corporate Research centre in Marcoussis, France and in Ericsson’s Research centre in Massy, France. In 2004, he founded Montimage, and is currently its CEO. He is the originator and main architect of MMT (Montimage Monitoring Tool). His main interests are future networks (SDN/NFV), network and application monitoring and security, detection and mitigation of cyber attacks, and building critical systems that require the use of state‐of‐the‐art fault‐tolerance, testing and security techniques. He has participated in several EU and French national research projects (e.g. CelticPlus‐MEVICO, SIGMONA and SENDATE; H2020‐SISSDEN; ANR‐DOCTOR). He is a member of NetWorld2020 and has published many papers and book chapters on SDN/SVN, testing, network monitoring, network security and performance.

Elena Simona Lohan received her MSc degree from the Polytechnic University of Bucharest (1997), a DEA degree at Ecole Polytechnique, Paris (1998), and her PhD in Wireless Communications from Tampere University of Technology (TUT) (2003). She is now an Associate Professor at TUT and has been a Visiting Professor at the Universitat Autonoma de Barcelona since 2012. She is the group leader for the signal processing for wireless positioning group at TUT. Her current research interests include wireless location techniques based on Signals of Opportunity, wireless navigation receiver architectures and multipath mitigation, and cognitive, privacy and security aspects related to user positioning. She is currently a working package leader in the Academy‐funded project “Information Security of Location Estimation and Navigation Applications (INSURE)”.

Fahad T. Bin Muhaya is a full Professor at Management Information Systems (MIS) Department, Business Administration College at King Saud University, Riyadh, Saudi Arabia. He co‐founded the Center of Excellence in Information Assurance (CoEIA) and was appointed as a vice director of the Center. In addition, he was appointed as the Director of His Royal Highness Prince Muqrin Chair (PMC) for IT Security, which is the first research Chair in IT Security in the region. Meanwhile, he has served as department Chairman several times and also has served as a Dean. Bin Muhaya is a part‐time Information Security Consultant for several government departments and national and international companies. Also he is a member of several scientific societies and founder and board council members of others.

Faisal Rehman is currently working on a research project at the University of Oulu, Finland, which is about the radio wave propagation issues through selective windows. Before working at the University of Oulu, he worked in the telecommunications field for almost 5 years, particularly in RF and optimization of mobile cellular networks. He also worked at transmission and switching departments of a PSTN. He holds Bachelors and Master’s degrees in Telecommunications Engineering. His areas of interest include Radio Engineering, antennas, radio channels, and wireless networks.

Hammad Kabir is a doctoral student at the Department of Communication and Networking of Aalto University, Finland. His research focuses on intrusion detection, network security, mobile network, SDN and policy management.

Heidi Kuusniemi is a professor and director at the Department of Navigation and Positioning at the Finnish Geospatial Research Institute (FGI). She is also an Adjunct Professor at Aalto University, Department of Real Estate, Planning and Geoinformatics, and at Tampere University of Technology, Department of Electronics and Communications Engineering, Finland. She is the President of the Nordic Institute of Navigation. She received her MSc and DSc(Tech.) degrees from Tampere University of Technology, Finland, in 2002 and 2005, respectively. In 2003–2004, she was a visiting researcher at the University of Calgary, Canada, and in the beginning of 2017 a visiting scholar at Stanford University, USA. Kuusniemi's research interests cover various aspects of GNSS and sensor fusion for seamless outdoor/indoor positioning, especially reliability monitoring and information security in positioning. She is the Coordinator of the Academy‐funded project “Information Security of Location Estimation and Navigation Applications (INSURE)”.

Helena Leppäkoski received her MSc degree in 1990 and her PhD in 2015 from Tampere University of Technology (TUT). She was with Metso Corporation, Helsinki, Finland, from 1990 to 2000 and joined TUT in 2000, where she is currently a Postdoctoral Researcher. Her research topics have varied from satellite positioning to various methods for pedestrian indoor positioning and machine learning for location related context inference. Currently she is working on a project on information security of location estimation and navigation applications. She is currently involved in the Academy‐funded project “Information Security of Location Estimation and Navigation Applications (INSURE)”.

