SlideShare a Scribd company logo
Evolution Of Softwaredefined Networking
Foundations For Iot And 5g Mobile Networks Sunil
Kumar Editor download
https://ebookbell.com/product/evolution-of-softwaredefined-
networking-foundations-for-iot-and-5g-mobile-networks-sunil-
kumar-editor-22812994
Explore and download more ebooks at ebookbell.com
Here are some recommended products that we believe you will be
interested in. You can click the link to download.
Successful Evolution Of Software Systems Hongji Yang Martin Ward
https://ebookbell.com/product/successful-evolution-of-software-
systems-hongji-yang-martin-ward-1399762
Successful Evolution Of Software Systems Hongji Yang Martin Ward
https://ebookbell.com/product/successful-evolution-of-software-
systems-hongji-yang-martin-ward-4121602
Software Visualization Visualizing The Structure Behaviour And
Evolution Of Software Stephan Diehl
https://ebookbell.com/product/software-visualization-visualizing-the-
structure-behaviour-and-evolution-of-software-stephan-diehl-975098
Security Compliance In Modeldriven Development Of Software Systems In
Presence Of Longterm Evolution And Variants Sven Matthias Peldszus
https://ebookbell.com/product/security-compliance-in-modeldriven-
development-of-software-systems-in-presence-of-longterm-evolution-and-
variants-sven-matthias-peldszus-44785646
Cyberpunk Stories Of Hardware Software Wetware Evolution And
Revolution Pat Cadigan
https://ebookbell.com/product/cyberpunk-stories-of-hardware-software-
wetware-evolution-and-revolution-pat-cadigan-4941802
Knowledge Organizational Evolution And Market Creation The
Globalization Of Indian Firms From Steel To Software Gita Sud De Surie
https://ebookbell.com/product/knowledge-organizational-evolution-and-
market-creation-the-globalization-of-indian-firms-from-steel-to-
software-gita-sud-de-surie-1383916
Informatics In Schools Fundamentals Of Computer Science And Software
Engineering 11th International Conference On Informatics In Schools
Situation Evolution And Perspectives Issep 2018 St Petersburg Russia
October 1012 2018 Proceedings 1st Ed Sergei N Pozdniakov
https://ebookbell.com/product/informatics-in-schools-fundamentals-of-
computer-science-and-software-engineering-11th-international-
conference-on-informatics-in-schools-situation-evolution-and-
perspectives-issep-2018-st-petersburg-russia-
october-1012-2018-proceedings-1st-ed-sergei-n-pozdniakov-7321028
Pragmatic Evaluation Of Software Architectures 1st Edition Jens Knodel
https://ebookbell.com/product/pragmatic-evaluation-of-software-
architectures-1st-edition-jens-knodel-5484922
Evaluation Of Novel Approaches To Software Engineering 17th
International Conference Enase 2022 Virtual Event April 2526 2022
Revised Selected Papers Hermann Kaindl
https://ebookbell.com/product/evaluation-of-novel-approaches-to-
software-engineering-17th-international-conference-enase-2022-virtual-
event-april-2526-2022-revised-selected-papers-hermann-kaindl-50813202
Evolution Of Softwaredefined Networking Foundations For Iot And 5g Mobile Networks Sunil Kumar Editor
Evolution of Software-
Defined Networking
Foundations for IoT and
5G Mobile Networks
Sunil Kumar
Amity University, Noida, India
Munesh Chandra Trivedi
National Institute of Technology, Agartala, India
Priya Ranjan
Amity University, Noida, India
Akash Punhani
Amity University, Noida, India
A volume in the Advances in
Wireless Technologies and
Telecommunication (AWTT) Book
Series
Published in the United States of America by
IGI Global
Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue
Hershey PA, USA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: cust@igi-global.com
Web site: http://www.igi-global.com
Copyright © 2021 by IGI Global. All rights reserved. No part of this publication may be
reproduced, stored or distributed in any form or by any means, electronic or mechanical, including
photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the
names of the products or companies does not indicate a claim of ownership by IGI Global of the
trademark or registered trademark.
			 Library of Congress Cataloging-in-Publication Data
British Cataloguing in Publication Data
A Cataloguing in Publication record for this book is available from the British Library.
All work contributed to this book is new, previously-unpublished material.
The views expressed in this book are those of the authors, but not necessarily of the publisher.
For electronic access to this publication, please contact: eresources@igi-global.com.
Names: Kumar, Sunil, 1986- editor. | Trivedi, Munesh Chandra, 1981- editor.
| Ranjan, Priya, editor. | Punhani, Akash, 1985- editor.
Title: Evolution of software-defined networking foundations for IoT and 5G
mobile networks / Sunil Kumar, Munesh Chandra Trivedi, Priya Ranjan, and
Akash Punhani, editors.
Description: Hershey, PA : Information Science Reference, an imprint of IGI
Global, [2021] | Includes bibliographical references and index. |
Summary: “This book contains research on the security challenges and
prevention mechanisms in high-speed mobile networks. The book explores
the threats to 5G and IoT and how to implement effective security
architecture for them”-- Provided by publisher.
Identifiers: LCCN 2020005540 (print) | LCCN 2020005541 (ebook) | ISBN
9781799846857 (hardcover) | ISBN 9781799854395 (paperback) | ISBN
9781799846864 (ebook)
Subjects: LCSH: Internet of things. | 5G mobile communication systems. |
Software-defined networking (Computer network technology)
Classification: LCC TK5105.8857 .E94 2021 (print) | LCC TK5105.8857
(ebook) | DDC 004.67/8--dc23
LC record available at https://lccn.loc.gov/2020005540
LC ebook record available at https://lccn.loc.gov/2020005541
This book is published in the IGI Global book series Advances in Wireless Technologies and
Telecommunication (AWTT) (ISSN: 2327-3305; eISSN: 2327-3313)
Advances in Wireless
Technologies and
Telecommunication (AWTT)
Book Series
Editor-in-Chief: Xiaoge Xu University of Nottingham Ningbo China, China
Mission
ISSN:2327-3305
EISSN:2327-3313
Thewirelesscomputingindustryisconstantlyevolving,redesigningthewaysinwhich
individuals share information. Wireless technology and telecommunication remain
one of the most important technologies in business organizations. The utilization of
these technologies has enhanced business efficiency by enabling dynamic resources
in all aspects of society.
TheAdvancesinWirelessTechnologiesandTelecommunicationBookSeries
aims to provide researchers and academic communities with quality research on the
conceptsanddevelopmentsinthewirelesstechnologyfields.Developers,engineers,
students, research strategists, and IT managers will find this series useful to gain
insight into next generation wireless technologies and telecommunication.
• Digital Communication
• Virtual Network Operations
• Wireless Sensor Networks
• Mobile Communications
• Telecommunications
• Wireless Technologies
• Mobile Technology
• Wireless Broadband
• Network Management
• Cellular Networks
Coverage
IGI Global is currently accepting
manuscripts for publication within this
series.Tosubmitaproposalforavolumein
this series, please contact our Acquisition
EditorsatAcquisitions@igi-global.comor
visit:http://www.igi-global.com/publish/.
The Advances in Wireless Technologies and Telecommunication (AWTT) Book Series (ISSN 2327-3305) is
published by IGI Global, 701 E. Chocolate Avenue, Hershey, PA 17033-1240, USA, www.igi-global.com. This series
is composed of titles available for purchase individually; each title is edited to be contextually exclusive from any other
title within the series. For pricing and ordering information please visit http://www.igi-global.com/book-series/advances-
wireless-technologies-telecommunication/73684. Postmaster: Send all address changes to above address. Copyright ©
2021 IGI Global. All rights, including translation in other languages reserved by the publisher. No part of this series
may be reproduced or used in any form or by any means – graphics, electronic, or mechanical, including photocopying,
recording, taping, or information and retrieval systems – without written permission from the publisher, except for non
commercial, educational use, including classroom teaching purposes. The views expressed in this series are those of the
authors, but not necessarily of IGI Global.
701 East Chocolate Avenue, Hershey, PA 17033, USA
Tel: 717-533-8845 x100 • Fax: 717-533-8661
E-Mail: cust@igi-global.com • www.igi-global.com
Managing Resources for Futuristic Wireless Networks
Mamata Rath (Birla School of Management, Birla Global University, India)
Information Science Reference • © 2021 • 338pp • H/C (ISBN: 9781522594932) • US
$195.00
Principles and Applications of Narrowband Internet of Things (NBIoT)
Sudhir K. Routray (Addis Ababa Science and Technology University, Ethiopia) and Sasmita
Mohanty (University of Aveiro, Portugal)
Information Science Reference • © 2021 • 300pp • H/C (ISBN: 9781799847755) • US
$195.00
Recent Developments in Individual and Organizational Adoption of ICTs
Orkun Yildiz (Izmir Democracy University, Turkey)
Information Science Reference • © 2021 • 333pp • H/C (ISBN: 9781799830450) • US
$195.00
Wireless Sensor Network-Based Approaches to Digital Image Processing in the IoT
Manoj Diwakar (DIT University, India) and Kaushik Ghosh (DIT University, India)
Information Science Reference • © 2020 • 300pp • H/C (ISBN: 9781799832812) • US
$195.00
Innovative Perspectives on Interactive Communication Systems and Technologies
Muhammad Sarfraz (Kuwait University, Kuwait)
Information Science Reference • © 2020 • 330pp • H/C (ISBN: 9781799833550) • US
$195.00
Handbook of Research on the Political Economy of Communications and Media
Serpil Karlidag (Baskent University, Turkey) and Selda Bulut (Ankara Haci Bayram Veli
University, Turkey)
For an entire list of titles in this series, please visit:
http://www.igi-global.com/book-series/advances-wireless-technologies-telecommunication/73684
Titles in this Series
For a list of additional titles in this series, please visit:
http://www.igi-global.com/book-series/advances-wireless-technologies-telecommunication/73684
Table of Contents
Preface.
.................................................................................................................xii
Chapter 1
Security Challenges in Network Slicing in 5G ......................................................1
Rashmi Mishra, Delhi Technological University, India & ABES
Engineering College, Ghaziabad, India
R. K. Yadav, Delhi Technological University, India
Chapter 2
Security Perspective of Cloud and Internet of Things With 5G Networks ..........15
Neetu Faujdar, Amity University, Noida, India
Chapter 3
The Internet of Things-Based Technologies ........................................................37
Pradeep Kumar Garg, Indian Institute of Technology, Roorkee, India
Chapter 4
Role Coordination in Large-Scale and Highly-Dense Internet of Things ............66
Harsh Khatter, ABES Engineering College, Ghaziabad, India
Prabhat Singh, ABES Engineering College, Ghaziabad, India
Chapter 5
Crop Disease Detection Using Data Science Techniques ....................................80
Shakti Kumar, Amity University, Noida, India
Chapter 6
Wing of 5G IoT and Other Services ....................................................................98
Prabhat Singh, ABES Engineering College, Ghaziabad, India
Harsh Khatter, ABES Engineering College, Ghaziabad, India
Sunil Kumar, Amity University, Noida, India

Chapter 7
Priority Encoding-Based Cluster Head Selection Approach in Wireless
Sensor Networks ................................................................................................113
Pooja Chaturvedi, School of Management Sciences, Varanasi, India
Ajai Kumar Daniel, Madan Mohan Malaviya University of Technology,
Gorakhpur, India
Chapter 8
Improvement and Reduction of Clustering Overhead in Mobile Ad Hoc
Network With Optimum Stable Bunching Algorithm .......................................139
Manish Bhardwaj, KIET Group of Institutions, India
Neha Shukla, KIET Group of Institutions, India
Arti Sharma, KIET Group of Institutions, India
Chapter 9
The Role of Dynamic Network Slicing in 5G: IoT and 5G Mobile Networks ...159
Kaushal Kumar, A. P. J. Abdul Kalam Technical University, Lucknow,
India
Ajit Kumar Singh, R . V. Institute of Technology, Bijnor, India
Sunil Kumar, Amity University, Noida, India
Pankaj Sharma, Sharda University, India
Jaya Sharna, SRM University, Modinagar, India
Chapter 10
Network Slicing and the Role of 5G in IoT Applications ..................................172
Ashish Sharma, Lebanese French University, Iraq
Sunil Kumar, Amity School of Engineering and Technology, Amity
University, India
Compilation of References ..............................................................................191
Related References ...........................................................................................203
About the Contributors ...................................................................................231
Index ..................................................................................................................234
Detailed Table of Contents
Preface.
.................................................................................................................xii
Chapter 1
Security Challenges in Network Slicing in 5G ......................................................1
Rashmi Mishra, Delhi Technological University, India & ABES
Engineering College, Ghaziabad, India
R. K. Yadav, Delhi Technological University, India
The evolving area of the upcoming technology in the era of “Mobile Security”
is a 5G network. The aim of this technology is to provide security to the mobile
nodes for the load balancing, for the voice security, capacity, quality of services,
secure end-to-end communication, connectivity of the devices in a highly mobile
network with reliable and scalable networks. The enhancement towards technology
leads to connect home appliances with IoT devices, industries, business. Therefore,
security-related issues will also increase. In wireless communication, devices want
to connect all the time, which primes the vulnerabilities, increases network traffic
at the device side on the channel, and creates the backdoor for the hacking and
cracking mechanisms for the wireless devices.
Chapter 2
Security Perspective of Cloud and Internet of Things With 5G Networks ..........15
Neetu Faujdar, Amity University, Noida, India
Pervasive computing has been greatly supported by the internet of things. The use
of internet of things has created the environment that helps in the management of
the different modules that are the part of the complete system, which can work
effectively without the interference with the other components of the system. The
cloud environment with the internet of things can help in getting the greater extend
of data sharing. Little attention has been provided to the security of the various
stakeholders that are the part of the system. IoT cloud integration involved privacy,
security, and personal safety risk of the stakeholders. Not only are these types
of security attacks possible, but there is also the possibility of attack on the IoT

components like hardware manipulation to disrupt the services. As we are on the
network, all the communication attacks of network are also possible. This chapter
will cover common aspects of regarding the cloud and internet of things (IOT) with
5G networks.
Chapter 3
The Internet of Things-Based Technologies ........................................................37
Pradeep Kumar Garg, Indian Institute of Technology, Roorkee, India
The internet of things (IoT) is the network of physical objects—devices, vehicles,
buildings, and other objects—embedded with software, electronic devices, sensors,
and network connectivity that enable these objects to collect and share information
or data. Its applications include smart homes, healthcare, industries, transportation
systems,logistics,andenergy.BuildinganIoTreal-time-basedapplicationinvolvesthe
properselectionofcombinationofsensors,technology,networks,andcommunication
modules, supported with the concepts of data processing, remote sensing, cloud
computing, etc. This chapter highlights advantages and disadvantages IoT and
various techniques, such as computer vision, remote sensing, artificial intelligence,
cloud computing, big data, ubiquitous computing, which are widely used in various
applications. Many new IoT-based applications will evolve, as new devices, sensors,
chips, and computational techniques are developed.
Chapter 4
Role Coordination in Large-Scale and Highly-Dense Internet of Things ............66
Harsh Khatter, ABES Engineering College, Ghaziabad, India
Prabhat Singh, ABES Engineering College, Ghaziabad, India
Huge-scale highly-dense networks integrate with different application spaces of
internetofthingsforpreciseoccasiondiscoveryandmonitoring.Becauseofthehigh
thickness and colossal scope, the hubs in these systems must play out some basic
correspondence jobs, in particular detecting, handing-off, information combination,
andinformationcontrol(collectionandreplication).Sincethevitalityutilizationand
the unwavering correspondence quality is one of the significant difficulties in large-
scale highly-dense networks, the correspondence jobs ought to be facilitated so as to
efficiently utilize the vitality assets and to meet a palatable degree of correspondence
dependability.Rightnow,theauthorsproposeanon-requestandcompletelydispersed
system for job coordination that is intended to distinguish occasions with different
levels of basicity, adjusting the information total and information replication as per
the desperation level of the recognized event.
Chapter 5
Crop Disease Detection Using Data Science Techniques ....................................80
Shakti Kumar, Amity University, Noida, India

Plant disease is a mutilation of the normal state of a plant that changes its essential
quality and prevents a plant from performing to its actual potential. Due to drastic
environmentchanges,plantdiseasesaregrowingdaybyday,whichresultsthehigher
losses in quantity of agricultural yields. To prevent the loss in the crop yield, the
timely disease identification is necessary. Monitoring the plant diseases without
any digital mean makes it difficult to identify the disease correctly and timely. It
requires more amounts of work, time, and great experience in the plant diseases.
Automatic approach of image processing and applying the different data science
techniques to classify the disease correctly is a good idea for this which includes
acquisition, classification, feature extraction, pre-processing, and segmentation all
are performed on the leaf images. This chapter will briefly discuss the data science
techniques used for the classification of the images like SVM, k-nearest neighbor,
decision tree, ANN, and convolutional neural network (CNN).
Chapter 6
Wing of 5G IoT and Other Services ....................................................................98
Prabhat Singh, ABES Engineering College, Ghaziabad, India
Harsh Khatter, ABES Engineering College, Ghaziabad, India
Sunil Kumar, Amity University, Noida, India
The day-to-day advancements have brought the biggest challenge to network
providers as it has become difficult to keep up the traditional networks with the ever-
advancing technologies for them. It also result as a motivation for vendors to grow
by developing, innovating, deploying, and migrating in their services, upgrading
to new hardware and infrastructure, as well as hiring newly trained people, which
requires a large amount of money and time to implement. It results to a need of a
new network architecture who has a capability of supporting future technologies
along with solving all sorts of issues known as the network proposal by software. For
meeting highly increasing demands, various proposals of load balancing techniques
come forward in which highly dedicated balancers of loads are being required for
ever service in some of them, or for every new service, manual recognition of device
is required. In the conventional network, on the basis of the local information in the
network, load balancing is being established.
Chapter 7
Priority Encoding-Based Cluster Head Selection Approach in Wireless
Sensor Networks ................................................................................................113
Pooja Chaturvedi, School of Management Sciences, Varanasi, India
Ajai Kumar Daniel, Madan Mohan Malaviya University of Technology,
Gorakhpur, India
Wireless sensor networks have gotten significant attention in recent times due to
their applicability in diverse fields. Energy conservation is a major challenge in

wirelesssensornetworks.Apartfromenergyconservation,monitoringqualityofthe
environmental phenomenon is also considered a major issue. The approaches that
addressed both these problems are of great significance. One such approach is node
scheduling, which aims to divide the node set into a number of subsets such that each
subset can monitor a given set of points known as targets. The chapter proposes a
priority coding-based cluster head selection approach as an extension of the energy
efficient coverage protocol (EECP). The priority of the nodes is determined on the
basis of residual energy (RE), distance (D), noise factor (N), node degree (Nd), and
link quality (LQ). The analytical results show that the proposed protocol improves
the network performance by reducing the overhead by a factor of 70% and hence
reduces the energy consumption by a factor of 70%.
Chapter 8
Improvement and Reduction of Clustering Overhead in Mobile Ad Hoc
Network With Optimum Stable Bunching Algorithm .......................................139
Manish Bhardwaj, KIET Group of Institutions, India
Neha Shukla, KIET Group of Institutions, India
Arti Sharma, KIET Group of Institutions, India
InMANET,everyhubisfitforsendingmessage(information)progressivelywithout
prerequisite of any fixed framework. Portable hubs oftentimes move in/out from
the system powerfully, making arrange topology unsteady in portable specially
appointed system (MANET). Therefore, it turns into an incredibly moving errand
to keep up stable system. In this chapter, the authors have proposed an upgraded
stablebunchingcalculationthatwillgivegreatersoundnesstothesystembylimiting
the group head changes furthermore, diminishing grouping overhead. In proposed
optimum stable bunching calculation (OSBC), another hub is presented which goes
about as a reinforcement hub in the bunch. Such reinforcement hub goes about as
group head, when real bunch head moves out (or passed on) from the bunch. Last
mentioned, the group head reelect another reinforcement hub. This training keeps
arrange accessibility without aggravation. Further, the need of group head and
reinforcement hub is determined dependent on the hub degree and the rest of the
battery life for portable hubs.
Chapter 9
The Role of Dynamic Network Slicing in 5G: IoT and 5G Mobile Networks ...159
KaushalKumar,A.P.J.AbdulKalamTechnicalUniversity,Lucknow,India
Ajit Kumar Singh, R . V. Institute of Technology, Bijnor, India
Sunil Kumar, Amity University, Noida, India
Pankaj Sharma, Sharda University, India
Jaya Sharna, SRM University, Modinagar, India