Hoang Long MAI received a double degree in Engineering in Information Risk’s Management and his Master’s degree in Information Systems Security from University of Technology of Troyes in 2016. He is currently a PhD student in a CIFRE (Industrial Convention of Formation by Research) contract between Montimage France, University of Technology of Troyes and INRIA Lorraine. His PhD topic is focused on the Autonomous Monitoring and Control of Virtualized Network Functions for security and with an application to Named Data Networking.

Jan Melén is a Research Leader of Network Architecture group at Ericsson Research in Jorvas, Finland. He has over 15 years background on network protocol research and standardisation in the area of IP, mobility, routing and network architectures. Recently, Jan has done research on Internet‐of‐Things (IoT) and Machine‐to‐Machine (M2M) related topics on network design and architecture. He has participated and contributed to IETF and 3GPP standardisation and has had active role in Finnish strategic research agendas related to the field of IoT and future networks.

Jari Iinatti (SMIEEE) received his MSc and DTech degrees in electrical engineering from the University of Oulu, Finland, in 1989 and 1997, respectively. During 1989–1997, he was a Research Scientist at the Telecommunication Laboratory at the University of Oulu. During 1997–2002, he was an acting professor of Digital Transmission Techniques, and since 2002, Professor of Telecommunication Theory at Centre for Wireless Communications at the University of Oulu. He is also an IAS Visiting Professor at Yokohama National University, Yokohama, Japan. His research interests include future wireless communications systems, transceiver algorithms, wireless body area networks (WBANs) and medical ICT. He published more than 200 journal and conference papers and holds 6 patents. He supervised 13 Doctoral Theses and 64 Master’s Theses. He has been a TPC member at about 30 conferences, and he was a TPC chair in the ISMICT2007, TPC co‐chair in PIMRC2006, BodyNets2012 and PIMRC 2014, general co‐chair in the ISMICT2011, 2014–2017.

Javid Taheri received his Bachelor and Masters degrees in Electrical Engineering from the Sharif University of Technology in 1998 and 2000, respectively. He received his PhD in the field of Mobile Computing from the School of Information Technologies at the University of Sydney, Australia. He is currently working as Associate Professor in the Department of Computer Science in Karlstad University, Sweden.

Jesus Llorente Santos is a doctoral student at the Department of Communication and Networking of Aalto University, Finland. His research focuses on mobile networks, software defined networking (SDN) and future internet architectures.

João André obtained his Diploma in Civil Engineering and his MSc in Structural Engineering from the Instituto Superior Técnico (part of University of Lisbon), and his PhD in Structural Engineering from Oxford Brookes University. He worked as a Professor for two years in the Universidade Lusófona, teaching courses on steel and reinforced concrete structures. He has been working in the Structures Department of the Portuguese National Laboratory Civil Engineering (LNEC) since 2005, where he currently serves as a Postdoctoral Research Fellow. He has published over 30 papers over a wide range of subjects, ranging from numerical and experimental analyses, robustness and risk analyses. He was appointed a member of the project team responsible for defining the “Robustness Framework” for the revision of the European Structural Eurocodes and he is the National Expert of WG6 of CEN/TC250. He is currently working in two European COST Action research projects concerning communication and bridge structures.

Jude Okwuibe received his BSc in Telecommunications and Wireless Technologies from the American University of Nigeria, Yola, in 2011. After graduation, he worked as a recruitment specialist with the American University of Nigeria for about a year before going for one year’s National Service where he served as an assistant instructor teaching computer science. In 2015, Okwuibe received his Master’s degree in Wireless Communications Engineering from the University of Oulu, Finland. Okwuibe is currently doing a doctoral program in Communications Engineering at the University of Oulu Graduate School (UniOGS), Finland. His research interests are 5G and future networks, IoT, SDN, Network security, and biometric verifications.

Jukka Salo received his MSc in Electrical Engineering at the University of Oulu in 1976, and joined Nokia Corporation in 1977, where he since then until the retirement in late 2016 held different positions in the research and product development of Nokia’s network systems. In 2008‐2012, Jukka Salo was a Steering Board member in a Finnish Strategic Centre for Science, Technology and Innovation in the Field of ICT (TIVIT). In 2008–2016, he was Nokia’s representative in the Celtic (EUREKA cluster) Core Group and the Vice‐chairman of Celtic. Celtic is an industry‐driven European research initiative to define, perform and finance through public and private funding common research projects in the area of telecommunications. Jukka Salo was also involved in Policies, Governance and Regulation related research work in several international projects, including 4WARD (EU FP7), SAIL (EU FP7), MEVICO (EUREKA Celtic) and SIGMONA (EUREKA Celtic).

Julius Francis Gomes is pursuing his PhD in International Business from the University of Oulu. He currently works at the Oulu Business School as a Doctoral Student to research the futuristic business models for entities which will be involved in the tech‐oriented business arena. His research focuses on using business models as a means to look into future industries. He is interested to research business ecosystems in different contexts, such as cyber security, healthcare, future’s network, etc. with a business model perspective. He received his MSc (2015) in International Business from the University of Oulu. Prior to that, he acquired an MBA in 2011, specializing in managing information systems in business applications. Francis Gomes has enjoyed three years in a top tier bank in Bangladesh as a channel innovator.

Karl‐Johan Grinnemo received his MSc in Computer Science and Engineering from the Linköping Institute of Technology, Sweden, in 1994. In 2006, he received his PhD in Computer Science from Karlstad University, Sweden. He worked almost 15 years as an engineer in the telecom industry; first at Ericsson and then as a consultant at Tieto. A large part of his work has been related to Ericsson’s signaling system in the mobile core and radio access network. From the Fall of 2009 until the Fall of 2010, he was on leave from Tieto and worked as acting Associate Professor at the School of Information and Communication Technology, KTH Royal Institute of Technology. Between the Fall of 2010 and the Fall of 2014, he was an Associate Senior Lecturer at Karlstad University, and became a Senior Lecturer in the Fall of 2014. His research primarily targets application‐ and transport‐level service quality. He has authored and co‐authored around 40 conference and journal papers, and is a Senior member of IEEE.

Kimmo Järvinen received his MSc (Tech) degree in 2003 and the DSc (Tech.) degree in 2008 from Helsinki University of Technology (TKK), Finland. He was with the Signal Processing Laboratory at TKK from 2002 to 2008. In 2008–2013 and again in 2015–2016, he was a postdoctoral researcher in the Department of (Information and) Computer Science, Aalto University, Finland. In 2014/2015, he was with the COSIC group of KU Leuven ESAT, Belgium. Since November 2016, he is a senior researcher in the Department of Computer Science, University of Helsinki, Finland. His research interests lie in the domains of security and cryptography, especially in developing efficient and secure implementations of cryptosystems. He has authored more than 40 peer‐reviewed scientific publications. He is currently a working package leader in the Academy‐funded project “Information Security of Location Estimation and Navigation Applications (INSURE)”.

Lauri Isotalo received his MSc from Helsinki University of Technology (currently Aalto University) in 1992. He also has a postgraduate Diploma in Business Administration. At first, Lauri worked in Nokia Corporation in the Mobile Technology & System Marketing unit, specializing in Intelligent Networks. In 1992, he joined the Elisa Corporation, where he has held several managerial positions in value‐added services business, system and process security and mobile network development. Since 2005, Lauri has also led Elisa SME teams in various international collaboration projects and acquired a deep knowledge of the cyber security of legacy telecommunication networks, in core, access networks, user terminals and modern virtualized data center IT platforms/cloud systems. From 2014, Lauri has headed SDN&NFV development in Elisa.