Energy and speed are very important parts in this fast-growing world. They also
play a crucial role in economy and operational considerations of a country, and by
environmental concerns, energy efficiency has now become a key pillar in the design
of communication networks. With the help of several of base station and millions of
networking devices in the fifth generation of wireless communications, the need of
energy efficient devices and operation will more effective. This chapter focused on
following areas to enhance efficiency, which incorporate EE improvement utilizing
radio access techniques like synchronously remote endurance and force move. In
this research paper, the authors have searched various methods or techniques that
are working with 5G wireless networks and got techniques that can address to
increase speed with the help of 5G wireless network. It discusses energy-efficiency
techniques that can be useful to boost user experience on 5G wireless network and
also discusses the problems that can arrive in and addressed in future.
Chapter 10
Network Slicing and the Role of 5G in IoT Applications ..................................172
Ashish Sharma, Lebanese French University, Iraq
Sunil Kumar, Amity School of Engineering and Technology, Amity
University, India
The research and development along the 5th generation are moving with extreme
speed around the global world. In this paper, the authors are going put light on the
concepts of network slicing architecture of the 5G network at multi-level stages.
The network slicing concept is another challenge faced by the 5G network. Further,
the broad description of 5G architecture and analysis on infrastructure design and
applications of network slicing in terms of 5G are done. This technique plays a major
part in 5G technology deals with virtualization and software-defined technology.
Due to low latency and its explosive growth, it is a technology to look into the
deep knowledge it inculcates within. The chapter also focuses on the applications
that the industry is looking into, and it has made a large impact on the user’s life.
With quantitative examples to show, this research will give a proper estimation for
network slicing networking.
Compilation of References ..............................................................................191
Related References ...........................................................................................203
About the Contributors ...................................................................................231
Index ..................................................................................................................234
Preface
OVERVIEW OF SUBJECT MATTER
5G is the upcoming generation of the wireless network that will be the advanced
version of 4G LTE+ providing all the features of a 4G LTE network and connectivity
for IoT devices with faster speed and lower latency. The 5G network is going to be
a service-oriented network, connecting billions of IoT devices and mobile phones
through the wireless network, and hence, it needs a special emphasis on security.
Security is the necessary enabler for the continuity of the wireless network business,
and in 5G, network security for IoT devices is the most important aspect. As IoT is
gaining momentum, people can remotely operate or instruct their network devices.
Therefore, there is a need for robust security mechanisms to prevent unauthorized
access to the devices.
Evolution of Software-Defined Networking Foundations for IoT and 5G Mobile
Networks is a collection of innovative research on the security challenges and
prevention mechanisms in high-speed mobile networks. The book explores the
threats to 5G and IoT and how to implement effective security architecture for them.
While highlighting topics including artificial intelligence, mobile technology, and
ubiquitouscomputing,thisbookisideallydesignedforcybersecurityexperts,network
providers, computer scientists, communication technologies experts, academicians,
students, and researchers.
TOPIC FITS IN THE WORLD TODAY
The many academic areas covered in this publication include, but are not limited to:
Artificial Intelligence
Cloud Computing
Energy Conservation
Mobile Technology
xii
Preface
Network Security
Network Traffic
Risk Management
Smart Technology
Ubiquitous Computing
Wireless Sensor Network
TARGET AUDIENCE
The volume is mainly intended for professors and academic researchers in the
field of networking and communication. However, we consider the book will be
of special interest to students at the undergraduate and post-graduate levels who
wish to expand their knowledge on topics related to digital communications, IOT,
5G and wireless sensor networks. These topics are introduced in various academic
programs. Although the primary potential audience might be academic, there is no
reason to exclude a more general public who may be interested in understanding
the ways networking may be exercising influence over their daily lives.
CHAPTERS
The book has 10 chapters.
Chapter 1. Security Challenges in Network slicing in 5G
Chapter2.SecurityPerspectiveofCloudandInternetofThingswith5GNetworks:
Security Perspective of Cloud and Internet of Things with 5G Networks
Chapter 3. The Internet of Things based Technologies
Chapter 4. Role Coordination in Large-Scale and Highly-Dense Internet-of-
Things: Large-Scale and Highly-Dense Internet-of-Things
Chapter 5. Crop Disease Detection Using Data Science Techniques
Chapter 6. Wing of 5G IoT and Other Services: IoT and Other Services
Chapter7.PriorityEncodingbasedClusterHeadSelectionApproachinWireless
Sensor Networks
Chapter 8. Improvement and Reduction of Clustering Overhead in Mobile Ad
Hoc Network with Optimum Stable Bunching Algorithm
Chapter9.Theroleofdynamicnetworkslicingin5G:IoTand5GMobileNetworks
Chapter 10. Network Slicing and the Role of 5G in IOT Applications
xiii
Preface
CONCLUSION
This book explore the new technologies, future definitions, next generation devices,
newprotocolsandstandardsforsoftware-defined,software-controlled,programmable
networking. The professors and professionals explained you what’s required for
building next generation networks that use software for communication between
applications and the underlying network infrastructure.
This edited book also presents several software defined networking practical
aspectsincludingIOTand5G.Also,explainedthesomeinterestingusecasesaround
big data, data center overlays, and network-function virtualization (NFV). This book
discovers how different vendors and service providers alike are following SDN as
it continues to evolve.
After reading the book, the readers will be able to:
• Explore the current state of the OpenFlow model and centralized network
control
• Delve into distributed and central control, including data plane generation
• Examine the structure and capabilities of commercial and open source
controllers
• Survey the available technologies for network programmability
• Trace the modern data center from desktop-centric to highly distributed
models
• Discover new ways to connect instances of network-function virtualization
and service chaining
• Get detailed information on constructing and maintaining an SDN network
topology
• Examine an idealized SDN framework for controllers, applications, and
ecosystems.
xiv
Copyright © 2021, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Chapter 1
1
DOI: 10.4018/978-1-7998-4685-7.ch001
ABSTRACT
The evolving area of the upcoming technology in the era of “Mobile Security” is a
5G network. The aim of this technology is to provide security to the mobile nodes
for the load balancing, for the voice security, capacity, quality of services, secure
end-to-end communication, connectivity of the devices in a highly mobile network
with reliable and scalable networks. The enhancement towards technology leads
to connect home appliances with IoT devices, industries, business. Therefore,
security-related issues will also increase. In wireless communication, devices want
to connect all the time, which primes the vulnerabilities, increases network traffic
at the device side on the channel, and creates the backdoor for the hacking and
cracking mechanisms for the wireless devices.
INTRODUCTION
5G is not individual around “quicker, superior or improved” networks, it is all about
distressing approximately every characteristic of our subsists and empowering an
assorted innovative customary of amenities. Nevertheless, 5G have their potential,
that is, its applications must be distributed very strongly and sanctuary matters
Security Challenges in
Network Slicing in 5G
Rashmi Mishra
https://orcid.org/0000-0003-0015-8732
Delhi Technological University, India & ABES Engineering College, Ghaziabad,
India
R. K. Yadav
Delhi Technological University, India
2
Security Challenges in Network Slicing in 5G
essential remain dispensed through the system foundation since from the self-same
commencement towards defending equally the systems and clients. Along with 5G,
the mobile network takes that security on another close with an extensive diversity
ofinnovative,forward-thinkingprecautions(McKeownNet.al.,2008).ThisChapter
pronounces those precautions in deepness, as well as the susceptibilities and bout
paths, they are intended towards moderate. Safeguarding mutual equal level of
security for all tenders which shape slicing notion, in this case, can also be difficult.
There are several features of slicing i.e., isolation and protection might create attack
methods such as weak isolation will lead to another resource with better parameters,
lower cost. From the industry point of view, following eight major necessities of
5G are recognized (Ericsson,2015):
• 1~10 Gbps data rates in physical networks: This data rate is almost 10 times
faster than the existing LTE networks that are 150 Mbps.
• Round trip latency is 1 ms: It is almost 10 times faster than 4G’s RTT.
• High bandwidth in the unit area: It will increase the connectivity of the
devices with very high bandwidth.
• An enormous number of connected devices: It will connect thousands of
devices in one go.
• Availability of network: 99.99% network will be available in 5G.
• Coverage of network anytime, any ware: Network should be available
anytime as per user location.
• Energy consumption should be reduced: Development of technology will
lead the usage of 5G network energy consumption is reduced by almost 99%
• High battery life: It is very important in the emerging 5G network is that it
reduce power consumption.
Manyofthewirelessindustries,university,andresearchofficialdomshavestarted
working in 5G wireless systems such as Ericsson, Qualcomm, Docomo, Huawei,
Nokia Solution Networks, METIS, Samsung electronics, 5G training, 5G Forum,
5GNOW. Visions of these companies discussed in the table 1 and reference in table
2 (Ericsson,2015):
3
Security Challenges in Network Slicing in 5G
Table 1. Company & their vision
Table 2. Company, Publisher, Year of Publication
4
Security Challenges in Network Slicing in 5G
Network Slicing
Is one of most recent technology comes into picture that provides elasticity,
scalability, flexibility and provides the security in a way that it creates the logical
networks which share the common hardware infrastructure? The primary idea was
introduced by (Peterson, L. et.al., 2006) in a paper” A blueprint for introducing
disruptivetechnologyintotheInternet”.Slicingmightalsousediversedaises,which
means slicing mechanisms can be applied in Operating System, kernel level, in the
virtualization software systems, firmware or even in regular software. In this wide
range of situations, the slicing mechanisms will be provided by diverse sellers.
Furthered incorporation concept of software-defined networking and network
functions virtualization. But, allowing multiple tenants to share single resources
must ensure the security needed for those scenarios (Joseph et al., 2008). The
crucks of this research are to describe the overlay network, plant lab in which the
environment is created for the sliced network to use the same design and utilize the
different services. Having several features of the network slicing in 5G there are
various security problems faced by the company and one of the most important area
is security such as Denial of Service attack (DoS), attackers may exploit the systems
which support the slicing and Slice-initiated attack. Figure 1 (NTT Docomo,2015)
shows the network architecture for secure and dynamic network:
Figure 1. Network Architecture for Secure and Dynamic Network
5
Security Challenges in Network Slicing in 5G
The 5G marketplace is a massive commercial prospect for mobile machinists and
their commercial associates (Guermazi A, 2011). Though, the strategies and usage
also grow probable cyber threats. Such as a Distributed Denial of Service (DDoS)
attacks. Many of the industries provide a layer of security for the operators, vendors,
ethics bodies, and connotations procedure an iterative twist of repeated erudition
concerning emergent intimidations and retort selections. Some of the actions have
to be taken to mitigate an attack for the control aspect. Some of them are proactive
while others are applied after the attacks have been taking place. Typically, there are
two types of attacks that have been carried out on the 5G network of any business
outlook. The first one is a Zero-day attack and the second one is the Day-one attack.
A zero-day attack is a threat that does not have predefined signatures or previous
history/fingerprints. Classically, the security supervisor recognizes eccentricities
in identified upright behavior of the carter cloud, as well as tenders that demand
amenity and state. After identification of the abnormal behavior, the action is taken
to moderate the attack or to contract supplementary perceptibility to appropriately
recognizethechallenger.InDay-oneattacks,threatsthathaveapredefinedsignature
orfingerprint,amoderationstratagemhappensinadvancetoknobtheattack.Controls
are carried to formulate the alterations to the carter cloud to smear eminence of
amenity fluctuations in per-hop behavior to diminish the impression of an attack
(European Commission,2011).
Network Technologies for 5G Security
Thenewversionofthe5GnetworkdesignedbyNGMNisworkedonthreeprinciples
asFlexiblesecuritymechanism,Supremebuilt-insecurity,Automation.5Gnetwork
shouldprovideahighlyrobustsecuritysystemforcyber-attackandsecurityassurance.
The 5G security mechanism must be supple for authentication and identification,
must adjust according to the environment, security control and threats. The two
most important concepts in 5G play a vital role such as virtual network function and
software-based network control. These features are expected by Network function
virtualization enables vendors to implement network function in software called
VNFs and deploy them on cloud and Software-Defined Networking separate the
core plane from the data plane, SDN deploys on very high-end servers Figure 2
(NTT Docomo,2015) These two mechanisms provide full proof security to the
5G network. The SDN architecture is divided into three layers named Application
plane, Control plane, and Infrastructure plane. Application plane consists of QoS
management, network management, and security services, Control plane consists
of Network Operating Systems which logically centralized the network, it also
provides the hardware concept to the Application plane. The infrastructure plane is
also known as the Data plane is the instruction of the Control plane which deals with
6
Security Challenges in Network Slicing in 5G
the data traffic flows. OpenFlow is the first worthwhile implementation part of SDN
and follows the three-tier architecture named OpenFlow applications, OpenFlow
controller and OpenFlow switches.
Security Issues Introduced by Network Slicing In 5g
The main feature of the Network slicing is Seclusion. More is Seclusion more is
unfailing of network slicing. In a network, if there is a single slice it means a network
isun-slicedanditisawell-researchedtopic.Slicingmeansthenetworkinfrastructure
is divided into multiples parts and each part will share the same infrastructures. The
minimum requirements are set for each sliced network are coexistence. But for the
isolation of each slice Tavakoli et al., defines an abstraction layer for an end to end
isolation and the author also introduces the adequate security policies. Other than
this author also states that currently no isolation capabilities are defined by any
other author. Then is important to design a mechanism for the security of isolation.
In the current mobile network if flooding Distributed Denial of Service attack
is attacked by the attacker then only that service will be affected. However, in a 5G
network if the DDOS is performed by the attacker then other services will also be
affected. This isolation is required for the slicing.
Figure 2. shows the SDN architecture
7
Security Challenges in Network Slicing in 5G
Protuberant forms, such as next-generation mobile networks (NGMN) ETSI’s,
NFV (for virtual network function life cycle), allotted endorsements aimed at
network slicing security in 5G, which assisted the documentation of intimidations
in the universal packet essential.
Security principles on network slicing
SecurityPrinciples:Somesecurityprinciplesarefollowedbyanyofthesubstructures
for secure communication.
• Confidentiality: In (Guermazi and Abid,2011) have proposed a key
distribution is used for the secure communication process. In (Yun et al.,2008)
says that the communication process in between the sensor nodes should be
secure. The idea of confidentiality is used to avert intended or unintended
illegal exposé of message contents.
• Integrity: In (Diop et al.,2013) use the cryptographic hash function to ensure
the integrity of the message. Modifications of data by unauthorized adverts
or processes.
Table 3. shows the threats on SDN layers
8
Security Challenges in Network Slicing in 5G
• Availability: The idea of Availability guarantees that “RIGHT
INFORMATION IS AVAILABLE TO THE RIGHT PERSON AT A RIDHT
TIME AT A RIGHT PLACE”. In (Modirkhazeni et al., 2010) depict that
the single point of failure may disturb the entire communication in WSN,
therefore the connectivity of the network is well defined for the entire lifetime.
• Authentication: In (Misra and Dias,2010) Thomasinous say authentication is
essential for the authentication of the civilian applications. In (Shi and Perrig,
2004) depict that authentication is necessary for identifying the malicious
packet in the transmission process. The idea of Authentication guarantees
that, any renewed node should be authenticated first earlier incoming in the
network to guarantee its authenticity.
• Non-Repudiation: The idea of Non-Repudiation is to guarantee that the
sender can’t deny that he was not sent the data or any node cannot refuse to
send the data to another node.
• Access Control: An Authorized person can access the data to whom he
claims to be.
Security Threats and Recommendation
The next-generation mobile network is used in the 5G network and for the security
measures that are not implemented as far or not available. The recommendation
tourist attractions of the confines in the access network and for the cyber-attacks in
theexistinginfrastructures(YunZetal.,2008).RecommendationsareFlashnetwork
traffic, security of radio interface keys, User plane integrity, Mandated security in
the network, Consistency in subscriber level security policies, DoS attacks on the
Infrastructure (A. Osseiranet et al,2014).
• Flash network traffic: In today’s scenario, mobile nodes are increasing day
by day, therefore the in a large number of scales there will be changed in the
network traffic pattern that could be either accidental or malicious. Thus,
it is recommended that a 5G system must minimize large swipes in traffic
tradition and afford elasticity.
• Security of radio interface keys: Keys were sent in an insecure manner in the
previous generation. But in 5G systems, keys sent in a secure manner such as
by using SS7/Diameter.
• User plane integrity: In 3G and 4G does not provide a cryptographic veracity
shield for the user plan. Therefore, it is recommended that protection will be
provided to the transport and application layer. But E2E application-level
security will create too much overhead in the transmission.
9
Security Challenges in Network Slicing in 5G
• Mandated security in the network: 3G and the 4G network are having a
constraint on service-driven approach and do not provide system layer
security. Therefore, it is recommended that it must be instructed in 5G is to
investigate the critical security challenges.
• Consistency in subscriber level security policies: It is highly in demand that
user security parameters will not change if the user is in roaming mode means
the operator is changed. In case if the user is in highly roaming mode then it
might be possible that security services will not be updated on time. If the
user is in roaming mode, the services will be provided by the Mobile Edge
Computing and using latency-sensitive services, so will the security services
will be updated on the user mobile. This needs security policy, for this
recommendation discuss the possibility of using the virtualization technique.
• DoS attacks on the Infrastructure: DoS and DDoS attacks might disturb
the operation of infrastructures such as energy, health, transportation and
telecommunications and many more. So, it is a recommendation that the
network should be capable of handling several connections with a different
number of operating capabilities and limitations.
Other Security Challenges
Security challenges of the 5G network are divided into 3 categories such as Dos
attack, Access of network and the core network (Modirkhazeni A et al., 2010)
Dos attack
DoS attack in 5G network target the bandwidth, memory, processing unit, radios,
sensors, operating system, applications, user data, the configuration of the network
and the connectivity of the network infrastructure (Diop A et al., 2013). DoS means
a large number of connected devices will target the single destination it may be a
user and an infrastructure. Attack on user depicts that the user not able to access the
services provided by the operator and attack against the infrastructure is to deplete
the network resources. Although the operator of the network is not affected the
individual subscribers may get affected. Another case of DoS attack is that affected
users of the infrastructure may target their infrastructure. Hence for free DoS and
DDoS attack, we have to focus on the following areas (Qualcomm,2014):
10
Security Challenges in Network Slicing in 5G
• The user plane may support two-way communication of the nodes/mobile.
• Authentication of the signaling plane.
• Bandwidth assignment.
• Connectivity checks regularly.
• The management plane should support the network configuration so that the
user and signaling plane will be maintained.
Access of the Network
One of the major challenges is data send by the nodes and received by the nodes
is not secure and it may increase the jamming of the network. The malicious
nodes will send the excessive signaling traffic that leading to a DoS attack. Such
type of activity will be identified on time so that the user plane will be protected.
Network and services should be accessible by the authenticated nodes/sensors such
that vulnerabilities will get protected. 5G network uses higher throughput, lower
latencies, extended coverage, etc and various types of access technologies. To keep
the network occupied/working, the 5G network will able to recover the network
from the jamming attacks of the radio channels. The addition to this node must be
secure due to its geographical distribution (Huawei,2013).
Security Challenges in the Core Layer
The enormous dissemination of the IP protocols on the user and core plane makes
the 5G network vulnerable to attack. Therefore, the availability of the network must
be improved including resilience against signalling-based vulnerability (Misra S et
al., 2010). The 5G network should ensure emergency communication if the network
is either inaccessible. Other challenges in the 5G network are that there are several
infected devices on the network such as IoT devices or M2M devices is ready to
attempt the DoS attack or jamming the channel. IoT devices are resource constraint
therefore they request the services in two-mode (Shi E et al., 2004). First, these
devices will request to perform processing, storing, sharing of information in the
cloud. Second, these devices will easily be compromised and the DoS attack will
perform by the nodes.
Security Solutions for SDN
The architecture of the SDN provides a high level of security monitoring, traffic
analysis and system response for the amenities forensics. By the help of cycle
of harvesting intelligence SDN quickly find threat from the network resources,
circumstances,andfaults.SDNarchitectureisveryusefultofindthetrafficredirection
11
Security Challenges in Network Slicing in 5G
through flow-tables, update, analyze, reprogram the network without the use of
hardware configuration (Rutvij H et al., 2012).
Application Plane Security
Featureofcentralizedcontrolarchitecturemakeseasytouseapplicationbyaltruistic
with network statics and characteristics of the packet. The SDN control plane is
worked in between the hardware and applications for hiding the complexities of
the existing network. PermOF is predefined system permission is used for access
control and access control of SDN applications (G. Wunder et al,2014) . The main
working of PermOF is to provide announcements, warning, recite, inscribe and
system authorization for certain applications of SDN. Another security measure
is NGMN. NGMN is used in the application layer for data integrity, it will defend
the data outside the mobile network, end to end security, user plane data integrity,
protection form battery consumption in IoT devices.
Control Plane Security
Many of the researchers have been published schemes and security proposals for the
control plane such as the Security-Enhanced Flooding Controller, another extended
version of the SEFC is also published. Usually, the reactive controller is worked on
the flow request when it comes to the controller and proactive controllers are used
to installing the flow rules. The control plane is a mediator of the data plane and the
application plane. So, by security the control planes the whole network should be
secured by adding some secure program northbound API. It will validate the rules
which are generated by the application layer and also steadfastness the skirmishes
between the applications (Ahmad I et al, 2018). Controller resilience policies have
been proposed by the author to mitigate the risk of failure of the controller due to
scalabilityissuesbytheuseofredundancy,distributedcontroller,storagemaximization
and maximizing the processing capabilities and resolve the DoS attack. The SDN
support wildcard OpenFlow directions will send the aggregated the client data to the
server and microflow requests were managed by the controller but this leads to the
failure due to the DoS attacks. Therefore, numerous load balancing techniques were
proposed and suggested by many researchers with multi-controllers in the network.
Data Plane Security
Data plane sends the packets through the channel also vital for security apparatuses
suchasauthentication/authorizationbecausetheapplicationinstalledweremodified,
change, update and delete the flow rules in the data plane. Therefore, security
12
Security Challenges in Network Slicing in 5G
mechanisms are needed for authentication and authorization. Multiple controllers
have been proposed by the authors if one controller fails and another will provide the
flow rules (Jangra1 A., et al). FortNox mechanism is used to permit the controller
for checking the illogicality in the flow rules in the application plane. FlowCchecker
mechanism is used to find the inconsistencies in the flow rules in the data plane.
CONCLUSION AND FUTURE SCOPE
This chapter is mainly focused on 5G network slicing security for mobile users.
5G network is designed to obtain security beyond the existing limitations. Security
in 5G will leads to preserving the load balance, energy constraint of the mobile
nodes and size of the clusters/cell which is the main disadvantage of the existing
4G network. Security mechanisms of the 5G network should be designed in such