Liang Chen is a Senior Research Scientist in the Department of Navigation and Positioning at the Finnish Geospatial Research Institute (FGI), Finland. Before he joined FGI, he worked in the Department of Mathematics at Tampere University of Technology, Finland from 2009 to 2011. He received his PhD in Signal and Information Processing from Southeast University, China, in 2009. His research interests include statistical signal processing for positioning, wireless positioning using signals of opportunity and sensor fusion algorithm for indoor positioning. He is currently involved in the Academy‐funded project “Information Security of Location Estimation and Navigation Applications (INSURE)”.

Lorenzo Mucchi (SMIEEE) received his D.Eng. degree (Laurea) in Telecommunications Engineering from the University of Florence, Italy in 1998 and his PhD in Telecommunications and Information Society in 2001. Since 2001, he has been with the Department of Information Engineering of the University of Florence as a Research Scientist. He is a Professor of Information Technologies at the University of Florence since 2008. His main research areas include theoretical modeling, algorithm design and real measurements, mainly focused on the fields of physical‐layer security, visible light communications, spread spectrum techniques, localization, and interference management. Dr Mucchi is an associate editor (2016) of IEEE Communication Letters. He is also a member of the European Telecommunications Standard Institute (ETSI) Smart Body Area Network (SmartBAN) group (2013) and team leader (2016) of the special task force 511 “SmartBAN Performance and Coexistence Verification”. More details: http://www.lorenzomucchi.info/

Marika Iivari is a postdoctoral researcher at the Martti Ahtisaari Institute within the Oulu Business School. She defended her doctoral dissertation on business models in ecosystemic contexts. She received her MSc in International Business from the Ulster University, Northern Ireland. Her research interests are in the areas of open innovation, business models and strategy in the context of innovation ecosystems and smart cities, digital and ICT business ecosystems. She has been involved in several research projects around 5G and the Internet of Things, most recently in the healthcare sector. She is also an active member of the Business Model Community, the Open Innovation Community and the Society for Collaborative Networks.

Matti Hämäläinen (SMIEEE) received his MSc and DSc degrees in 1994 and 2006, respectively, from the University of Oulu, Finland. He contributed to more than 160 international scientific journal and conference publications. He is a co‐author of “Wireless UWB Body Area Networks – Using the IEEE802.15.4‐2011”, Academic Press and co‐editor of “UWB: Theory and Applications”, Wiley & Sons. He holds one patent. Currently he is a University Researcher and Adjunct Professor at Centre for Wireless Communications, University of Oulu, Finland and IAS Visiting Professor at Yokohama National University, Yokohama, Japan. He is a member of External Advisory Board of Macquarie University's WiMed Research Centre, Australia and International Steering Committee of International Symposium on Medical ICT. Dr Hämäläinen is also a contributor of ETSI TC SmartBAN. His research interests are in UWB systems, wireless body area networks and medical ICT.

Mehrnoosh Monshizadeh is finalizing her PhD in Telecommunication Networking at the Electrical School of Aalto University, Finland. She is working as a research security specialist at Nokia Bell Labs, Finland. Her research interests include cloud security, mobile network security, IoT security and data analytics.

Mikel Uriarte Itzazelaia received his BSc and MSc degrees in Telecommunication Engineering in 1998 from the University of the Basque Country (UPV/EHU). He spent one year in public R&D in Telecommunications enterprise (currently Tecnalia). From 1998 to the present, he worked at Nextel S.A., a telecommunications enterprise providing ICT engineering and consulting services. From 2001 to 2006, he worked as ICT director and as an information security lead auditor, subsequently becoming the head of the research and development unit. His research interests include ICT interoperability, resilience, performance and security in several areas such as identity and access control, networking, wireless sensing and cloud computing.

Mohammed Alkatheiri is an assistant professor in the Department of Computer Science, College of Computing and Information Technology, University of Jeddah, Saudi Arabia. Currently, he is a chair of the Information Technology Department. His current research interest focuses on the area of information security. Previously, he worked as a researcher in the Center of Excellence in Information Assurance at the King Saud University, Riyadh, Saudi Arabia. His research interest focusing on security and privacy related issues of information sharing, identification, and authentication. Also, he served as consultant for national projects and joined Prince Muqrin Chair for Information Security Technology (PMC) along with government departments on National Information Security Strategy project as a security consultant.