a way that it will be secure from the future threats that were introduced by the
attackers and the limitations of the 4G networks should not be propagated in the
5G network. Devices that are connected from the 5G network should also be secure
form the malicious program introduced by the adversaries. Load balancing of the
network architecture should be developed in such a way that it follows the security
policies developed by the SDN and free from saturation attacks. As far as security
of controller is concerned, if the security of the controller is not taken into account
then it introduces a delay in flow rules and protocols in the switches and if switches
will get congested then it leads to the unsought traffic flow. Another constraint is
the capacity of the network. If the capacity of the networks is not taken into account
then it leads to the DoS attack. So, it is advised to design a mechanism in such a way
that it will keep the limitation of mobile nodes or sensor nodes in IoT.
REFERENCES
Ahmad, I., Liyanage, M., Shahabuddin, S., Ylianttila, M., & Gurtov, A. (2018).
Design Principles for 5G Security. A Comprehensive Guide to 5G Security, 75–98.
Diop, A., Qi, Y., Wang, Q., & Hussain, S, (2013). An advanced survey on secure
energy-efficient hierarchical routing protocols in wireless sensor networks. Int J
Computer Sci Issues, 10, 490–500.
Docomo, N. T. T. (2015). 5G radio access: Requirements, concepts technologies.
White paper.
Ericsson. (2015). 5G radio access. White paper.
13
Security Challenges in Network Slicing in 5G
European Commission. (2011). HORIZON 2020, The EU framework program for
ResearchandInnovation.Available:http://ec.europa.eu/programmes/horizon2020/
5G Forum. (2015). Make it Happen: Creating New Values Together. Available:
http://www.5gforum.org/
Guermazi, A., & Abid, M. (2011). An efficient key distribution scheme to secure
data-centric routing protocols in hierarchical wireless sensor networks. Proc
ComputSci, 208–15.
Huawei. (2013). 5G a technology vision. White paper.
5G Infrastructure Public-Private Partnership. (2013). Available: http://5g-ppp.eu/
Jangra, A., Goel, N., Priyanka, & Bhati, K. (2010). Security Aspects in Mobile
Ad Hoc Networks (WSNs): A Big Picture. International Journal of Electronics
Engineering, 189-196.
Joseph, D. A., Tavakoli, A., & Stoica, I. (2008). A policy‐aware switching layer for
datacenters.ProceedingsoftheACMSIGCOMM,51–62.10.1145/1402958.1402966
McKeown,N.,Anderson,T.,Balakrishnan,H.,Parulkar,G.,Peterson,L.,Rexford,J.,
Shenker,S.,&Turner,J.(2008).OpenFlow:Enablinginnovationincampusnetworks.
Computer Communication Review, 38(2), 69–74. doi:10.1145/1355734.1355746
Misra,S.,&DiasThomasinous,P.(2010).Asimple,least-time,andenergy-efficient
routing protocol with one-level data aggregation for wireless sensor networks.
Journal of Systems and Software, 83(5), 852–860. doi:10.1016/j.jss.2009.12.021
Modirkhazeni, A., Ithnin, N., & Ibrahim, O. (2010). Secure multipath routing
protocols in wireless sensor networks: a security survey analysis. Proceedings of
the2nd international conference on network application protocols and services,
22833. 10.1109/NETAPPS.2010.48
Nokia Networks. (2014). Looking ahead to 5G: Building a virtual zero latency
gigabit experience. White paper.
Osseiranet,A.(2014).IEEE:Scenariosfor5Gmobileandwirelesscommunications:
The vision of the METIS project. IEEE Communications Magazine, 52(5), 26–35.
doi:10.1109/MCOM.2014.6815890
Peterson, L., & Roscoe, T. (2006). The design Principles of PlanetLab. Operating
Systems Review, 40(1), 11–16. doi:10.1145/1113361.1113367
Qualcomm Technologies, Inc. (2014). Qualcomm’s 5G vision. White paper.
14
Security Challenges in Network Slicing in 5G
Rutvij,H.,&Jhaveri.(2012).ANovelApproachforGrayHoleandBlackHoleAttacks
in Mobile Ad-hoc Networks. IEEE.
Samsung Electronics Co. (2015). 5G vision. white paper.
Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless
Commun Mag, 11(6), 38–43. doi:10.1109/MWC.2004.1368895
5G Training and Certification. (2014). An Initiative Project in Preparing5G
Competence. Available: http://www.ieee-5g.org/about/
Wunder,G.,Jung,P.,Kasparick,M.,Wild,T.,Schaich,F.,Chen,Y.,Brink,S.,Gaspar,
I., Michailow, N., Festag, A., Mendes, L., Cassiau, N., Ktenas, D., Dryjanski, M.,
Pietrzyk, S., Eged, B., Vago, P., & Wiedmann, F. (2014). 5GNOW: Non-orthogonal,
asynchronous waveforms for future mobile applications. IEEE Communications
Magazine, 52(2), 97–105. doi:10.1109/MCOM.2014.6736749
Yun, Z., Yuguang, F., & Yanchao, Z. (2008). Securing wireless sensor networks:
A survey. IEEE Communications Surveys and Tutorials, 10(3), 6–28. doi:10.1109/
COMST.2008.4625802
Copyright © 2021, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Chapter 2
15
DOI: 10.4018/978-1-7998-4685-7.ch002
ABSTRACT
Pervasive computing has been greatly supported by the internet of things. The use
of internet of things has created the environment that helps in the management
of the different modules that are the part of the complete system, which can work
effectively without the interference with the other components of the system. The
cloud environment with the internet of things can help in getting the greater extend
of data sharing. Little attention has been provided to the security of the various
stakeholders that are the part of the system. IoT cloud integration involved privacy,
security, and personal safety risk of the stakeholders. Not only are these types
of security attacks possible, but there is also the possibility of attack on the IoT
components like hardware manipulation to disrupt the services. As we are on the
network, all the communication attacks of network are also possible. This chapter
will cover common aspects of regarding the cloud and internet of things (IOT) with
5G networks.
Security Perspective of
Cloud and Internet of
Things With 5G Networks
Neetu Faujdar
Amity University, Noida, India
16
Security Perspective of Cloud and Internet of Things With 5G Networks
INTRODUCTION
Cloud computing technology, seen as the staggering framework overcome, might
convey us to the “cloud society” after the PCs and the Internet conveyed people
to the “compose society” (D Singh 2015, Atzori 2010). In the arrangement of
Cloud Computing, all the ordinary utilization of PCs will be moved into the fogs
(virtualized mass computational servers which organize on the Internet), all we need
is a passageway to the Internet and after that we can play out any work on the cloud
(R Khan 2012, J Gubbi 2013). Disseminated processing is the latest headway in the
movement of figuring power. It cuts down the reason for segment, enabling access to
enlisting power effectively only available to the greatest affiliations. It furthermore
enables tinier relationship to utilize totally directed enlisting structures, decreasing
the essentials for extraordinarily capable IT staff. Dispersed figuring insinuates
applications passed on as organizations over the Internet and besides the hardware
and structures programming in the server cultivates that give those organizations.
At the point when all is said in done, Cloud Computing is internet dealing with,
whereby shared resources, programming, and information are given on enthusiasm
to PCs, mobile phones, and other practically identical contraptions (M Nia 2015, H
Salmani 2016). Disseminated figuring is also another style of preparing in which
dynamicallyadaptableresourcesaregivenasvirtualizedorganizations.Thislicenses
pro associations and customers to change their preparing limit dependent upon what
sum is required at a given time, or for a given task. Circulated figuring is sifted
through on stages like Google, Salesforce, Zoho, Axios Systems, Microsoft, Yahoo,
Amazon (M Tehranipoor 2010, G Lafuente 2015).
Cloud Computing Security Issues
Cloud Development Models
Cloud model fix, fixes, stage, amassing, and programming establishment is
surrendered as organizations measure or down depend on the web. It has three
standards delivery models (J Mineraud 2015, S Abdelwahab 2014):
1. Private Cloud: Private cloud is another name utilized by customers nowadays
to delineate consumed copies appropriated enlisting in the private structure.
These are arranged up in the inward server ranch exercises of an affiliation. In
privatemists,thedata,forexample,virtualassetsandversatileapplicationsthat
are given by different customers are gathered together and are made accessible
for cloud client for purchasing and selling.
17
Security Perspective of Cloud and Internet of Things With 5G Networks
2. Open Cloud: Open spread disseminated processing infers that customary
standard definition, when the advantages are watchfully given a fine-grained,
self relationship towards reason on the web, from an external supplier who is
off-website and he gives property and bills on nitty gitty utilize comprehension
of the explanation.
3. Half and half cloud: Cross breed cloud is a subtype of private cloud which
is associated with various cloud affiliations, half regulated given as a specific
unit. It changes virtual IT into a blend of both private and open fogs. Cream
cloud gives increasingly secure control of data and applications and licenses,
a gathering of programming to get the information on the Internet.
Service Delivery Models of Cloud Computing
Imitating cloud shows settlements, however the accompanying security perceives
diverse transport circulated processing the board models. The three standards
movement cloud the executives models are: Infrastructure-as-a-Service (IaaS),
Plateform-as-a-Service (Paas) and Software-as-a-Service (Saas) (W. A. Jansen
2011, S. L. Keoh 2014).
1. IaaS: IaaS is a singular occupant cloud layer in which steady resource cloud
comprehension of simply offering to accessible customer based on pay-per-
use.Thisimmenselydiminishestherequirementforhugebeginningenlistment
of hardware financing. SaaS: It is a conveyance product that shows which
applicationsarefacilitatedbyasellerorsupplieradministrationandisavailable
for clients within a system, normally the Internet.
2. SAAS: has become a pervasive conveyance inexorably outward as subject
innovationsthathelpwebadministrationsandtheadministrationbuildinglocated
design experienced and new techniques formative get to grow dramatically.
SaaS is also often connected to a membership model that allows Pay As You
Go. Then, the broadband management has the permission to allow the client
access from more regions far and wide.
3 Paas: It is a programming and enhancements found contraptions encouraged
servers providers. This can be one layer higher than IaaS. It gives the
client a joint scope of natural planners that can inspire the developers to
build the applications.
Cloud Computing in Mobile Applications
User module
18
Security Perspective of Cloud and Internet of Things With 5G Networks
1. Registration process
2. Login process
3. Service searches
4. Make inquiry process
5. Get information about service-man/woman
6. Send feedback about service
7. Edit profile process
8. Change password process
Admin Module
1. Login process
2. Register service provider person
3. Manage registered service provider person
4. Manage inquiry from user
5. Assign inquiry to service provider person
6. Send information about person who assign for service
7. Get feedback about service from user
8. Change password process
IOT
IOT is basically components of a device or devices or any other physical article
that are linked over an internet network. These devices are linked with each other
over a network and can transmit instructions and information with each other. It is
a combination of hardware and software components of a device or a machine. Just
how a robot works based on the instructions given to it similarly, the functioning
of these devices and machines can be controlled and commanded by humans. The
decisions taken by these devices depend upon its surrounding environment. These
devices are accordingly programmed based upon the actions and the work that are
expectedfromit.InEarliertimesinternetwasassociatedwithlaptopsandcomputers
only. With advancement in technology internet got linked with smart phones,
smart watches and tablets. But now we see that internet is being used everywhere
like the concept of smart homes, in automobiles, automatic driving, surveillance
and safety, etc. This Figure 1 gives data about number of IOT connected gadgets
installed throughout the world from 2015 to 2025 (C. Lesjak 2014, P. N. Mahalle
2013, W. John 2013).
19
Security Perspective of Cloud and Internet of Things With 5G Networks
There are assortments of techniques that are used by IOT devices and gadgets
to link with each and exchange information with each other. These devices may
use wireless network for connectivity. Wi-Fi’s and Bluetooth are largely used in
workplaces, offices, industries, schools, colleges and even in homes. Some gadgets
also use LTE and satellite connection for connection and transfer of data.
It is believed that after few years 5G networks will come under use by the
IOT ventures. The main advantage that 5G network provides is that it allows to
approximately 1 million 5G devices to connect in a given square kilometer. In
this way a large number of sensors can be used together in a little region. After
the development of the IOT industry the cloud will gather less information for
operation. If operation of information is completed on the device itself and just the
important data is received by cloud, then the expenses can be minimized. Various
new innovations will be needed for this. IOT comprises of four main sections that is
Sensors or gadgets, Connectivity, Data processing and User Interface (Ian F 2015,
M.Karakus 2017).
Figure 1. Number of IOT connected gadgets installed throughout the world from
2015 to 2025
20
Security Perspective of Cloud and Internet of Things With 5G Networks
1. Sensors: Sensors. Or gadgets assemble all the information and data from its
environment. This information can be a simple data like speed of a car, its
acceleration, etc and can even be highly complex like an audio or video. A
sensor can be existing individually or a number of seasons can be grouped
togethertoformagadgetoradevice.E.g.Acarisgadgetwithnumeroussensors.
2. Connectivity: After the sensors of a device acquire all the necessary data it
has to be delivered to the cloud. The sensors can be associated with the cloud
throughvarioustechniqueslikesatellite,internetnetwork,Bluetooth,Ethernet,
etc. The choice of the mode of connectivity depends on various factors like
power consumption, bandwidth, range of signals and many others.
3. Data Processing: Software is important for the processing of the data that is
received by the cloud. This processing can be done by single software or more
number of software depending on the complexity of information. E.g. GPS
determining the time taken to reach our destination while driving a car.
4. User Interface: After the data is processed it is send to the user through a text
message, signal, and voice or by any other form. User interface is responsible
for allowing the user to analyze, monitor or change the system settings. E.g.
ChangetheA.C.temperature.Sometimesthesystemsperformsomeofthetasks
automatically too depending on the system settings or in case of emergency
situations.
IOT and automobile industry and its applications
Internet of things is not a extravagant innovation in this era. It’s here and quick
changing the manner in which we live. The automotive industry is widely benefited
bytheinnovationsmadethroughinternetofthings.Ithasprovideduswithsignificant
transportation facility and administration abilities. It is driving us to time where
we will have smart, independent and self governing vehicles. Automotive industry
is quickest developing marketplace for IOT-based arrangements. It is believed that
by the year 2020 greater than 250 million autos are estimated to be associated with
internet which features the effects of IOT in the automobile industry. The amount of
network units in vehicles is probably going to grow by 67% throughout the following
two years, and the purchaser spending on connected systems in automobiles is
presumed to double by the end of ten years. Drivers around the world anticipate that
their vehicles should become cell phones on wheels, and IOT is demonstrating that
vehicle network is by far the best innovation that man has introduced. Applications
of IOT in automobile industry are as follows (Brief 2015, P. Demestichas 2013,
Van-Giang 2016).
21
Security Perspective of Cloud and Internet of Things With 5G Networks
Prescient maintenance technology
Prescient maintenance technology is used to avoid costly repairs in vehicles. This
technology depends upon the utilization of IOT network that assemble information
of various parts of the automobile. It then conveys that information to the cloud and
assesses the dangers of potential breakdown or faults of a vehicle’s equipment or
in its software. After data is prepared, the driver is informed about any essential or
obligatory service or fix to keep away from any potential occurrences. It empowers
end clients to get the correct data before time. With IOT network instruments, you
can avoid any kind of breakdowns in the course of the ride. Prescient maintenance
technologyisconnectedwiththealgorithmsofmachinelearning.Thesecalculations
are astoundingly successful at detecting things such as battery life. Here’s the means
by which it works (P. Ameigeiras 2015, H. Kim, 2013):
i) The battery status is examined by a in- vehicle detector system.
ii) Information is delivered to the cloud.
iii) The battery status is checked by the algorithms of machine learning.
iv) All sources of information is prepared by the system and accordingly guidance
is given to the driver.
v) Then the system delivers a notification to the driver cautioning them about
the low charge in the battery.
The prescient maintenance calculation proceeds in the following way:
i) Information is gathered from the engine starter, fuel siphon, and the battery.
ii) Information is transmitted to a cloud server.
iv) Any possible system issues in the vehicle are predicted by the cloud.
v) Suggestions are conveyed to the driver by means of an associated gadget.
Figure 2. How does prescient maintenance technology works
22
Security Perspective of Cloud and Internet of Things With 5G Networks
In-car entertainment and information system
The entire vehicle industry is driving towards making innovative and inventive
headways to improve accessibility associations and correspondence inside the
vehicle, overhaul vehicle assurance and security, and update in-vehicle customer
experience.Cleverapplicationsarebeingassociatedwithvehicleinfotainmentsystems
to give in-vehicle course, telemetric, and delight. Google has worked together with
a couple of automakers to organize its applications, for instance, Google Maps,
Play Store, Google Earth and Google Assistant into the systems of in - vehicle
infotainment. Apple Car Play is likewise given as a part in different vehicles. Most
vehicle infotainment systems utilize the affixed or brought together structure, which
needs them to be related with an external device for web accessibility, for instance,
a mobile phone. Vehicles will before long have programming and web organize
office embedded into their infotainment structures, empowering drivers to move
toward maps, on-demand infotainment, and different other web related offices (H.
Kim 2013, K. Pentikousis 2013).
Amalgamation of automobile frameworks are used to convey information and
entertainment to the vehicle driver and the passengers through sounds and videos,
controltouchscreencomponents,Voicedirections,etc.AsperMarketsandMarkets,
the in-car infotainment market is roughly calculated to extend USD 30.47 billion by
2022 which is at a CAGR of 11.79%. Investigation proposes that in-car infotainment
Figure 3. The prescient maintenance calculation method
23
Security Perspective of Cloud and Internet of Things With 5G Networks
market is operated by the expansion in manufacture of automobile, innovative
development and expanding interest for opulent automobiles. Fundamental parts
of an in-vehicle information and entertainment framework are as follows (W. Li
2016, R. Masoudi 2016):
Coordinated Head-component: It is a touch screen device, a gadget that looks
like a tablet or a mini wall TV that is attached on the automobile’s dashboard. It
has easy to use HMI, the head part goes about as an impeccably associated control
panel for the infotainment framework.
Heads-Up Display: It is an indispensable component of exclusive infotainment
frameworks, which shows the automobile’s ongoing data on the see-through
screen coordinated with the automobile’s windshield. Heads-up showcase assists
in diminishing the driver’s diversion while driving and helps him with primary
details like speed, route maps, and data from vehicle’s OBD port-II, atmosphere,
interactive media choices, etc.
ExclusiveDSPsandGPUstohelpnumerousdisplays:Nowday’sinfotainment
frameworks are supported by incredible car processors designed for powerful and
smart framework of the automobile. These car processors are effective in showing
contentonnumerousdisplays(forexampleHead-upDisplay,Windshield,Connected
cell phones, Head Unit, etc) and conveys an upgraded experience to drivers and
travelers in the vehicle.
Operatingsystems:Invehicleinfotainmentframeworksneedworkingframeworks
that are called “operating systems” fit for handling availability of connections and
networkandprogrammingapplicationstocoordinatenewfeaturesintheframework.
OperatingsystemslikeAndroid,QNX,Windows,Linuxaredrivingtheinfotainment
fragment.
CAN, LVDS and other network support (according to the prerequisite):
The electronic equipment parts in infotainment frameworks are interconnected
with specific systematic protocols for communication, example, CAN (Controller
Area Network). CAN or some other system enables microcontrollers and gadgets
to speak with one another without the host PC.
Connection Modules: Infotainment frameworks incorporate GPS, Wi-Fi, and
Bluetooth to provide network with outside systems and gadgets. These functions
assist in setting up services like giving route directions, web network and cell phone
coordination with the infotainment framework.
Car Sensors Integration: Signal acknowledgment sensors for identifying
surrounding light, camera sensors and numerous other sensors in the automobile
coordinate with infotainment frameworks to give data related to safety to the driver
and if there is any danger around .
24
Security Perspective of Cloud and Internet of Things With 5G Networks
Computerized Instrument Cluster: In today’s time infotainment frameworks
have changed the car cockpit structure from static structure of the in-car instruments
to advanced instrument groups and are digitalized. Advanced instrument groups
incorporate computerized displays of the old measuring instrument in the vehicle
like speedometer, odometer, RPM etc.
Safety and surveillance
External sensors are additionally utilized as back view cameras and vicinity sensors
that guide in blind spot identification and help in accurate parking, and more secure
driving.Driversaresecuredduetopresent-daysensorsthatcandetectencompassing
traffic on the road and the surrounding environment to guarantee safe driving. Also,
with the utilization of mesh arranged vehicles on the road, installed frameworks can
anticipate and keep away from crashes and avoid any accidents.
Information examination and dashboard detailing
Connected autos offer driver information crucial for the improvement, prototyping
and testing of better self-driving vehicles. As the number of vehicles with IOT
empowered frameworks are increasing the nature of information will definitely
improve.Withinformationinvestigationanddashboarddetailingdevices,associations
Figure 4. System Architecture of IVI
25
Security Perspective of Cloud and Internet of Things With 5G Networks
in the automobile business can keep on improving their contributions and better
serve the requirements of their clients.
Real time vehicle scanning system
IOT permits continuous information sharing from vehicles to makers those aides in
the improvement and advancement of upkeep, assemblage and production processes
throughout the lifecycle of the automobile. By sharing this information with vehicle
makers it additionally encourages them to improve prescient experiences to permit
quicker reaction times, if there are any difficult or risky issues that might lead to an
accident in the future. In this way it becomes simpler for makers to be responsible
and proactive in emergency situations.
Connected vehicles enable producers to legitimately and effectively tell the
drivers about any issue in the vehicle and automatically operate necessary tasks
like booking a vehicle servicing meeting with the closest vehicle dealer or service
center. This makes sure that vehicles are consistently serviced without bothering
the client. As car IOT advancements keep on developing, they are opening a large
amount of chances for automotive market to lift up their businesses. The associated
vehicle market includes various sub-sections that include diverse innovation usage.
Car makers, media communications suppliers, and software suppliers are taking an
interest in every one of these fragments.
5G Network Architecture and its Applications
In the present life 4G arrange is attempting to give solid information and IP network
and administrations up to 1 Gbps. 4G systems turns out to improve the advancement
of the system execution, cost, effectiveness and give the mass market IP-based
administrations. Still the interest is going high because of different example of
portable traffic is expanding strain on cell systems. To conquer this issue the future
5G arrange is going to dispatch. 5G system will give the principal foundation to
billionsofnewgadgetswithlesstrafficinthesystem.Presentlyaday’s5Ginnovation
is most needed research point for the specialists. So inquires about are as of now in
progress investigating distinctive building ways to address their key drivers. SDN
(Software Defined Network) innovation has been assuming a vital job to plan the
5G remote system. So in this area will perceive how SDN innovation is developed
in the plan of 5G remote system (Tomovic 2014, Van-Giang 2015).
ThroughconsistenteffortandconfirmationTelecomchairmenarecompletingan
automatedchangetomakeaprevalentpropelledworld.Tooutfittriesandindividuals
with a continuous, on demand, all on the web, DIY, social (ROADS) experience
requires an end to-end (E2E) encouraged building featuring deft, customized, and
26
Security Perspective of Cloud and Internet of Things With 5G Networks
keen movement during each stage. The thorough cloud modification of frameworks,
movementstructures,andorganizationsisabasicforthisenthusiasticallyanticipated
propelled change (SBH Said 2013, J. Costa-Requena 2015).
The “All Cloud” procedure is an enlightened investigation into equipment
asset pools, Gives consistently autonomous system cutting on a solitary system
foundation to meet differentiated assistance prerequisites and gives DC-based cloud
engineering to help different application situations. ᵒ Uses Cloud RAN to recreate
radio access systems (RAN) to give enormous associations of numerous models and
actualize on-request arrangement of RAN capacities required by 5G. ᵒ Simplifies
centre system design to execute on demand setup of system works through control
and client plane division, part based capacities, and bound together database the
executives. ᵒ Implements programmed arrange cutting assistance age, upkeep, and
end for different administrations to diminish working costs through nimble system
O&M, circulated programming design, and programmed sending. Administrators
change systems utilizing a system engineering dependent on server farm (DC) in
which all capacities and administration applications are running on the cloud DC,
alluded to as a Cloud Native design (P. Demestichas 2013, Ali-Ahmad H 2013).
The 5G (fifth Generation) is being viewed as client driven idea rather than
administrator driven as seen in 3G or administration driven will observed for 4G.
Versatile terminals always have the option to join numerous streams approaching
from various advances. The 4G cell system uses the multimode versatile system.
They expect to give unique client terminal which can participate in various remote
systems and beat the structure issue of intensity utilization and cost old versatile
terminals (M. Karakus 2017, R Trivisonno 2015).
OWRstandsforOpenWirelessArchitecturewhichisengagedtoenabledistinctive
extantremotetoaircoherencesimilarlyastomorrowremotecorrespondencestandard
in an open building stage. Before long, the creating interest and the various instances
of flexible traffic place an extending strain on cell frameworks. To consider the
tremendous bulk of traffic passed on by the modern organizations and applications,
the future fifth period 5G of remote/flexible broadband framework will give the
basic establishment to tons of new contraptions with less obvious traffic models
will join the framework. The 5G remote frameworks ought to enable the progression
and abuse of tremendous utmost and immense accessibility of marvellous and mind
boggling heterogeneous structures. In like way, the framework should be fit for
dealing with the confusing setting of errands to help the relentlessly contrasting
arrangement of new however then sudden organizations, customers and applications
(i.e., including astute urban territories, compact mechanical automation, vehicle
accessibility, machine-to-machine (M2M) modules, video perception, etc.), all with
incredibly isolating essentials, which will push adaptable framework execution and
abilities as far as possible. Moreover, it should give versatile and adaptable usage
27
Security Perspective of Cloud and Internet of Things With 5G Networks
of all available non-circumscribing ranges (e.g., further LTE moves up to support
littlecells(Non-OrthogonalMultipleAccess(NOMA),FutureRadioAccess(FRA))
for wildly uncommon framework game plan circumstances, in an imperativeness
capable and secure way (X. Jin 2013, J. Lee 2014).
The new period of remote correspondence is developing 5G technology. Users
can be associated with a few remote access advances at the same time because of
acknowledgment of omnipresent processing. Key highlights of 5G incorporate
help VPNs stands for Virtual Private Networks and Wireless World Wide Web
(WWWW) backing, and utilization of level IP. Utilization of level IP empowers
distinguishing proof of gadgets utilizing representative names which permits 5G
to be worthy for a wide range of innovations. The quantities of components in the
information way are decreased because of the utilization of level IP. This outcomes
in low capital cost (CapEx) and operational cost (OpEx). 5Gs significant favourable
position is high information paces of up to 10Gbps, which is multiple times quicker
than the 4G LTE. Likewise, low system inertness of underneath 1 millisecond
which contrasts inactivity of 30-70 ms of 4G, makes 5G, route superior to its more
seasoned innovation. Notwithstanding these focal points, high framework limit,
vitality sparing enormous gadget backing and cost decrease has proposed 5G as
the need of great importance.
For the ultra-thick 5G systems with enormous remote traffic and administration
necessities, the foundation must be isolated from the administrations it offers.
System usage can be expanded by enabling separated administrations to dwell on
the equivalent fundamental foundation. New items and innovations can be bolstered
alongside heritage items by WNV by disengaging some portion of the system. The
developing heterogeneous remote systems interest for a more grounded system
the board instrument. To accomplish this, we require remote system virtualization
(K.K. Yap 2010).
Introduction of knowledge against 5G can address the multifaceted idea of
Heterogeneous Networks (HetNets) by deciding and offering versatile responses
for consider compose heterogeneity. Programming Defined Networking (SDN) has
ascended as another astute plan for organize programmability. The fundamental
concept towards SDN is to move the control plane outside the switches and engage
external control of data through a predictable programming component which is
called controller. SDN gives clear considerations to portray the fragments, the limits
they give, and the show to conduct the sending plane from a remote controller by
methods for an ensured channel. This consideration gets the essential requirements
of sending tables for a bigger piece of switches and their stream tables. This united
bleeding edge see makes the controller sensible to perform orchestrate the load up
limits while allowing basic difference in the framework lead through the brought
together control plane (A. Basta 2014).
28
Security Perspective of Cloud and Internet of Things With 5G Networks
In heterogeneous systems, multi-connectivity gives an ideal client experience
dependent on LTE and 5G capacities, for example, high data transfer capacity and
paces of high recurrence, organize inclusion and solid versatility of low recurrence,
and open Wi-Fi assets. In situations that require high transfer speed or congruity,
a client requires numerous simultaneous associations. For instance, information
total from different memberships to 5G, LTE, and Wi-Fi is required to deliver high
data transfer capacity. A LTE arrange get to is required to keep up congruity after
a client has gotten to a 5G high-recurrence little cell.
The 5G adaptable frameworks should similarly reinforce instruments for traffic
detachment. It should achieve from starting Quality of Service (QOS) to end
requirements for moving toward applications of 5G. In reality, thus as to ensure
a bigger QOS the officials, a few undertakings and task has monitored joining
SDN and its introduction in future compact frameworks convincing responses for
respectingQOSend-customers.In,maker’sinscriptionsmotivationswritinginOpen
Flow-enabled SDN frameworks, they orchestrate the related functions conforming
to stream where QOS can gain by the possibility of SDN. The makers can present
the QOS Flow suggestion in order to develop the flexibility of QOS control in
SDN frameworks. Delay estimation In SDN frameworks using Queue model delay
estimation is analyzed. The designing proposed in a transport the limit of Open Flow
in giving execution requirements to different applications (P. Rost 2016).
In the SDN designing, the framework controller keeps up the information in
general framework. In the other way, Data plane is appropriated to items switches
and switches that offer essential stream sending or guiding subject to stream areas
made through the control plane. The per-stream based controller figures guiding
approach to give QOS, guarantee and bigger organization assets limits. Moreover,
SDN presents an open Application programmability interfaces (API) among the
data and control planes Fig.1, shows and offers a programmable framework and
offer flexibility to orchestrate movement and rates the association of new headways
and organizations, for instance, Open flow, For CES and PCE .This assurance
programmability can open intriguing open entryways with respect to 5G adaptable
systems. The Open flow is portrayed by the Open Networking Foundation (ONF)
as the essential standard show in southbound interface between the data and control
plane of SDN designing. It is thoroughly recognized as the predominant SDN show
usedininterfacebetweentheframeworkcontrollerandframeworkdevices.However,
there are various shows that can address an alternative to Open Flow in southbound
SDN interface, for instance, the For CES and PCE shows portrayed by IETF. An epic
southbound SDN shows are truly a work in progress and testing (B. Naudts 2012).
Single application circumstance for 5G and IOT is the splendid supportable city.
Zanellaetal.inspectsurbanIOTdevelopmentsthatareclosetoregulation,andagree
that most by far of splendid city organizations rely upon a brought together structure
29
Security Perspective of Cloud and Internet of Things With 5G Networks
where data is passed on to a control centre liable for thusly taking care of and taking
care of the got traffic. Inside splendid urban territories, sharp transportability is
one of the troublesome circumstances where self-administering or helped driving
cars demand to constantly screen the direction outside and inside the vehicle and
exchange data between the different individuals from the vehicle orchestrate, i.e.,
vehicle to vehicle (V2V) and vehicle to establishment (V2I) correspondences.
Various organizations in a canny city incorporate the leading group of traffic
blockage, sullying watching, halting, etc. Consequently, the crucial task of 5G is
to facilitate the organization of these different organizations and contraptions in
a productive manner, by thinking about the varying thought of the devices (e.g.,
vehicles moving at different versatility speeds and established traffic road sensors).
Adaptability and re-configurability of SDN/NFV is helpful smart urban networks,
wherefastre-configurationsofframeworkparametersasdemonstratedbytrafficstate
would enhance the capacities in supporting and upgrading splendid urban networks
organizations. For example emergency organizations could be passed on business
orchestratewhilere-configurabilityofSDN/NFVwillconsiderassuringtheguarantees
required for such emergency organizations. To engage such re-configurability, data
from sharp city organizations can be abused, with the ultimate objective that adroit
city framework and organizations could stay in amicable manner (P. Sidhu 2015).
In 5G frameworks, C-RAN is gripping from having a central director of
modernized work unit, a.k.a. baseband getting ready unit (BBU), to a dynamically
expansive thought of limit split. To moreover grow the flexibility, to diminish
the capriciousness and to enhance the QOS, 5G frameworks are moving close to
an adaptable edge enlisting approach where organizations, (for instance, saving)
despite limits are moved closer to the edge. When considering edge-masterminded
associations,forinstance,C-RANoradaptableedge,theactivityofvirtualizationand
softwarization is as such to re-configure the framework by moving framework limits
or organizations and to suitably revive the related traffic ways. If a chop’s QOS is
separating or the traffic requirement from this cut is over-troubling a given territory
of the framework, NFV can trigger a re-region of framework works approaching
to the edge and SDN can revive the framework topology to react to the recently
referenced changes. In the field of conveying virtualization closer to the edge, the
virtualization of BS’s low level limits is tended to in. The essential test identified
in is the virtualization of procedure heightened baseband limits, for instance, the
PHY layer, generally executed on submitted gear or on all around valuable hardware
enliveningoperators.Thisusecaseofphysicallayervirtualizationisanalyzedsimilar
to accelerating developments (M. Condoluci 2016).
Inorganizesoftwarizationengineeringtheprimary5GarrangesectionsareRadio
Networks, Front take and Backhaul Networks, Aggregation and Core Networks,
Network Clouds, Mobile Network and empowering innovations like Mobile Edge
30
Security Perspective of Cloud and Internet of Things With 5G Networks
Networks,Service/SoftwareNetworks,Software-DefinedCloudNetworks,Satellite
Networks, IOT Networks. The natures of this proposition are allowed as isolated
planes.Inindependentlycharacterized,theplanesarenottotallyautonomous:primary
terms in each plane are identifies with the principle terms of different planes in the
design. The structure is isolated in these significant terms which are Application
and Business Service Plane, Multi-Service Management Plane, Integrated Network
Management and Operations Plane, Infrastructure Softwarization Plane, Control
Plane and Forwarding/Data Plane.
OtherthanandaccordingtoITU-T,SDNdisplaysacoupleofleveloforganizations
security provided into 5G mastermind structure, for instance, Data genuineness,
Data protection, confirmation. With respect to, SDN will improve security in the
accompanying 5G convenient frameworks. Additionally, with the use of Open Flow
showin5Gflexibleframeworks,theframeworkwillassemblethepointofconfinement
of component parameters will delineate the stream features and choose the critical
parameters that impact the QOS of each stream. The Open Flow always uses these
parameters in order to develop course of action models and to achieve high QOS.
The accompanying 5G focus frameworks is used to astoundingly versatile, flexible
and will reinforce more significant level of programmability and robotization. Thus,
the 5G focus frameworks will be cloud-based condition. Seen as the accompanying
virtualization-based EPC building (vEPC) for the accompanying 5G frameworks.
The 5G SDN-based Core Networks will introduce virtualization, and will give
innovative courses of action, with to a more prominent degree a consideration on the
information unavoidable for 5G compose, moreover SDN will drive the feeds and
speedsofdatain5Gorchestratesandwillintenselygivesortoutsystemorganizations.
The execution of SDN in 5G focus frameworks will give a remote ability to manage
the direct of framework contraptions by pushing intensely the distinction in device
game plan and the administrators (M. Sama 2014).
Wireless Communication towards the 5G
Evolution of wireless world has been evolved from first generation (1G) and then
second generation (2G) and then third generation (3G) to the finally came forth
generation (4G). 1G i.e. Advanced Mobile Phone System (AMPS) and 2G (i.e.
GSM and GPRS) were designed for circuit switched voice application. In the other
hand 3G and 4G were developed for packet switched services. 5G networks will
not be based on routing and switching technologies anymore. They will be more
flexible, open and able to evolve more easily than previously evolved networks (A.
Gudipati 2012).
31
Security Perspective of Cloud and Internet of Things With 5G Networks
Software Defined Networks (SDN)
5G network identified the complexity of Heterogeneous Networks (HetNets)by
providingthemorereliablesolutiontoHetNets.SDNisthenewemergingintelligent
architecture for the programming of networks. The logic behind the SDN is to move
control plane outside the switches and enable the data of external control through a
logical software entity called controller. SDN gives the descriptions of components,
functions and the protocol to manage the forwarding plane from a remote controller
via some secure channel (.
Network Function Virtualization (NFV)
SDN is the most emerging framework for the future 5G networking and how to
re-factor the architecture of legacy networks, is virtualization so called Network
FunctionVirtualization.NFVisalsocallednetworksoftwarizationi.e.setofnetwork
functionsbyutilizingthemintosoftwarepackages.TheconceptofNFVcomesfrom
the classical server virtualization that could by installing multiple virtual machines
running different operating systems, software and processes.
CONCLUSION
5Gtechnologyroutesareevolution,convergenceandinnovationtofulfiltheservices
and applications requirements of the society in near future and beyond. In the near
future a network must be designed using a virtualization technology that is why a
holistic SDN and NFV strategies are paramount.
5G network will provide the frequency spectrum as well as the physical
infrastructure because it is the combination of multi-systems, multi-technologies.
Thechallengingissuetowardsthe5Gnetworkarewirelessandmobilenetwork.Even
while SDN and NFV will support to overcome these issues. The SDN programming
structure presents a complex set of problems facing the increasing weakness, which
will change the dynamics around securing the wireless infrastructure.
32
Security Perspective of Cloud and Internet of Things With 5G Networks
REFERENCES
Abdelwahab, S., Hamdaoui, B., Guizani, M., & Rayes, A. (2014). Enabling smart
cloud services through remote sensing: An Internet of Everything enabler. IEEE
Internet Things Journal, 1(3), 276–288. doi:10.1109/JIOT.2014.2325071
Akyildiz, I. F., Wang, P., & Lin, S.-C. (2015). SoftAir: Software de-fined networking
architecture for 5G wireless systems. In Computer Netwworkins. Elsevier.
Ali-Ahmad, H., Cicconetti, C., De la Oliva, A., & Mancuso, V. (2013). SDN-based
network architecture for extremely dense wireless networks. IEEE SDN for Future
Networks and Services (SDN4FNS).
Ameigeiras,P.,Ramos-Muñoz,J.,Schumacher,L.,Prados-Garzon,J.,Navarro-Ortiz,
J., & López-Soler, J. M. (2015). Link-level access cloud architecture design based
on SDN for 5G networks. IEEE Network. Advance online publication. doi:10.1109/
MNET.2015.7064899
Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey.
Computer Networks, 54(15), 2787–2805. doi:10.1016/j.comnet.2010.05.010
Basta, A., Kellerer, W., Hoffmann, M., Morper, H. J., & Hoffmann, K. (2014).
Applying NFV and SDN to LTE Mobile Core Gateways, the Functions Placement
Problem.ACMProceedingsofthe4thWorkshoponAllThingsCellular:Operations,
Applications, Challenges, All Things Cellular ’14, 33–38.
Brief, O. N. F. Solution. (2015). Open Flow enabled SDN and Network Functions
Virtualization. On-line at https://www.opennetworking.org/images/stories/
downloads/sdnresources/solution briefs/sb-sdn-nvf-solution.pdf
Condoluci, M., Dohler, M., Araniti, G., Molinaro, A., & Sachs, J. (2016, February).
Enhanced Radio Access and Data Transmission Procedures Facilitating Industry-
Compliant Machine-Type Communications over LTE-Based 5G Networks. IEEE
Wireless Communications, 23(1), 56–63. doi:10.1109/MWC.2016.7422406
Costa-Requena, J. (2015). SDN and NFV Integration in Generalized Mobile
NetworkArchitecture.EuropeanConf.NetworksandCommunications,1-6.10.1109/
EuCNC.2015.7194059
Demestichas, P., Georgakopoulos, A., Karvounas, D., Tsagkaris, K., Stavroulaki,
V., Lu, J., Xiong, C., & Yao, J. (2013). 5G on the Horizon: Key Challenges for
the Radio-Access Network. Vehicular Technology, 8(3), 47–53. doi:10.1109/
MVT.2013.2269187
33
Security Perspective of Cloud and Internet of Things With 5G Networks
Demestichas, P., Georgakopoulos, A., Karvounas, D., Tsagkaris, K., Stavroulaki,
V., Lu, J., Xiong, C., & Yao, J. (2013). 5G on the Horizon: Key Challenges for
the Radio-Access Network. Vehicular Technology, 8(3), 47–53. doi:10.1109/
MVT.2013.2269187
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things
(IoT): A vision architectural elements and future directions. Future Generation
Computer Systems, 29(7), 1645–1660. doi:10.1016/j.future.2013.01.010
Gudipati, A., Perry, D., Li, L. E., & Katti, S. (2013). Soft RAN: Software Defined
Radio Access Network. Proceedings of the Second ACM SIGCOMM Workshop on
Hot Topics in Software Defined Networking, HotSDN ’13, 25–30.
Jansen, W. A. (2011). Cloud hooks: Security and privacy issues in cloud computing.
Proc. 44th Hawaii Int. Conf. Syst. Sci. (HICSS), 1-10. 10.1109/HICSS.2011.103
Jin, X., Li, L. E., Vanbever, L., & Rexford, J. (2013). SoftCell: Scalable and Flexible
Cellular Core Network Architecture. Proceedings of CoNEXT, 2013, 163–174.
John, W., Pentikousis, K., Agapiou, G., Jacob, E., Kind, M., Manzalini, A., Risso, F.,
Staessens, D., Steinert, R., & Meirosu, C. (2013). Research Directions in Network
Service Chaining. IEEE SDN forFuture Networks and Services (SDN4FNS).
Karakus, M., & Durres, A. (2017). Quality of Service (QoS) in Software De-fined
Networking (SDN): A survey. Journal of Network and Computer Applications, 80,
200-218.
Karakus, M., & Durres, A. (2017). Quality of Service (QoS) in Software Defined
Networking (SDN): A survey. Journal of Network and Computer Applications, 80,
200-218.
Keoh, S. L., Kumar, S., & Tschofenig, H. (2014). Securing the Internet of Things:
A standardization perspective. IEEE Internet Things J., 1(3), 265–275. doi:10.1109/
JIOT.2014.2323395
Khan, Khan, Zaheer, & Khan. (2012). Future internet: The Internet of Things
architecture possible applications and key challenges. Proc. IEEE 10th Int. Conf.
Frontiers Inf. Technol., 257-260.
Kim, H., & Feamster, N. (2013). Improving network management with software
definednetworking.IEEECommunicationsMagazine,51(2),114–119.doi:10.1109/
MCOM.2013.6461195
Lafuente,G.(2015).Thebigdatasecuritychallenge.NetworkSecurity,20(1),12–14.
doi:10.1016/S1353-4858(15)70009-7
34
Security Perspective of Cloud and Internet of Things With 5G Networks
Lee, J., Uddin, M., Tourrilhes, J., Sen, S., Banerjee, S., Arndt, M., Kim, K.-H., &
Nadeem, T. (2014). Mesdn: Mobile extension of SDN. ACM Proceedings of the
Fifth International Workshop on Mobile Cloud Computing; Services, 7–14.
Lesjak, C., Ruprechter, T., Haid, J., Bock, H., & Brenner, E. (2014). A secure
hardwaremoduleandsystemconceptforlocalandremoteindustrialembeddedsystem
identification. In Proceeding Emerging Technology Factory Automation. ETFA.
Li, W., Meng, W., & Kwok, L. F. (2016). A survey on openflow based soft-ware
defined networks: Security challenges and countermeasures. Journal of Network
and Computer Applications, 68, 126–139. doi:10.1016/j.jnca.2016.04.011
Mahalle, P. N., Anggorojati, B., Prasad, N. R., & Prasad, R. (2013). Identity
authentication and capability based access control (IACAC) for the Internet of
Things. Journal Cyber Security Mobility, 1(4), 309–348.
Masoudi, R., & Ghaffari, A. (2016). Software defined networks: A survey. Journal
of Network and Computer Applications, 67, 1–25. doi:10.1016/j.jnca.2016.03.016
Mineraud, J., Mazhelis, O., Su, X., & Tarkoma, S. (2015). A gap analysis of Internet-
of-Things platforms. Available: http://arxiv.org/abs/1502.01181
Naudts, B., Kind, M., Westphal, F., Verbrugge, S., Colle, D., & Pickavet, M. (2012).
Techno economic Analysis of Software Defined Networking as Architecture for the
Virtualization of a Mobile Network. Workshop on Software Defined Networking
(EWSDN), 2012 European, 67–72. 10.1109/EWSDN.2012.27
Nguyen, Do, & Kim (2016). SDN and Virtualization-Based LTE Mobile Network
Architectures: A Comprehensive Survey. DOI doi:10.100711277-015-2997-7
Nguyen & Kim. (2015). Proposal and evaluation of SDN-based mobile packet core
networks. Journal on Wireless Communications and Networking, 172.
Nia,M.,Mozaffari-Kermani,M.,Sur-Kolay,S.,Raghunathan,A.,&Jha,N.K.(2015).
Energy-efficientlong-termcontinuouspersonalhealthmonitoring.IEEETransaction
onMulti-ScaleComputingSystem,1(2),85–98.doi:10.1109/TMSCS.2015.2494021
Pentikousis,K.,Wang,Y.,&Hu,W.(2013).MobileFlow:TowardSoft-ware-Defined
Mobile Networks. IEEE Communications Magazine.
Rost, P., Banchs, A., Berberana, I., Breitbach, M., Doll, M., Droste, H., Mannweiler,
C., Puente, M. A., Samdanis, K., & Sayadi, B. (2016, May). Mobile network
architecture evolution toward 5G. IEEE Communications Magazine, 54(5), 84–91.
doi:10.1109/MCOM.2016.7470940
35
Security Perspective of Cloud and Internet of Things With 5G Networks
Said, S. B. H., Sama, M. R., Guillouard, K., Suciu, L., Simon, G., Lagrange, X.,
& Bonnin, J.-M. (2013), New control plane in 3GPP LTE/EPC architecture for on-
demandconnectivityservice.ProceedingsofsecondIEEEInternationalConference
on Cloud Networking (CLOUDNET), 205–209. 10.1109/CloudNet.2013.6710579
Salmani, H., & Tehranipoor, M. M. (2016). Vulnerability analysis of a circuit layout
to hardware Trojan insertion. IEEE Transactions on Information Forensics and
Security, 11(6), 1214–1225. doi:10.1109/TIFS.2016.2520910
Sama, M., Ben Hadj Said, S., Guillouard, K., & Suciu, L. (2014). Enabling network
programmability in LTE/EPC architecture using OpenFlow. 12th
International
Symposium on Modelling and Optimization in Mobile, Ad Hoc, and Wireless
Networks (WiOpt), 389–396.
Sidhu, P., Woungang, I., Carvalho, G. H. S., Anpalagan, A., & Dhurandher, S.
K. (2015). An Analysis of Machine-Type-Communication on Human-Type-
Communication over Wireless Communication Networks. IEEE 29th International
Conference in Advanced Information Networking and Applications Workshops
(WAINA), 332–337.
Singh, D., Tripathi, G., & Jara, A. J. (2014). A survey of Internet-of-Things: Future
visionarchitecturechallengesandservices.Proc.IEEEWorldForumInternetThings,
287-292. 10.1109/WF-IoT.2014.6803174
Tehranipoor, M., & Koushanfar, F. (2010). A survey of hardware Trojan taxonomy
and detection. IEEE Design & Test of Computers, 27(1), 10–25. doi:10.1109/
MDT.2010.7
Thakurdesai, P. A., Kole, P. L., & Pareek, R. P. (2004). Evaluation of the quality
and contents of diabetes mellitus patient education on Internet. Patient Education
and Counseling, 53, 309–313.
Tomovic, S., Pejanovic-Djurisic, M., & Radusinovic, I. (2014). SDN based mobile
networks: Concepts and benefits. Wireless Personal Communications, 78(3),
1629–1644. doi:10.100711277-014-1909-6
Trivisonno, R., Guerzoni, R., Vaishnavi, I., & Soldani, D. (2015). SDN-based 5G
mobile networks: Architecture, functions, procedures and backward compatibility,
Transmission.EmergingTelecommunicationTechnology,26(1),82–92.doi:10.1002/
ett.2915
36
Security Perspective of Cloud and Internet of Things With 5G Networks
Yap, K. K., Sherwood, R., Kobayashi, M., Huang, T.-Y., Chan, M., Handigol, N.,
McKeown, N., & Parulkar, G. (2010). Blueprint for introducing innovation into
wireless mobile networks. ACM Proceedings of the Second ACM SIGCOMM
WorkshoponVirtualizedInfrastructureSystemsandArchitectures,VISA’10,25–32.
Exploring the Variety of Random
Documents with Different Content
with active links or immediate access to the full terms of the Project
Gutenberg™ License.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying,
performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or providing
access to or distributing Project Gutenberg™ electronic works
provided that:
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You provide a full refund of any money paid by a user who
notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.
• You provide, in accordance with paragraph 1.F.3, a full refund of
any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™
electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend
considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for
the “Right of Replacement or Refund” described in paragraph 1.F.3,
the Project Gutenberg Literary Archive Foundation, the owner of the
Project Gutenberg™ trademark, and any other party distributing a
Project Gutenberg™ electronic work under this agreement, disclaim
all liability to you for damages, costs and expenses, including legal
fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR
NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR
BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK
OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL
NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF
YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you
discover a defect in this electronic work within 90 days of receiving
it, you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or
entity that provided you with the defective work may elect to provide
a replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.
1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied
warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation,
the trademark owner, any agent or employee of the Foundation,
anyone providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with
the production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of the
following which you do or cause to occur: (a) distribution of this or
any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.
Section 2. Information about the Mission
of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the
assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.
Section 3. Information about the Project
Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.
The Foundation’s business office is located at 809 North 1500 West,
Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact
Section 4. Information about Donations to
the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many
small donations ($1 to $5,000) are particularly important to
maintaining tax exempt status with the IRS.
The Foundation is committed to complying with the laws regulating
charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.
While we cannot and do not solicit contributions from states where
we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.
International donations are gratefully accepted, but we cannot make
any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Section 5. General Information About
Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.
Project Gutenberg™ eBooks are often created from several printed
editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.
This website includes information about Project Gutenberg™,
including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.
More than just a book-buying platform, we strive to be a bridge
connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.
Join us on a journey of knowledge exploration, passion nurturing, and
personal growth every day!
ebookbell.com