Oscar López Perez received his BSc in Telecommunication Engineering from the Polytechnic University of Catalonia in 1998. After finishing his studies, he worked in a technical school teaching different IT subjects in an Associate degree. In 2000, he joined Nextel S.A, covering different stages as technical, auditor and later providing consultancy services in ICT and cyber security. Since 2008, he has been working as a R&D researcher, participating in national and European research projects. His research work has been related to the evaluation of the operational security assurance, and in other initiatives such as enforcing security policies and in the result of an adequate security monitoring in different application environments.

Päivi Korpisaari is a professor in Communication Law at the Faculty of Law, University of Helsinki. She completed her Master of Laws in 1993, defended her Licentiate in 2000 and her Doctor of Law degree in 2007 from the University of Helsinki. She was appointed communications law professor at the University of Helsinki in 2014. Her research interests are in personal data protection law, freedom of expression, privacy, media law and communications law. She is currently a working package leader in the Academy‐funded project “Information Security of Location Estimation and Navigation Applications (INSURE)” and TEKES‐funded project MyGeoTrust.

Petri Ahokangas received his MSc (1992) and DSc (1998) degrees from the University of Vaasa, Finland. He is currently Adjunct Professor (International software entrepreneurship) and Senior research fellow at Martti Ahtisaari Institute, Oulu Business School, University of Oulu, Finland. His research interests are in how innovation and technological change affect international business creation, transformation, and strategies in highly technology‐intensive or software‐intensive business domains. He has over 100 publications in scientific journals, books, conference proceedings, and other reports. He is actively working in several ICT‐focused research consortia leading the business‐related research streams.

Raimo Kantola is a Doctor of Science in Technology. He is a full, tenured professor of networking technology at the Department of Communications and Networking of Aalto University. After 15 years in Nokia Networks in positions in R&D and marketing, he joined Helsinki University of Technology as a professor in 1996 and was tenured in 2006. Professor Kantola’s recent research is in trust in networks and customer edge switching. He has held many positions of trust at Helsinki University of Technology and Aalto University.

Rui Travanca has a Diploma in Civil Engineering and an MSc in Structural Engineering. Rui has a strong background within the telecommunication industry, which includes more than ten years working as a Civil Engineer and an Independent Engineering Consultant for major telecommunication operator companies. Rui is deeply involved in research, in structural engineering subjects, and has conducted several research works in the field of the structural behaviour of communication structures, mainly using structural health monitoring techniques. Main fields of interest/research are wind‐sensitive structures, earthquake engineering, structural behaviour, structural simulation, numerical model calibration, dynamic analysis, structural health monitoring, optical sensors and wind tunnel testing.

Sadiqur Rahaman is completing his Master’s degree in Wireless Communication Engineering in University of Oulu, Finland. Before that, he had taken his bachelor’s degree in Electrical and Electronic Engineering and an MBA in Management Information Systems. He has published a number of international conference papers. His research interest lies in the field of antenna and radio engineering. He is currently working on a passive repeater for WLAN operation using various types of antenna and co‐axial cable.

Satish Anamalamudi received his BEng degree in Computer Science and Engineering from Jawaharlal Nehru Technological University, Hyderabad, India, MTech in Network and Internet Engineering from Karunya University, Coimbatore, India and his PhD in Communication and Information Systems from Dalian University of Technology, Dalian, China. He worked as a Research Engineer in Beijing Huawei Technologies, Beijing, China, from November 2015 to August 2016. He is currently working as Assistant Professor in the Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huaian, China. His research interests include common‐control‐channel design for MAC and routing protocols in cognitive radio ad hoc networks, MAC and routing protocol design of IoT and 5G networks.