More Related Content

PDF
Implementing Data Analytics And Architectures For Next Generation Wireless Co...
fierzafinie
 
PDF
Handbook Of Research On Deep Learning Techniques For Cloudbased Industrial Io...
bungaykarawi
 
PDF
Opportunities And Challenges Of Industrial Iot In 5g And 6g Networks Hadi Ala...
dziwkiademu31
 
PDF
Examining Cloud Computing Technologies Through the Internet of Things 1st Edi...
jaminsandin0
 
PDF
Emerging Trends In Iot And Integration With Data Science Cloud Computing And ...
jeisireonal56
 
PDF
Examining Cloud Computing Technologies Through The Internet Of Things 1st Edi...
zxqkysi268
 
PDF
Industry Use Cases on Blockchain Technology Applications in Iot and the Finan...
szelccluseus
 
PDF
Futuristic Research Trends And Applications Of Internet Of Things 1st Edition...
santaibegal7
 
Implementing Data Analytics And Architectures For Next Generation Wireless Co...
fierzafinie
 
Handbook Of Research On Deep Learning Techniques For Cloudbased Industrial Io...
bungaykarawi
 
Opportunities And Challenges Of Industrial Iot In 5g And 6g Networks Hadi Ala...
dziwkiademu31
 
Examining Cloud Computing Technologies Through the Internet of Things 1st Edi...
jaminsandin0
 
Emerging Trends In Iot And Integration With Data Science Cloud Computing And ...
jeisireonal56
 
Examining Cloud Computing Technologies Through The Internet Of Things 1st Edi...
zxqkysi268
 
Industry Use Cases on Blockchain Technology Applications in Iot and the Finan...
szelccluseus
 
Futuristic Research Trends And Applications Of Internet Of Things 1st Edition...
santaibegal7
 

Similar to Evolution Of Softwaredefined Networking Foundations For Iot And 5g Mobile Networks Sunil Kumar Editor (20)

PDF
Internet Of Things Novel Advances And Envisioned Applications D P Acharjya
fatnorrohily53
 
PDF
Contemporary Issues In Communication Cloud And Big Data Analytics 1st Ed 2022
xilozuleth
 
PDF
Ubiquitous Technologies For Human Development And Knowledge Management 1st Ed...
abikooncoy
 
PDF
Integration and Implementation of the Internet of Things Through Cloud Comput...
rumanavaii
 
PDF
Technological breakthroughs in modern wireless sensor applications 1st Editio...
mejiakaylawi
 
PDF
Mobile Application Development Usability And Security 1st Edition Sougata Muk...
oazjcoxhz0518
 
PDF
Crossindustry Applications Of Cyber Security Frameworks Sukanta Kumar Baral
bovepiji
 
PDF
Technological breakthroughs in modern wireless sensor applications 1st Editio...
thwadeb4837
 
PDF
Internet Of Things In Smart Technologies For Sustainable Urban Development 1s...
lvdsokmqcx482
 
PDF
Machine Learning In Information And Communication Technology Proceedings Of I...
ljubavsallau
 
PDF
Neuromorphic Computing Systems For Industry 40 22th Edition Dhanasekar S
muazezskree
 
PDF
Instant ebooks textbook System and Architecture Sunil Kumar Muttoo download a...
htawlawoe69
 
PDF
Managing Resources For Futuristic Wireless Networks Mamata Rath Editor
gribbgeppidk
 
PDF
Internet of Things in Smart Technologies for Sustainable Urban Development 1s...
kreteramaa
 
PDF
Information Centric Networks ICN Architecture Current Trends Dutta Nitul
pticarrajora34
 
PDF
Handbook Of Research On Machine Learningenabled Iot For Smart Applications Ac...
bungaykarawi
 
PDF
Contemporary Advances in Innovative and Applicable Information Technology Pro...
qywrgxtza7523
 
PDF
Mobile Application Development Usability and Security 1st Edition Sougata Muk...
maullsteilru
 
PDF
Information Centric Networks ICN Architecture Current Trends Dutta Nitul
hsmgerxox902
 
PDF
Innovations In Softwaredefined Networking And Network Functions Virtualizatio...
becitbabri
 
Internet Of Things Novel Advances And Envisioned Applications D P Acharjya
fatnorrohily53
 
Contemporary Issues In Communication Cloud And Big Data Analytics 1st Ed 2022
xilozuleth
 
Ubiquitous Technologies For Human Development And Knowledge Management 1st Ed...
abikooncoy
 
Integration and Implementation of the Internet of Things Through Cloud Comput...
rumanavaii
 
Technological breakthroughs in modern wireless sensor applications 1st Editio...
mejiakaylawi
 
Mobile Application Development Usability And Security 1st Edition Sougata Muk...
oazjcoxhz0518
 
Crossindustry Applications Of Cyber Security Frameworks Sukanta Kumar Baral
bovepiji
 
Technological breakthroughs in modern wireless sensor applications 1st Editio...
thwadeb4837
 
Internet Of Things In Smart Technologies For Sustainable Urban Development 1s...
lvdsokmqcx482
 
Machine Learning In Information And Communication Technology Proceedings Of I...
ljubavsallau
 
Neuromorphic Computing Systems For Industry 40 22th Edition Dhanasekar S
muazezskree
 
Instant ebooks textbook System and Architecture Sunil Kumar Muttoo download a...
htawlawoe69
 
Managing Resources For Futuristic Wireless Networks Mamata Rath Editor
gribbgeppidk
 
Internet of Things in Smart Technologies for Sustainable Urban Development 1s...
kreteramaa
 
Information Centric Networks ICN Architecture Current Trends Dutta Nitul
pticarrajora34
 
Handbook Of Research On Machine Learningenabled Iot For Smart Applications Ac...
bungaykarawi
 
Contemporary Advances in Innovative and Applicable Information Technology Pro...
qywrgxtza7523
 
Mobile Application Development Usability and Security 1st Edition Sougata Muk...
maullsteilru
 
Information Centric Networks ICN Architecture Current Trends Dutta Nitul
hsmgerxox902
 
Innovations In Softwaredefined Networking And Network Functions Virtualizatio...
becitbabri
 
Ad

Recently uploaded (20)

PPTX
Odoo 18 Sales_ Managing Quotation Validity
Celine George
 
PPTX
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
academysrusti114
 
PDF
7.Particulate-Nature-of-Matter.ppt/8th class science curiosity/by k sandeep s...
Sandeep Swamy
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
NOI Hackathon - Summer Edition - GreenThumber.pptx
MartinaBurlando1
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PDF
UTS Health Student Promotional Representative_Position Description.pdf
Faculty of Health, University of Technology Sydney
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PDF
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Miraj Khan
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PPTX
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
PPTX
ACUTE NASOPHARYNGITIS. pptx
AneetaSharma15
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
DOCX
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PDF
Sunset Boulevard Student Revision Booklet
jpinnuck
 
Odoo 18 Sales_ Managing Quotation Validity
Celine George
 
PPTs-The Rise of Empiresghhhhhhhh (1).pptx
academysrusti114
 
7.Particulate-Nature-of-Matter.ppt/8th class science curiosity/by k sandeep s...
Sandeep Swamy
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
NOI Hackathon - Summer Edition - GreenThumber.pptx
MartinaBurlando1
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
UTS Health Student Promotional Representative_Position Description.pdf
Faculty of Health, University of Technology Sydney
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Phylum Arthropoda: Characteristics and Classification, Entomology Lecture
Miraj Khan
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
family health care settings home visit - unit 6 - chn 1 - gnm 1st year.pptx
Priyanshu Anand
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
ACUTE NASOPHARYNGITIS. pptx
AneetaSharma15
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
Sunset Boulevard Student Revision Booklet
jpinnuck
 
Ad

Evolution Of Softwaredefined Networking Foundations For Iot And 5g Mobile Networks Sunil Kumar Editor

  • 1. Evolution Of Softwaredefined Networking Foundations For Iot And 5g Mobile Networks Sunil Kumar Editor download https://ebookbell.com/product/evolution-of-softwaredefined- networking-foundations-for-iot-and-5g-mobile-networks-sunil- kumar-editor-22812994 Explore and download more ebooks at ebookbell.com
  • 2. Here are some recommended products that we believe you will be interested in. You can click the link to download. Successful Evolution Of Software Systems Hongji Yang Martin Ward https://ebookbell.com/product/successful-evolution-of-software- systems-hongji-yang-martin-ward-1399762 Successful Evolution Of Software Systems Hongji Yang Martin Ward https://ebookbell.com/product/successful-evolution-of-software- systems-hongji-yang-martin-ward-4121602 Software Visualization Visualizing The Structure Behaviour And Evolution Of Software Stephan Diehl https://ebookbell.com/product/software-visualization-visualizing-the- structure-behaviour-and-evolution-of-software-stephan-diehl-975098 Security Compliance In Modeldriven Development Of Software Systems In Presence Of Longterm Evolution And Variants Sven Matthias Peldszus https://ebookbell.com/product/security-compliance-in-modeldriven- development-of-software-systems-in-presence-of-longterm-evolution-and- variants-sven-matthias-peldszus-44785646
  • 3. Cyberpunk Stories Of Hardware Software Wetware Evolution And Revolution Pat Cadigan https://ebookbell.com/product/cyberpunk-stories-of-hardware-software- wetware-evolution-and-revolution-pat-cadigan-4941802 Knowledge Organizational Evolution And Market Creation The Globalization Of Indian Firms From Steel To Software Gita Sud De Surie https://ebookbell.com/product/knowledge-organizational-evolution-and- market-creation-the-globalization-of-indian-firms-from-steel-to- software-gita-sud-de-surie-1383916 Informatics In Schools Fundamentals Of Computer Science And Software Engineering 11th International Conference On Informatics In Schools Situation Evolution And Perspectives Issep 2018 St Petersburg Russia October 1012 2018 Proceedings 1st Ed Sergei N Pozdniakov https://ebookbell.com/product/informatics-in-schools-fundamentals-of- computer-science-and-software-engineering-11th-international- conference-on-informatics-in-schools-situation-evolution-and- perspectives-issep-2018-st-petersburg-russia- october-1012-2018-proceedings-1st-ed-sergei-n-pozdniakov-7321028 Pragmatic Evaluation Of Software Architectures 1st Edition Jens Knodel https://ebookbell.com/product/pragmatic-evaluation-of-software- architectures-1st-edition-jens-knodel-5484922 Evaluation Of Novel Approaches To Software Engineering 17th International Conference Enase 2022 Virtual Event April 2526 2022 Revised Selected Papers Hermann Kaindl https://ebookbell.com/product/evaluation-of-novel-approaches-to- software-engineering-17th-international-conference-enase-2022-virtual- event-april-2526-2022-revised-selected-papers-hermann-kaindl-50813202
  • 5. Evolution of Software- Defined Networking Foundations for IoT and 5G Mobile Networks Sunil Kumar Amity University, Noida, India Munesh Chandra Trivedi National Institute of Technology, Agartala, India Priya Ranjan Amity University, Noida, India Akash Punhani Amity University, Noida, India A volume in the Advances in Wireless Technologies and Telecommunication (AWTT) Book Series
  • 6. Published in the United States of America by IGI Global Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA, USA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com Copyright © 2021 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. For electronic access to this publication, please contact: [email protected]. Names: Kumar, Sunil, 1986- editor. | Trivedi, Munesh Chandra, 1981- editor. | Ranjan, Priya, editor. | Punhani, Akash, 1985- editor. Title: Evolution of software-defined networking foundations for IoT and 5G mobile networks / Sunil Kumar, Munesh Chandra Trivedi, Priya Ranjan, and Akash Punhani, editors. Description: Hershey, PA : Information Science Reference, an imprint of IGI Global, [2021] | Includes bibliographical references and index. | Summary: “This book contains research on the security challenges and prevention mechanisms in high-speed mobile networks. The book explores the threats to 5G and IoT and how to implement effective security architecture for them”-- Provided by publisher. Identifiers: LCCN 2020005540 (print) | LCCN 2020005541 (ebook) | ISBN 9781799846857 (hardcover) | ISBN 9781799854395 (paperback) | ISBN 9781799846864 (ebook) Subjects: LCSH: Internet of things. | 5G mobile communication systems. | Software-defined networking (Computer network technology) Classification: LCC TK5105.8857 .E94 2021 (print) | LCC TK5105.8857 (ebook) | DDC 004.67/8--dc23 LC record available at https://lccn.loc.gov/2020005540 LC ebook record available at https://lccn.loc.gov/2020005541 This book is published in the IGI Global book series Advances in Wireless Technologies and Telecommunication (AWTT) (ISSN: 2327-3305; eISSN: 2327-3313)
  • 7. Advances in Wireless Technologies and Telecommunication (AWTT) Book Series Editor-in-Chief: Xiaoge Xu University of Nottingham Ningbo China, China Mission ISSN:2327-3305 EISSN:2327-3313 Thewirelesscomputingindustryisconstantlyevolving,redesigningthewaysinwhich individuals share information. Wireless technology and telecommunication remain one of the most important technologies in business organizations. The utilization of these technologies has enhanced business efficiency by enabling dynamic resources in all aspects of society. TheAdvancesinWirelessTechnologiesandTelecommunicationBookSeries aims to provide researchers and academic communities with quality research on the conceptsanddevelopmentsinthewirelesstechnologyfields.Developers,engineers, students, research strategists, and IT managers will find this series useful to gain insight into next generation wireless technologies and telecommunication. • Digital Communication • Virtual Network Operations • Wireless Sensor Networks • Mobile Communications • Telecommunications • Wireless Technologies • Mobile Technology • Wireless Broadband • Network Management • Cellular Networks Coverage IGI Global is currently accepting manuscripts for publication within this series.Tosubmitaproposalforavolumein this series, please contact our Acquisition [email protected] visit:http://www.igi-global.com/publish/. The Advances in Wireless Technologies and Telecommunication (AWTT) Book Series (ISSN 2327-3305) is published by IGI Global, 701 E. Chocolate Avenue, Hershey, PA 17033-1240, USA, www.igi-global.com. This series is composed of titles available for purchase individually; each title is edited to be contextually exclusive from any other title within the series. For pricing and ordering information please visit http://www.igi-global.com/book-series/advances- wireless-technologies-telecommunication/73684. Postmaster: Send all address changes to above address. Copyright © 2021 IGI Global. All rights, including translation in other languages reserved by the publisher. No part of this series may be reproduced or used in any form or by any means – graphics, electronic, or mechanical, including photocopying, recording, taping, or information and retrieval systems – without written permission from the publisher, except for non commercial, educational use, including classroom teaching purposes. The views expressed in this series are those of the authors, but not necessarily of IGI Global.
  • 8. 701 East Chocolate Avenue, Hershey, PA 17033, USA Tel: 717-533-8845 x100 • Fax: 717-533-8661 E-Mail: [email protected] • www.igi-global.com Managing Resources for Futuristic Wireless Networks Mamata Rath (Birla School of Management, Birla Global University, India) Information Science Reference • © 2021 • 338pp • H/C (ISBN: 9781522594932) • US $195.00 Principles and Applications of Narrowband Internet of Things (NBIoT) Sudhir K. Routray (Addis Ababa Science and Technology University, Ethiopia) and Sasmita Mohanty (University of Aveiro, Portugal) Information Science Reference • © 2021 • 300pp • H/C (ISBN: 9781799847755) • US $195.00 Recent Developments in Individual and Organizational Adoption of ICTs Orkun Yildiz (Izmir Democracy University, Turkey) Information Science Reference • © 2021 • 333pp • H/C (ISBN: 9781799830450) • US $195.00 Wireless Sensor Network-Based Approaches to Digital Image Processing in the IoT Manoj Diwakar (DIT University, India) and Kaushik Ghosh (DIT University, India) Information Science Reference • © 2020 • 300pp • H/C (ISBN: 9781799832812) • US $195.00 Innovative Perspectives on Interactive Communication Systems and Technologies Muhammad Sarfraz (Kuwait University, Kuwait) Information Science Reference • © 2020 • 330pp • H/C (ISBN: 9781799833550) • US $195.00 Handbook of Research on the Political Economy of Communications and Media Serpil Karlidag (Baskent University, Turkey) and Selda Bulut (Ankara Haci Bayram Veli University, Turkey) For an entire list of titles in this series, please visit: http://www.igi-global.com/book-series/advances-wireless-technologies-telecommunication/73684 Titles in this Series For a list of additional titles in this series, please visit: http://www.igi-global.com/book-series/advances-wireless-technologies-telecommunication/73684
  • 9. Table of Contents Preface. .................................................................................................................xii Chapter 1 Security Challenges in Network Slicing in 5G ......................................................1 Rashmi Mishra, Delhi Technological University, India & ABES Engineering College, Ghaziabad, India R. K. Yadav, Delhi Technological University, India Chapter 2 Security Perspective of Cloud and Internet of Things With 5G Networks ..........15 Neetu Faujdar, Amity University, Noida, India Chapter 3 The Internet of Things-Based Technologies ........................................................37 Pradeep Kumar Garg, Indian Institute of Technology, Roorkee, India Chapter 4 Role Coordination in Large-Scale and Highly-Dense Internet of Things ............66 Harsh Khatter, ABES Engineering College, Ghaziabad, India Prabhat Singh, ABES Engineering College, Ghaziabad, India Chapter 5 Crop Disease Detection Using Data Science Techniques ....................................80 Shakti Kumar, Amity University, Noida, India Chapter 6 Wing of 5G IoT and Other Services ....................................................................98 Prabhat Singh, ABES Engineering College, Ghaziabad, India Harsh Khatter, ABES Engineering College, Ghaziabad, India Sunil Kumar, Amity University, Noida, India
  • 10.  Chapter 7 Priority Encoding-Based Cluster Head Selection Approach in Wireless Sensor Networks ................................................................................................113 Pooja Chaturvedi, School of Management Sciences, Varanasi, India Ajai Kumar Daniel, Madan Mohan Malaviya University of Technology, Gorakhpur, India Chapter 8 Improvement and Reduction of Clustering Overhead in Mobile Ad Hoc Network With Optimum Stable Bunching Algorithm .......................................139 Manish Bhardwaj, KIET Group of Institutions, India Neha Shukla, KIET Group of Institutions, India Arti Sharma, KIET Group of Institutions, India Chapter 9 The Role of Dynamic Network Slicing in 5G: IoT and 5G Mobile Networks ...159 Kaushal Kumar, A. P. J. Abdul Kalam Technical University, Lucknow, India Ajit Kumar Singh, R . V. Institute of Technology, Bijnor, India Sunil Kumar, Amity University, Noida, India Pankaj Sharma, Sharda University, India Jaya Sharna, SRM University, Modinagar, India Chapter 10 Network Slicing and the Role of 5G in IoT Applications ..................................172 Ashish Sharma, Lebanese French University, Iraq Sunil Kumar, Amity School of Engineering and Technology, Amity University, India Compilation of References ..............................................................................191 Related References ...........................................................................................203 About the Contributors ...................................................................................231 Index ..................................................................................................................234
  • 11. Detailed Table of Contents Preface. .................................................................................................................xii Chapter 1 Security Challenges in Network Slicing in 5G ......................................................1 Rashmi Mishra, Delhi Technological University, India & ABES Engineering College, Ghaziabad, India R. K. Yadav, Delhi Technological University, India The evolving area of the upcoming technology in the era of “Mobile Security” is a 5G network. The aim of this technology is to provide security to the mobile nodes for the load balancing, for the voice security, capacity, quality of services, secure end-to-end communication, connectivity of the devices in a highly mobile network with reliable and scalable networks. The enhancement towards technology leads to connect home appliances with IoT devices, industries, business. Therefore, security-related issues will also increase. In wireless communication, devices want to connect all the time, which primes the vulnerabilities, increases network traffic at the device side on the channel, and creates the backdoor for the hacking and cracking mechanisms for the wireless devices. Chapter 2 Security Perspective of Cloud and Internet of Things With 5G Networks ..........15 Neetu Faujdar, Amity University, Noida, India Pervasive computing has been greatly supported by the internet of things. The use of internet of things has created the environment that helps in the management of the different modules that are the part of the complete system, which can work effectively without the interference with the other components of the system. The cloud environment with the internet of things can help in getting the greater extend of data sharing. Little attention has been provided to the security of the various stakeholders that are the part of the system. IoT cloud integration involved privacy, security, and personal safety risk of the stakeholders. Not only are these types of security attacks possible, but there is also the possibility of attack on the IoT
  • 12.  components like hardware manipulation to disrupt the services. As we are on the network, all the communication attacks of network are also possible. This chapter will cover common aspects of regarding the cloud and internet of things (IOT) with 5G networks. Chapter 3 The Internet of Things-Based Technologies ........................................................37 Pradeep Kumar Garg, Indian Institute of Technology, Roorkee, India The internet of things (IoT) is the network of physical objects—devices, vehicles, buildings, and other objects—embedded with software, electronic devices, sensors, and network connectivity that enable these objects to collect and share information or data. Its applications include smart homes, healthcare, industries, transportation systems,logistics,andenergy.BuildinganIoTreal-time-basedapplicationinvolvesthe properselectionofcombinationofsensors,technology,networks,andcommunication modules, supported with the concepts of data processing, remote sensing, cloud computing, etc. This chapter highlights advantages and disadvantages IoT and various techniques, such as computer vision, remote sensing, artificial intelligence, cloud computing, big data, ubiquitous computing, which are widely used in various applications. Many new IoT-based applications will evolve, as new devices, sensors, chips, and computational techniques are developed. Chapter 4 Role Coordination in Large-Scale and Highly-Dense Internet of Things ............66 Harsh Khatter, ABES Engineering College, Ghaziabad, India Prabhat Singh, ABES Engineering College, Ghaziabad, India Huge-scale highly-dense networks integrate with different application spaces of internetofthingsforpreciseoccasiondiscoveryandmonitoring.Becauseofthehigh thickness and colossal scope, the hubs in these systems must play out some basic correspondence jobs, in particular detecting, handing-off, information combination, andinformationcontrol(collectionandreplication).Sincethevitalityutilizationand the unwavering correspondence quality is one of the significant difficulties in large- scale highly-dense networks, the correspondence jobs ought to be facilitated so as to efficiently utilize the vitality assets and to meet a palatable degree of correspondence dependability.Rightnow,theauthorsproposeanon-requestandcompletelydispersed system for job coordination that is intended to distinguish occasions with different levels of basicity, adjusting the information total and information replication as per the desperation level of the recognized event. Chapter 5 Crop Disease Detection Using Data Science Techniques ....................................80 Shakti Kumar, Amity University, Noida, India
  • 13.  Plant disease is a mutilation of the normal state of a plant that changes its essential quality and prevents a plant from performing to its actual potential. Due to drastic environmentchanges,plantdiseasesaregrowingdaybyday,whichresultsthehigher losses in quantity of agricultural yields. To prevent the loss in the crop yield, the timely disease identification is necessary. Monitoring the plant diseases without any digital mean makes it difficult to identify the disease correctly and timely. It requires more amounts of work, time, and great experience in the plant diseases. Automatic approach of image processing and applying the different data science techniques to classify the disease correctly is a good idea for this which includes acquisition, classification, feature extraction, pre-processing, and segmentation all are performed on the leaf images. This chapter will briefly discuss the data science techniques used for the classification of the images like SVM, k-nearest neighbor, decision tree, ANN, and convolutional neural network (CNN). Chapter 6 Wing of 5G IoT and Other Services ....................................................................98 Prabhat Singh, ABES Engineering College, Ghaziabad, India Harsh Khatter, ABES Engineering College, Ghaziabad, India Sunil Kumar, Amity University, Noida, India The day-to-day advancements have brought the biggest challenge to network providers as it has become difficult to keep up the traditional networks with the ever- advancing technologies for them. It also result as a motivation for vendors to grow by developing, innovating, deploying, and migrating in their services, upgrading to new hardware and infrastructure, as well as hiring newly trained people, which requires a large amount of money and time to implement. It results to a need of a new network architecture who has a capability of supporting future technologies along with solving all sorts of issues known as the network proposal by software. For meeting highly increasing demands, various proposals of load balancing techniques come forward in which highly dedicated balancers of loads are being required for ever service in some of them, or for every new service, manual recognition of device is required. In the conventional network, on the basis of the local information in the network, load balancing is being established. Chapter 7 Priority Encoding-Based Cluster Head Selection Approach in Wireless Sensor Networks ................................................................................................113 Pooja Chaturvedi, School of Management Sciences, Varanasi, India Ajai Kumar Daniel, Madan Mohan Malaviya University of Technology, Gorakhpur, India Wireless sensor networks have gotten significant attention in recent times due to their applicability in diverse fields. Energy conservation is a major challenge in
  • 14.  wirelesssensornetworks.Apartfromenergyconservation,monitoringqualityofthe environmental phenomenon is also considered a major issue. The approaches that addressed both these problems are of great significance. One such approach is node scheduling, which aims to divide the node set into a number of subsets such that each subset can monitor a given set of points known as targets. The chapter proposes a priority coding-based cluster head selection approach as an extension of the energy efficient coverage protocol (EECP). The priority of the nodes is determined on the basis of residual energy (RE), distance (D), noise factor (N), node degree (Nd), and link quality (LQ). The analytical results show that the proposed protocol improves the network performance by reducing the overhead by a factor of 70% and hence reduces the energy consumption by a factor of 70%. Chapter 8 Improvement and Reduction of Clustering Overhead in Mobile Ad Hoc Network With Optimum Stable Bunching Algorithm .......................................139 Manish Bhardwaj, KIET Group of Institutions, India Neha Shukla, KIET Group of Institutions, India Arti Sharma, KIET Group of Institutions, India InMANET,everyhubisfitforsendingmessage(information)progressivelywithout prerequisite of any fixed framework. Portable hubs oftentimes move in/out from the system powerfully, making arrange topology unsteady in portable specially appointed system (MANET). Therefore, it turns into an incredibly moving errand to keep up stable system. In this chapter, the authors have proposed an upgraded stablebunchingcalculationthatwillgivegreatersoundnesstothesystembylimiting the group head changes furthermore, diminishing grouping overhead. In proposed optimum stable bunching calculation (OSBC), another hub is presented which goes about as a reinforcement hub in the bunch. Such reinforcement hub goes about as group head, when real bunch head moves out (or passed on) from the bunch. Last mentioned, the group head reelect another reinforcement hub. This training keeps arrange accessibility without aggravation. Further, the need of group head and reinforcement hub is determined dependent on the hub degree and the rest of the battery life for portable hubs. Chapter 9 The Role of Dynamic Network Slicing in 5G: IoT and 5G Mobile Networks ...159 KaushalKumar,A.P.J.AbdulKalamTechnicalUniversity,Lucknow,India Ajit Kumar Singh, R . V. Institute of Technology, Bijnor, India Sunil Kumar, Amity University, Noida, India Pankaj Sharma, Sharda University, India Jaya Sharna, SRM University, Modinagar, India
  • 15.  Energy and speed are very important parts in this fast-growing world. They also play a crucial role in economy and operational considerations of a country, and by environmental concerns, energy efficiency has now become a key pillar in the design of communication networks. With the help of several of base station and millions of networking devices in the fifth generation of wireless communications, the need of energy efficient devices and operation will more effective. This chapter focused on following areas to enhance efficiency, which incorporate EE improvement utilizing radio access techniques like synchronously remote endurance and force move. In this research paper, the authors have searched various methods or techniques that are working with 5G wireless networks and got techniques that can address to increase speed with the help of 5G wireless network. It discusses energy-efficiency techniques that can be useful to boost user experience on 5G wireless network and also discusses the problems that can arrive in and addressed in future. Chapter 10 Network Slicing and the Role of 5G in IoT Applications ..................................172 Ashish Sharma, Lebanese French University, Iraq Sunil Kumar, Amity School of Engineering and Technology, Amity University, India The research and development along the 5th generation are moving with extreme speed around the global world. In this paper, the authors are going put light on the concepts of network slicing architecture of the 5G network at multi-level stages. The network slicing concept is another challenge faced by the 5G network. Further, the broad description of 5G architecture and analysis on infrastructure design and applications of network slicing in terms of 5G are done. This technique plays a major part in 5G technology deals with virtualization and software-defined technology. Due to low latency and its explosive growth, it is a technology to look into the deep knowledge it inculcates within. The chapter also focuses on the applications that the industry is looking into, and it has made a large impact on the user’s life. With quantitative examples to show, this research will give a proper estimation for network slicing networking. Compilation of References ..............................................................................191 Related References ...........................................................................................203 About the Contributors ...................................................................................231 Index ..................................................................................................................234