Shahriar Shahabuddin received his BSc from the University of Dhaka, Bangladesh and his MSc from the University of Oulu, Finland in 2009 and 2012 respectively. Afterwards, he started his PhD under the supervision of Professor Markku Juntti in University of Oulu, Finland. During the spring of 2015, he worked at the Computer Systems Laboratory of Cornell University, USA, with Professor Christoph Studer. Shahriar received a distinction in his MSc and the best Master’s thesis award of the Department of Communications Engineering, University of Oulu in 2012. He is the recipient of several scholarships and grants, such as Nokia Foundation Scholarship, University of Oulu Scholarship Foundation Grant, and UniOGS travel grant.

Simone Soderi (SMIEEE) received his MSc degree in 2002 from the University of Florence, Italy and his DSc degree in 2016, from the University of Oulu, Finland. Dr Soderi has more than 14 years’ experience in embedded systems and safety related architectures. His skills range from electronic and electromagnetic compatibility to software engineering. During 2011–2014, he was a member of the Steering Committee of a joint research project between General Electric, Florence, Italy (GE) and the Centre for Wireless Communications, University of Oulu, Finland. During 2011–2015, he contributed in ETSI for ultra‐wideband (UWB) devices in road and rail vehicles. Currently he is Cybersecurity Manager at Alstom, Florence, Italy. His research topics include UWB, electromagnetic compatibility, cyber‐security for critical infrastructure systems and physical layer security. He has been TPC member of several conferences and served as reviewer of IEEE Transaction on Intelligent Transport Systems (ITS). Dr Soderi has published journal and conference papers, and various book chapters. He holds five patents regarding wireless communications and positioning.

Tanesh Kumar received his MSc degree in Computer Science from the South Asian University, New Delhi, India in 2014. Prior to that, he did his bachelors in Computer Engineering from the National University of Sciences and Technology (E&ME), Rawalpindi, Pakistan in 2012. Currently he is a doctoral student at the University of Oulu and a research scientist in the Centre for Wireless Communications (CWC), Oulu, Finland. His research interest includes IoT Security, Privacy in Hyperconnected Environment, Biometric Authentication and 5G security.

Van‐Giang Nguyen received his Bachelor’s degree in Electronics and Telecommunication Engineering from Hanoi University of Science and Technology, Vietnam in 2012 and his Master’s degree in Information and Telecommunication Engineering from Soongsil University, South Korea in 2015. From 2013 to 2015, he worked as a research assistant at the Distributed Computing Network (DCN) laboratory, Soongsil University. Since 2015, he has been working towards his PhD degree in Computer Networks and Telecommunications at the Department of Computer Science and is working as a research assistant at the Distributed System and Communications (DISCO) research group, Karlstad University, Sweden. His current research interests include SDN (software defined networking), NFV (network function virtualization), future mobile packet core network, open source networking and 5G networking. He is a student member of IEEE SDN.

Vikramajeet Khatri graduated with an MSc IT from the Tampere University of Technology, Finland. He is working as a research security specialist at Nokia Bell Labs, Finland. His research interests include intrusion detection, malware detection, IoT security and cloud security.

Wenjing Chu is a Distinguished Engineer and Senior Director of Open Source and Standards at Huawei in Santa Clara, CA. Prior to Huawei, he was a Chief Architect of NFV in VMWare, Inc. and a Distinguished Engineer in Dell Research, Santa Clara, CA, driving its NFV strategy and advanced research in High Velocity Cloud. His work at Dell focused on high performance networking and real‐time machine learning systems for the cloud. He is a Director of the Board for Open Platform for NFV (OPNFV) and was previously the Chair of the Compliance and Certification Committee and a member of the Technical Steering Committee. His long career in technology companies includes leading roles in startup multimedia network vendor Sentient Networks Inc. and enterprise Wi‐Fi pioneer Airespace, Inc. Wenjing received his BSc in Computer Science from Peking University, China and received his MSc in Computer Science from the University of British Columbia, Canada.

Zaheer Khan