  • 16. Preface OVERVIEW OF SUBJECT MATTER 5G is the upcoming generation of the wireless network that will be the advanced version of 4G LTE+ providing all the features of a 4G LTE network and connectivity for IoT devices with faster speed and lower latency. The 5G network is going to be a service-oriented network, connecting billions of IoT devices and mobile phones through the wireless network, and hence, it needs a special emphasis on security. Security is the necessary enabler for the continuity of the wireless network business, and in 5G, network security for IoT devices is the most important aspect. As IoT is gaining momentum, people can remotely operate or instruct their network devices. Therefore, there is a need for robust security mechanisms to prevent unauthorized access to the devices. Evolution of Software-Defined Networking Foundations for IoT and 5G Mobile Networks is a collection of innovative research on the security challenges and prevention mechanisms in high-speed mobile networks. The book explores the threats to 5G and IoT and how to implement effective security architecture for them. While highlighting topics including artificial intelligence, mobile technology, and ubiquitouscomputing,thisbookisideallydesignedforcybersecurityexperts,network providers, computer scientists, communication technologies experts, academicians, students, and researchers. TOPIC FITS IN THE WORLD TODAY The many academic areas covered in this publication include, but are not limited to: Artificial Intelligence Cloud Computing Energy Conservation Mobile Technology xii
  • 17. Preface Network Security Network Traffic Risk Management Smart Technology Ubiquitous Computing Wireless Sensor Network TARGET AUDIENCE The volume is mainly intended for professors and academic researchers in the field of networking and communication. However, we consider the book will be of special interest to students at the undergraduate and post-graduate levels who wish to expand their knowledge on topics related to digital communications, IOT, 5G and wireless sensor networks. These topics are introduced in various academic programs. Although the primary potential audience might be academic, there is no reason to exclude a more general public who may be interested in understanding the ways networking may be exercising influence over their daily lives. CHAPTERS The book has 10 chapters. Chapter 1. Security Challenges in Network slicing in 5G Chapter2.SecurityPerspectiveofCloudandInternetofThingswith5GNetworks: Security Perspective of Cloud and Internet of Things with 5G Networks Chapter 3. The Internet of Things based Technologies Chapter 4. Role Coordination in Large-Scale and Highly-Dense Internet-of- Things: Large-Scale and Highly-Dense Internet-of-Things Chapter 5. Crop Disease Detection Using Data Science Techniques Chapter 6. Wing of 5G IoT and Other Services: IoT and Other Services Chapter7.PriorityEncodingbasedClusterHeadSelectionApproachinWireless Sensor Networks Chapter 8. Improvement and Reduction of Clustering Overhead in Mobile Ad Hoc Network with Optimum Stable Bunching Algorithm Chapter9.Theroleofdynamicnetworkslicingin5G:IoTand5GMobileNetworks Chapter 10. Network Slicing and the Role of 5G in IOT Applications xiii
  • 18. Preface CONCLUSION This book explore the new technologies, future definitions, next generation devices, newprotocolsandstandardsforsoftware-defined,software-controlled,programmable networking. The professors and professionals explained you what’s required for building next generation networks that use software for communication between applications and the underlying network infrastructure. This edited book also presents several software defined networking practical aspectsincludingIOTand5G.Also,explainedthesomeinterestingusecasesaround big data, data center overlays, and network-function virtualization (NFV). This book discovers how different vendors and service providers alike are following SDN as it continues to evolve. After reading the book, the readers will be able to: • Explore the current state of the OpenFlow model and centralized network control • Delve into distributed and central control, including data plane generation • Examine the structure and capabilities of commercial and open source controllers • Survey the available technologies for network programmability • Trace the modern data center from desktop-centric to highly distributed models • Discover new ways to connect instances of network-function virtualization and service chaining • Get detailed information on constructing and maintaining an SDN network topology • Examine an idealized SDN framework for controllers, applications, and ecosystems. xiv
  • 19. Copyright © 2021, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Chapter 1 1 DOI: 10.4018/978-1-7998-4685-7.ch001 ABSTRACT The evolving area of the upcoming technology in the era of “Mobile Security” is a 5G network. The aim of this technology is to provide security to the mobile nodes for the load balancing, for the voice security, capacity, quality of services, secure end-to-end communication, connectivity of the devices in a highly mobile network with reliable and scalable networks. The enhancement towards technology leads to connect home appliances with IoT devices, industries, business. Therefore, security-related issues will also increase. In wireless communication, devices want to connect all the time, which primes the vulnerabilities, increases network traffic at the device side on the channel, and creates the backdoor for the hacking and cracking mechanisms for the wireless devices. INTRODUCTION 5G is not individual around “quicker, superior or improved” networks, it is all about distressing approximately every characteristic of our subsists and empowering an assorted innovative customary of amenities. Nevertheless, 5G have their potential, that is, its applications must be distributed very strongly and sanctuary matters Security Challenges in Network Slicing in 5G Rashmi Mishra https://orcid.org/0000-0003-0015-8732 Delhi Technological University, India & ABES Engineering College, Ghaziabad, India R. K. Yadav Delhi Technological University, India
  • 20. 2 Security Challenges in Network Slicing in 5G essential remain dispensed through the system foundation since from the self-same commencement towards defending equally the systems and clients. Along with 5G, the mobile network takes that security on another close with an extensive diversity ofinnovative,forward-thinkingprecautions(McKeownNet.al.,2008).ThisChapter pronounces those precautions in deepness, as well as the susceptibilities and bout paths, they are intended towards moderate. Safeguarding mutual equal level of security for all tenders which shape slicing notion, in this case, can also be difficult. There are several features of slicing i.e., isolation and protection might create attack methods such as weak isolation will lead to another resource with better parameters, lower cost. From the industry point of view, following eight major necessities of 5G are recognized (Ericsson,2015): • 1~10 Gbps data rates in physical networks: This data rate is almost 10 times faster than the existing LTE networks that are 150 Mbps. • Round trip latency is 1 ms: It is almost 10 times faster than 4G’s RTT. • High bandwidth in the unit area: It will increase the connectivity of the devices with very high bandwidth. • An enormous number of connected devices: It will connect thousands of devices in one go. • Availability of network: 99.99% network will be available in 5G. • Coverage of network anytime, any ware: Network should be available anytime as per user location. • Energy consumption should be reduced: Development of technology will lead the usage of 5G network energy consumption is reduced by almost 99% • High battery life: It is very important in the emerging 5G network is that it reduce power consumption. Manyofthewirelessindustries,university,andresearchofficialdomshavestarted working in 5G wireless systems such as Ericsson, Qualcomm, Docomo, Huawei, Nokia Solution Networks, METIS, Samsung electronics, 5G training, 5G Forum, 5GNOW. Visions of these companies discussed in the table 1 and reference in table 2 (Ericsson,2015):
  • 21. 3 Security Challenges in Network Slicing in 5G Table 1. Company & their vision Table 2. Company, Publisher, Year of Publication
  • 22. 4 Security Challenges in Network Slicing in 5G Network Slicing Is one of most recent technology comes into picture that provides elasticity, scalability, flexibility and provides the security in a way that it creates the logical networks which share the common hardware infrastructure? The primary idea was introduced by (Peterson, L. et.al., 2006) in a paper” A blueprint for introducing disruptivetechnologyintotheInternet”.Slicingmightalsousediversedaises,which means slicing mechanisms can be applied in Operating System, kernel level, in the virtualization software systems, firmware or even in regular software. In this wide range of situations, the slicing mechanisms will be provided by diverse sellers. Furthered incorporation concept of software-defined networking and network functions virtualization. But, allowing multiple tenants to share single resources must ensure the security needed for those scenarios (Joseph et al., 2008). The crucks of this research are to describe the overlay network, plant lab in which the environment is created for the sliced network to use the same design and utilize the different services. Having several features of the network slicing in 5G there are various security problems faced by the company and one of the most important area is security such as Denial of Service attack (DoS), attackers may exploit the systems which support the slicing and Slice-initiated attack. Figure 1 (NTT Docomo,2015) shows the network architecture for secure and dynamic network: Figure 1. Network Architecture for Secure and Dynamic Network
  • 23. 5 Security Challenges in Network Slicing in 5G The 5G marketplace is a massive commercial prospect for mobile machinists and their commercial associates (Guermazi A, 2011). Though, the strategies and usage also grow probable cyber threats. Such as a Distributed Denial of Service (DDoS) attacks. Many of the industries provide a layer of security for the operators, vendors, ethics bodies, and connotations procedure an iterative twist of repeated erudition concerning emergent intimidations and retort selections. Some of the actions have to be taken to mitigate an attack for the control aspect. Some of them are proactive while others are applied after the attacks have been taking place. Typically, there are two types of attacks that have been carried out on the 5G network of any business outlook. The first one is a Zero-day attack and the second one is the Day-one attack. A zero-day attack is a threat that does not have predefined signatures or previous history/fingerprints. Classically, the security supervisor recognizes eccentricities in identified upright behavior of the carter cloud, as well as tenders that demand amenity and state. After identification of the abnormal behavior, the action is taken to moderate the attack or to contract supplementary perceptibility to appropriately recognizethechallenger.InDay-oneattacks,threatsthathaveapredefinedsignature orfingerprint,amoderationstratagemhappensinadvancetoknobtheattack.Controls are carried to formulate the alterations to the carter cloud to smear eminence of amenity fluctuations in per-hop behavior to diminish the impression of an attack (European Commission,2011). Network Technologies for 5G Security Thenewversionofthe5GnetworkdesignedbyNGMNisworkedonthreeprinciples asFlexiblesecuritymechanism,Supremebuilt-insecurity,Automation.5Gnetwork shouldprovideahighlyrobustsecuritysystemforcyber-attackandsecurityassurance. The 5G security mechanism must be supple for authentication and identification, must adjust according to the environment, security control and threats. The two most important concepts in 5G play a vital role such as virtual network function and software-based network control. These features are expected by Network function virtualization enables vendors to implement network function in software called VNFs and deploy them on cloud and Software-Defined Networking separate the core plane from the data plane, SDN deploys on very high-end servers Figure 2 (NTT Docomo,2015) These two mechanisms provide full proof security to the 5G network. The SDN architecture is divided into three layers named Application plane, Control plane, and Infrastructure plane. Application plane consists of QoS management, network management, and security services, Control plane consists of Network Operating Systems which logically centralized the network, it also provides the hardware concept to the Application plane. The infrastructure plane is also known as the Data plane is the instruction of the Control plane which deals with
  • 24. 6 Security Challenges in Network Slicing in 5G the data traffic flows. OpenFlow is the first worthwhile implementation part of SDN and follows the three-tier architecture named OpenFlow applications, OpenFlow controller and OpenFlow switches. Security Issues Introduced by Network Slicing In 5g The main feature of the Network slicing is Seclusion. More is Seclusion more is unfailing of network slicing. In a network, if there is a single slice it means a network isun-slicedanditisawell-researchedtopic.Slicingmeansthenetworkinfrastructure is divided into multiples parts and each part will share the same infrastructures. The minimum requirements are set for each sliced network are coexistence. But for the isolation of each slice Tavakoli et al., defines an abstraction layer for an end to end isolation and the author also introduces the adequate security policies. Other than this author also states that currently no isolation capabilities are defined by any other author. Then is important to design a mechanism for the security of isolation. In the current mobile network if flooding Distributed Denial of Service attack is attacked by the attacker then only that service will be affected. However, in a 5G network if the DDOS is performed by the attacker then other services will also be affected. This isolation is required for the slicing. Figure 2. shows the SDN architecture
  • 25. 7 Security Challenges in Network Slicing in 5G Protuberant forms, such as next-generation mobile networks (NGMN) ETSI’s, NFV (for virtual network function life cycle), allotted endorsements aimed at network slicing security in 5G, which assisted the documentation of intimidations in the universal packet essential. Security principles on network slicing SecurityPrinciples:Somesecurityprinciplesarefollowedbyanyofthesubstructures for secure communication. • Confidentiality: In (Guermazi and Abid,2011) have proposed a key distribution is used for the secure communication process. In (Yun et al.,2008) says that the communication process in between the sensor nodes should be secure. The idea of confidentiality is used to avert intended or unintended illegal exposé of message contents. • Integrity: In (Diop et al.,2013) use the cryptographic hash function to ensure the integrity of the message. Modifications of data by unauthorized adverts or processes. Table 3. shows the threats on SDN layers
  • 26. 8 Security Challenges in Network Slicing in 5G • Availability: The idea of Availability guarantees that “RIGHT INFORMATION IS AVAILABLE TO THE RIGHT PERSON AT A RIDHT TIME AT A RIGHT PLACE”. In (Modirkhazeni et al., 2010) depict that the single point of failure may disturb the entire communication in WSN, therefore the connectivity of the network is well defined for the entire lifetime. • Authentication: In (Misra and Dias,2010) Thomasinous say authentication is essential for the authentication of the civilian applications. In (Shi and Perrig, 2004) depict that authentication is necessary for identifying the malicious packet in the transmission process. The idea of Authentication guarantees that, any renewed node should be authenticated first earlier incoming in the network to guarantee its authenticity. • Non-Repudiation: The idea of Non-Repudiation is to guarantee that the sender can’t deny that he was not sent the data or any node cannot refuse to send the data to another node. • Access Control: An Authorized person can access the data to whom he claims to be. Security Threats and Recommendation The next-generation mobile network is used in the 5G network and for the security measures that are not implemented as far or not available. The recommendation tourist attractions of the confines in the access network and for the cyber-attacks in theexistinginfrastructures(YunZetal.,2008).RecommendationsareFlashnetwork traffic, security of radio interface keys, User plane integrity, Mandated security in the network, Consistency in subscriber level security policies, DoS attacks on the Infrastructure (A. Osseiranet et al,2014). • Flash network traffic: In today’s scenario, mobile nodes are increasing day by day, therefore the in a large number of scales there will be changed in the network traffic pattern that could be either accidental or malicious. Thus, it is recommended that a 5G system must minimize large swipes in traffic tradition and afford elasticity. • Security of radio interface keys: Keys were sent in an insecure manner in the previous generation. But in 5G systems, keys sent in a secure manner such as by using SS7/Diameter. • User plane integrity: In 3G and 4G does not provide a cryptographic veracity shield for the user plan. Therefore, it is recommended that protection will be provided to the transport and application layer. But E2E application-level security will create too much overhead in the transmission.
  • 27. 9 Security Challenges in Network Slicing in 5G • Mandated security in the network: 3G and the 4G network are having a constraint on service-driven approach and do not provide system layer security. Therefore, it is recommended that it must be instructed in 5G is to investigate the critical security challenges. • Consistency in subscriber level security policies: It is highly in demand that user security parameters will not change if the user is in roaming mode means the operator is changed. In case if the user is in highly roaming mode then it might be possible that security services will not be updated on time. If the user is in roaming mode, the services will be provided by the Mobile Edge Computing and using latency-sensitive services, so will the security services will be updated on the user mobile. This needs security policy, for this recommendation discuss the possibility of using the virtualization technique. • DoS attacks on the Infrastructure: DoS and DDoS attacks might disturb the operation of infrastructures such as energy, health, transportation and telecommunications and many more. So, it is a recommendation that the network should be capable of handling several connections with a different number of operating capabilities and limitations. Other Security Challenges Security challenges of the 5G network are divided into 3 categories such as Dos attack, Access of network and the core network (Modirkhazeni A et al., 2010) Dos attack DoS attack in 5G network target the bandwidth, memory, processing unit, radios, sensors, operating system, applications, user data, the configuration of the network and the connectivity of the network infrastructure (Diop A et al., 2013). DoS means a large number of connected devices will target the single destination it may be a user and an infrastructure. Attack on user depicts that the user not able to access the services provided by the operator and attack against the infrastructure is to deplete the network resources. Although the operator of the network is not affected the individual subscribers may get affected. Another case of DoS attack is that affected users of the infrastructure may target their infrastructure. Hence for free DoS and DDoS attack, we have to focus on the following areas (Qualcomm,2014):
  • 28. 10 Security Challenges in Network Slicing in 5G • The user plane may support two-way communication of the nodes/mobile. • Authentication of the signaling plane. • Bandwidth assignment. • Connectivity checks regularly. • The management plane should support the network configuration so that the user and signaling plane will be maintained. Access of the Network One of the major challenges is data send by the nodes and received by the nodes is not secure and it may increase the jamming of the network. The malicious nodes will send the excessive signaling traffic that leading to a DoS attack. Such type of activity will be identified on time so that the user plane will be protected. Network and services should be accessible by the authenticated nodes/sensors such that vulnerabilities will get protected. 5G network uses higher throughput, lower latencies, extended coverage, etc and various types of access technologies. To keep the network occupied/working, the 5G network will able to recover the network from the jamming attacks of the radio channels. The addition to this node must be secure due to its geographical distribution (Huawei,2013). Security Challenges in the Core Layer The enormous dissemination of the IP protocols on the user and core plane makes the 5G network vulnerable to attack. Therefore, the availability of the network must be improved including resilience against signalling-based vulnerability (Misra S et al., 2010). The 5G network should ensure emergency communication if the network is either inaccessible. Other challenges in the 5G network are that there are several infected devices on the network such as IoT devices or M2M devices is ready to attempt the DoS attack or jamming the channel. IoT devices are resource constraint therefore they request the services in two-mode (Shi E et al., 2004). First, these devices will request to perform processing, storing, sharing of information in the cloud. Second, these devices will easily be compromised and the DoS attack will perform by the nodes. Security Solutions for SDN The architecture of the SDN provides a high level of security monitoring, traffic analysis and system response for the amenities forensics. By the help of cycle of harvesting intelligence SDN quickly find threat from the network resources, circumstances,andfaults.SDNarchitectureisveryusefultofindthetrafficredirection
  • 29. 11 Security Challenges in Network Slicing in 5G through flow-tables, update, analyze, reprogram the network without the use of hardware configuration (Rutvij H et al., 2012). Application Plane Security Featureofcentralizedcontrolarchitecturemakeseasytouseapplicationbyaltruistic with network statics and characteristics of the packet. The SDN control plane is worked in between the hardware and applications for hiding the complexities of the existing network. PermOF is predefined system permission is used for access control and access control of SDN applications (G. Wunder et al,2014) . The main working of PermOF is to provide announcements, warning, recite, inscribe and system authorization for certain applications of SDN. Another security measure is NGMN. NGMN is used in the application layer for data integrity, it will defend the data outside the mobile network, end to end security, user plane data integrity, protection form battery consumption in IoT devices. Control Plane Security Many of the researchers have been published schemes and security proposals for the control plane such as the Security-Enhanced Flooding Controller, another extended version of the SEFC is also published. Usually, the reactive controller is worked on the flow request when it comes to the controller and proactive controllers are used to installing the flow rules. The control plane is a mediator of the data plane and the application plane. So, by security the control planes the whole network should be secured by adding some secure program northbound API. It will validate the rules which are generated by the application layer and also steadfastness the skirmishes between the applications (Ahmad I et al, 2018). Controller resilience policies have been proposed by the author to mitigate the risk of failure of the controller due to scalabilityissuesbytheuseofredundancy,distributedcontroller,storagemaximization and maximizing the processing capabilities and resolve the DoS attack. The SDN support wildcard OpenFlow directions will send the aggregated the client data to the server and microflow requests were managed by the controller but this leads to the failure due to the DoS attacks. Therefore, numerous load balancing techniques were proposed and suggested by many researchers with multi-controllers in the network. Data Plane Security Data plane sends the packets through the channel also vital for security apparatuses suchasauthentication/authorizationbecausetheapplicationinstalledweremodified, change, update and delete the flow rules in the data plane. Therefore, security
  • 30. 12 Security Challenges in Network Slicing in 5G mechanisms are needed for authentication and authorization. Multiple controllers have been proposed by the authors if one controller fails and another will provide the flow rules (Jangra1 A., et al). FortNox mechanism is used to permit the controller for checking the illogicality in the flow rules in the application plane. FlowCchecker mechanism is used to find the inconsistencies in the flow rules in the data plane. CONCLUSION AND FUTURE SCOPE This chapter is mainly focused on 5G network slicing security for mobile users. 5G network is designed to obtain security beyond the existing limitations. Security in 5G will leads to preserving the load balance, energy constraint of the mobile nodes and size of the clusters/cell which is the main disadvantage of the existing 4G network. Security mechanisms of the 5G network should be designed in such a way that it will be secure from the future threats that were introduced by the attackers and the limitations of the 4G networks should not be propagated in the 5G network. Devices that are connected from the 5G network should also be secure form the malicious program introduced by the adversaries. Load balancing of the network architecture should be developed in such a way that it follows the security policies developed by the SDN and free from saturation attacks. As far as security of controller is concerned, if the security of the controller is not taken into account then it introduces a delay in flow rules and protocols in the switches and if switches will get congested then it leads to the unsought traffic flow. Another constraint is the capacity of the network. If the capacity of the networks is not taken into account then it leads to the DoS attack. So, it is advised to design a mechanism in such a way that it will keep the limitation of mobile nodes or sensor nodes in IoT. REFERENCES Ahmad, I., Liyanage, M., Shahabuddin, S., Ylianttila, M., & Gurtov, A. (2018). Design Principles for 5G Security. A Comprehensive Guide to 5G Security, 75–98. Diop, A., Qi, Y., Wang, Q., & Hussain, S, (2013). An advanced survey on secure energy-efficient hierarchical routing protocols in wireless sensor networks. Int J Computer Sci Issues, 10, 490–500. Docomo, N. T. T. (2015). 5G radio access: Requirements, concepts technologies. White paper. Ericsson. (2015). 5G radio access. White paper.
  • 31. 13 Security Challenges in Network Slicing in 5G European Commission. (2011). HORIZON 2020, The EU framework program for ResearchandInnovation.Available:http://ec.europa.eu/programmes/horizon2020/ 5G Forum. (2015). Make it Happen: Creating New Values Together. Available: http://www.5gforum.org/ Guermazi, A., & Abid, M. (2011). An efficient key distribution scheme to secure data-centric routing protocols in hierarchical wireless sensor networks. Proc ComputSci, 208–15. Huawei. (2013). 5G a technology vision. White paper. 5G Infrastructure Public-Private Partnership. (2013). Available: http://5g-ppp.eu/ Jangra, A., Goel, N., Priyanka, & Bhati, K. (2010). Security Aspects in Mobile Ad Hoc Networks (WSNs): A Big Picture. International Journal of Electronics Engineering, 189-196. Joseph, D. A., Tavakoli, A., & Stoica, I. (2008). A policy‐aware switching layer for datacenters.ProceedingsoftheACMSIGCOMM,51–62.10.1145/1402958.1402966 McKeown,N.,Anderson,T.,Balakrishnan,H.,Parulkar,G.,Peterson,L.,Rexford,J., Shenker,S.,&Turner,J.(2008).OpenFlow:Enablinginnovationincampusnetworks. Computer Communication Review, 38(2), 69–74. doi:10.1145/1355734.1355746 Misra,S.,&DiasThomasinous,P.(2010).Asimple,least-time,andenergy-efficient routing protocol with one-level data aggregation for wireless sensor networks. Journal of Systems and Software, 83(5), 852–860. doi:10.1016/j.jss.2009.12.021 Modirkhazeni, A., Ithnin, N., & Ibrahim, O. (2010). Secure multipath routing protocols in wireless sensor networks: a security survey analysis. Proceedings of the2nd international conference on network application protocols and services, 22833. 10.1109/NETAPPS.2010.48 Nokia Networks. (2014). Looking ahead to 5G: Building a virtual zero latency gigabit experience. White paper. Osseiranet,A.(2014).IEEE:Scenariosfor5Gmobileandwirelesscommunications: The vision of the METIS project. IEEE Communications Magazine, 52(5), 26–35. doi:10.1109/MCOM.2014.6815890 Peterson, L., & Roscoe, T. (2006). The design Principles of PlanetLab. Operating Systems Review, 40(1), 11–16. doi:10.1145/1113361.1113367 Qualcomm Technologies, Inc. (2014). Qualcomm’s 5G vision. White paper.
  • 32. 14 Security Challenges in Network Slicing in 5G Rutvij,H.,&Jhaveri.(2012).ANovelApproachforGrayHoleandBlackHoleAttacks in Mobile Ad-hoc Networks. IEEE. Samsung Electronics Co. (2015). 5G vision. white paper. Shi, E., & Perrig, A. (2004). Designing secure sensor networks. IEEE Wireless Commun Mag, 11(6), 38–43. doi:10.1109/MWC.2004.1368895 5G Training and Certification. (2014). An Initiative Project in Preparing5G Competence. Available: http://www.ieee-5g.org/about/ Wunder,G.,Jung,P.,Kasparick,M.,Wild,T.,Schaich,F.,Chen,Y.,Brink,S.,Gaspar, I., Michailow, N., Festag, A., Mendes, L., Cassiau, N., Ktenas, D., Dryjanski, M., Pietrzyk, S., Eged, B., Vago, P., & Wiedmann, F. (2014). 5GNOW: Non-orthogonal, asynchronous waveforms for future mobile applications. IEEE Communications Magazine, 52(2), 97–105. doi:10.1109/MCOM.2014.6736749 Yun, Z., Yuguang, F., & Yanchao, Z. (2008). Securing wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials, 10(3), 6–28. doi:10.1109/ COMST.2008.4625802
  • 33. Copyright © 2021, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. Chapter 2 15 DOI: 10.4018/978-1-7998-4685-7.ch002 ABSTRACT Pervasive computing has been greatly supported by the internet of things. The use of internet of things has created the environment that helps in the management of the different modules that are the part of the complete system, which can work effectively without the interference with the other components of the system. The cloud environment with the internet of things can help in getting the greater extend of data sharing. Little attention has been provided to the security of the various stakeholders that are the part of the system. IoT cloud integration involved privacy, security, and personal safety risk of the stakeholders. Not only are these types of security attacks possible, but there is also the possibility of attack on the IoT components like hardware manipulation to disrupt the services. As we are on the network, all the communication attacks of network are also possible. This chapter will cover common aspects of regarding the cloud and internet of things (IOT) with 5G networks. Security Perspective of Cloud and Internet of Things With 5G Networks Neetu Faujdar Amity University, Noida, India
  • 34. 16 Security Perspective of Cloud and Internet of Things With 5G Networks INTRODUCTION Cloud computing technology, seen as the staggering framework overcome, might convey us to the “cloud society” after the PCs and the Internet conveyed people to the “compose society” (D Singh 2015, Atzori 2010). In the arrangement of Cloud Computing, all the ordinary utilization of PCs will be moved into the fogs (virtualized mass computational servers which organize on the Internet), all we need is a passageway to the Internet and after that we can play out any work on the cloud (R Khan 2012, J Gubbi 2013). Disseminated processing is the latest headway in the movement of figuring power. It cuts down the reason for segment, enabling access to enlisting power effectively only available to the greatest affiliations. It furthermore enables tinier relationship to utilize totally directed enlisting structures, decreasing the essentials for extraordinarily capable IT staff. Dispersed figuring insinuates applications passed on as organizations over the Internet and besides the hardware and structures programming in the server cultivates that give those organizations. At the point when all is said in done, Cloud Computing is internet dealing with, whereby shared resources, programming, and information are given on enthusiasm to PCs, mobile phones, and other practically identical contraptions (M Nia 2015, H Salmani 2016). Disseminated figuring is also another style of preparing in which dynamicallyadaptableresourcesaregivenasvirtualizedorganizations.Thislicenses pro associations and customers to change their preparing limit dependent upon what sum is required at a given time, or for a given task. Circulated figuring is sifted through on stages like Google, Salesforce, Zoho, Axios Systems, Microsoft, Yahoo, Amazon (M Tehranipoor 2010, G Lafuente 2015). Cloud Computing Security Issues Cloud Development Models Cloud model fix, fixes, stage, amassing, and programming establishment is surrendered as organizations measure or down depend on the web. It has three standards delivery models (J Mineraud 2015, S Abdelwahab 2014): 1. Private Cloud: Private cloud is another name utilized by customers nowadays to delineate consumed copies appropriated enlisting in the private structure. These are arranged up in the inward server ranch exercises of an affiliation. In privatemists,thedata,forexample,virtualassetsandversatileapplicationsthat are given by different customers are gathered together and are made accessible for cloud client for purchasing and selling.
  • 35. 17 Security Perspective of Cloud and Internet of Things With 5G Networks 2. Open Cloud: Open spread disseminated processing infers that customary standard definition, when the advantages are watchfully given a fine-grained, self relationship towards reason on the web, from an external supplier who is off-website and he gives property and bills on nitty gitty utilize comprehension of the explanation. 3. Half and half cloud: Cross breed cloud is a subtype of private cloud which is associated with various cloud affiliations, half regulated given as a specific unit. It changes virtual IT into a blend of both private and open fogs. Cream cloud gives increasingly secure control of data and applications and licenses, a gathering of programming to get the information on the Internet. Service Delivery Models of Cloud Computing Imitating cloud shows settlements, however the accompanying security perceives diverse transport circulated processing the board models. The three standards movement cloud the executives models are: Infrastructure-as-a-Service (IaaS), Plateform-as-a-Service (Paas) and Software-as-a-Service (Saas) (W. A. Jansen 2011, S. L. Keoh 2014). 1. IaaS: IaaS is a singular occupant cloud layer in which steady resource cloud comprehension of simply offering to accessible customer based on pay-per- use.Thisimmenselydiminishestherequirementforhugebeginningenlistment of hardware financing. SaaS: It is a conveyance product that shows which applicationsarefacilitatedbyasellerorsupplieradministrationandisavailable for clients within a system, normally the Internet. 2. SAAS: has become a pervasive conveyance inexorably outward as subject innovationsthathelpwebadministrationsandtheadministrationbuildinglocated design experienced and new techniques formative get to grow dramatically. SaaS is also often connected to a membership model that allows Pay As You Go. Then, the broadband management has the permission to allow the client access from more regions far and wide. 3 Paas: It is a programming and enhancements found contraptions encouraged servers providers. This can be one layer higher than IaaS. It gives the client a joint scope of natural planners that can inspire the developers to build the applications. Cloud Computing in Mobile Applications User module
  • 36. 18 Security Perspective of Cloud and Internet of Things With 5G Networks 1. Registration process 2. Login process 3. Service searches 4. Make inquiry process 5. Get information about service-man/woman 6. Send feedback about service 7. Edit profile process 8. Change password process Admin Module 1. Login process 2. Register service provider person 3. Manage registered service provider person 4. Manage inquiry from user 5. Assign inquiry to service provider person 6. Send information about person who assign for service 7. Get feedback about service from user 8. Change password process IOT IOT is basically components of a device or devices or any other physical article that are linked over an internet network. These devices are linked with each other over a network and can transmit instructions and information with each other. It is a combination of hardware and software components of a device or a machine. Just how a robot works based on the instructions given to it similarly, the functioning of these devices and machines can be controlled and commanded by humans. The decisions taken by these devices depend upon its surrounding environment. These devices are accordingly programmed based upon the actions and the work that are expectedfromit.InEarliertimesinternetwasassociatedwithlaptopsandcomputers only. With advancement in technology internet got linked with smart phones, smart watches and tablets. But now we see that internet is being used everywhere like the concept of smart homes, in automobiles, automatic driving, surveillance and safety, etc. This Figure 1 gives data about number of IOT connected gadgets installed throughout the world from 2015 to 2025 (C. Lesjak 2014, P. N. Mahalle 2013, W. John 2013).
  • 37. 19 Security Perspective of Cloud and Internet of Things With 5G Networks There are assortments of techniques that are used by IOT devices and gadgets to link with each and exchange information with each other. These devices may use wireless network for connectivity. Wi-Fi’s and Bluetooth are largely used in workplaces, offices, industries, schools, colleges and even in homes. Some gadgets also use LTE and satellite connection for connection and transfer of data. It is believed that after few years 5G networks will come under use by the IOT ventures. The main advantage that 5G network provides is that it allows to approximately 1 million 5G devices to connect in a given square kilometer. In this way a large number of sensors can be used together in a little region. After the development of the IOT industry the cloud will gather less information for operation. If operation of information is completed on the device itself and just the important data is received by cloud, then the expenses can be minimized. Various new innovations will be needed for this. IOT comprises of four main sections that is Sensors or gadgets, Connectivity, Data processing and User Interface (Ian F 2015, M.Karakus 2017). Figure 1. Number of IOT connected gadgets installed throughout the world from 2015 to 2025
  • 38. 20 Security Perspective of Cloud and Internet of Things With 5G Networks 1. Sensors: Sensors. Or gadgets assemble all the information and data from its environment. This information can be a simple data like speed of a car, its acceleration, etc and can even be highly complex like an audio or video. A sensor can be existing individually or a number of seasons can be grouped togethertoformagadgetoradevice.E.g.Acarisgadgetwithnumeroussensors. 2. Connectivity: After the sensors of a device acquire all the necessary data it has to be delivered to the cloud. The sensors can be associated with the cloud throughvarioustechniqueslikesatellite,internetnetwork,Bluetooth,Ethernet, etc. The choice of the mode of connectivity depends on various factors like power consumption, bandwidth, range of signals and many others. 3. Data Processing: Software is important for the processing of the data that is received by the cloud. This processing can be done by single software or more number of software depending on the complexity of information. E.g. GPS determining the time taken to reach our destination while driving a car. 4. User Interface: After the data is processed it is send to the user through a text message, signal, and voice or by any other form. User interface is responsible for allowing the user to analyze, monitor or change the system settings. E.g. ChangetheA.C.temperature.Sometimesthesystemsperformsomeofthetasks automatically too depending on the system settings or in case of emergency situations. IOT and automobile industry and its applications Internet of things is not a extravagant innovation in this era. It’s here and quick changing the manner in which we live. The automotive industry is widely benefited bytheinnovationsmadethroughinternetofthings.Ithasprovideduswithsignificant transportation facility and administration abilities. It is driving us to time where we will have smart, independent and self governing vehicles. Automotive industry is quickest developing marketplace for IOT-based arrangements. It is believed that by the year 2020 greater than 250 million autos are estimated to be associated with internet which features the effects of IOT in the automobile industry. The amount of network units in vehicles is probably going to grow by 67% throughout the following two years, and the purchaser spending on connected systems in automobiles is presumed to double by the end of ten years. Drivers around the world anticipate that their vehicles should become cell phones on wheels, and IOT is demonstrating that vehicle network is by far the best innovation that man has introduced. Applications of IOT in automobile industry are as follows (Brief 2015, P. Demestichas 2013, Van-Giang 2016).
  • 39. 21 Security Perspective of Cloud and Internet of Things With 5G Networks Prescient maintenance technology Prescient maintenance technology is used to avoid costly repairs in vehicles. This technology depends upon the utilization of IOT network that assemble information of various parts of the automobile. It then conveys that information to the cloud and assesses the dangers of potential breakdown or faults of a vehicle’s equipment or in its software. After data is prepared, the driver is informed about any essential or obligatory service or fix to keep away from any potential occurrences. It empowers end clients to get the correct data before time. With IOT network instruments, you can avoid any kind of breakdowns in the course of the ride. Prescient maintenance technologyisconnectedwiththealgorithmsofmachinelearning.Thesecalculations are astoundingly successful at detecting things such as battery life. Here’s the means by which it works (P. Ameigeiras 2015, H. Kim, 2013): i) The battery status is examined by a in- vehicle detector system. ii) Information is delivered to the cloud. iii) The battery status is checked by the algorithms of machine learning. iv) All sources of information is prepared by the system and accordingly guidance is given to the driver. v) Then the system delivers a notification to the driver cautioning them about the low charge in the battery. The prescient maintenance calculation proceeds in the following way: i) Information is gathered from the engine starter, fuel siphon, and the battery. ii) Information is transmitted to a cloud server. iv) Any possible system issues in the vehicle are predicted by the cloud. v) Suggestions are conveyed to the driver by means of an associated gadget. Figure 2. How does prescient maintenance technology works
  • 40. 22 Security Perspective of Cloud and Internet of Things With 5G Networks In-car entertainment and information system The entire vehicle industry is driving towards making innovative and inventive headways to improve accessibility associations and correspondence inside the vehicle, overhaul vehicle assurance and security, and update in-vehicle customer experience.Cleverapplicationsarebeingassociatedwithvehicleinfotainmentsystems to give in-vehicle course, telemetric, and delight. Google has worked together with a couple of automakers to organize its applications, for instance, Google Maps, Play Store, Google Earth and Google Assistant into the systems of in - vehicle infotainment. Apple Car Play is likewise given as a part in different vehicles. Most vehicle infotainment systems utilize the affixed or brought together structure, which needs them to be related with an external device for web accessibility, for instance, a mobile phone. Vehicles will before long have programming and web organize office embedded into their infotainment structures, empowering drivers to move toward maps, on-demand infotainment, and different other web related offices (H. Kim 2013, K. Pentikousis 2013). Amalgamation of automobile frameworks are used to convey information and entertainment to the vehicle driver and the passengers through sounds and videos, controltouchscreencomponents,Voicedirections,etc.AsperMarketsandMarkets, the in-car infotainment market is roughly calculated to extend USD 30.47 billion by 2022 which is at a CAGR of 11.79%. Investigation proposes that in-car infotainment Figure 3. The prescient maintenance calculation method
  • 41. 23 Security Perspective of Cloud and Internet of Things With 5G Networks market is operated by the expansion in manufacture of automobile, innovative development and expanding interest for opulent automobiles. Fundamental parts of an in-vehicle information and entertainment framework are as follows (W. Li 2016, R. Masoudi 2016): Coordinated Head-component: It is a touch screen device, a gadget that looks like a tablet or a mini wall TV that is attached on the automobile’s dashboard. It has easy to use HMI, the head part goes about as an impeccably associated control panel for the infotainment framework. Heads-Up Display: It is an indispensable component of exclusive infotainment frameworks, which shows the automobile’s ongoing data on the see-through screen coordinated with the automobile’s windshield. Heads-up showcase assists in diminishing the driver’s diversion while driving and helps him with primary details like speed, route maps, and data from vehicle’s OBD port-II, atmosphere, interactive media choices, etc. ExclusiveDSPsandGPUstohelpnumerousdisplays:Nowday’sinfotainment frameworks are supported by incredible car processors designed for powerful and smart framework of the automobile. These car processors are effective in showing contentonnumerousdisplays(forexampleHead-upDisplay,Windshield,Connected cell phones, Head Unit, etc) and conveys an upgraded experience to drivers and travelers in the vehicle. Operatingsystems:Invehicleinfotainmentframeworksneedworkingframeworks that are called “operating systems” fit for handling availability of connections and networkandprogrammingapplicationstocoordinatenewfeaturesintheframework. OperatingsystemslikeAndroid,QNX,Windows,Linuxaredrivingtheinfotainment fragment. CAN, LVDS and other network support (according to the prerequisite): The electronic equipment parts in infotainment frameworks are interconnected with specific systematic protocols for communication, example, CAN (Controller Area Network). CAN or some other system enables microcontrollers and gadgets to speak with one another without the host PC. Connection Modules: Infotainment frameworks incorporate GPS, Wi-Fi, and Bluetooth to provide network with outside systems and gadgets. These functions assist in setting up services like giving route directions, web network and cell phone coordination with the infotainment framework. Car Sensors Integration: Signal acknowledgment sensors for identifying surrounding light, camera sensors and numerous other sensors in the automobile coordinate with infotainment frameworks to give data related to safety to the driver and if there is any danger around .
  • 42. 24 Security Perspective of Cloud and Internet of Things With 5G Networks Computerized Instrument Cluster: In today’s time infotainment frameworks have changed the car cockpit structure from static structure of the in-car instruments to advanced instrument groups and are digitalized. Advanced instrument groups incorporate computerized displays of the old measuring instrument in the vehicle like speedometer, odometer, RPM etc. Safety and surveillance External sensors are additionally utilized as back view cameras and vicinity sensors that guide in blind spot identification and help in accurate parking, and more secure driving.Driversaresecuredduetopresent-daysensorsthatcandetectencompassing traffic on the road and the surrounding environment to guarantee safe driving. Also, with the utilization of mesh arranged vehicles on the road, installed frameworks can anticipate and keep away from crashes and avoid any accidents. Information examination and dashboard detailing Connected autos offer driver information crucial for the improvement, prototyping and testing of better self-driving vehicles. As the number of vehicles with IOT empowered frameworks are increasing the nature of information will definitely improve.Withinformationinvestigationanddashboarddetailingdevices,associations Figure 4. System Architecture of IVI
  • 43. 25 Security Perspective of Cloud and Internet of Things With 5G Networks in the automobile business can keep on improving their contributions and better serve the requirements of their clients. Real time vehicle scanning system IOT permits continuous information sharing from vehicles to makers those aides in the improvement and advancement of upkeep, assemblage and production processes throughout the lifecycle of the automobile. By sharing this information with vehicle makers it additionally encourages them to improve prescient experiences to permit quicker reaction times, if there are any difficult or risky issues that might lead to an accident in the future. In this way it becomes simpler for makers to be responsible and proactive in emergency situations. Connected vehicles enable producers to legitimately and effectively tell the drivers about any issue in the vehicle and automatically operate necessary tasks like booking a vehicle servicing meeting with the closest vehicle dealer or service center. This makes sure that vehicles are consistently serviced without bothering the client. As car IOT advancements keep on developing, they are opening a large amount of chances for automotive market to lift up their businesses. The associated vehicle market includes various sub-sections that include diverse innovation usage. Car makers, media communications suppliers, and software suppliers are taking an interest in every one of these fragments. 5G Network Architecture and its Applications In the present life 4G arrange is attempting to give solid information and IP network and administrations up to 1 Gbps. 4G systems turns out to improve the advancement of the system execution, cost, effectiveness and give the mass market IP-based administrations. Still the interest is going high because of different example of portable traffic is expanding strain on cell systems. To conquer this issue the future 5G arrange is going to dispatch. 5G system will give the principal foundation to billionsofnewgadgetswithlesstrafficinthesystem.Presentlyaday’s5Ginnovation is most needed research point for the specialists. So inquires about are as of now in progress investigating distinctive building ways to address their key drivers. SDN (Software Defined Network) innovation has been assuming a vital job to plan the 5G remote system. So in this area will perceive how SDN innovation is developed in the plan of 5G remote system (Tomovic 2014, Van-Giang 2015). ThroughconsistenteffortandconfirmationTelecomchairmenarecompletingan automatedchangetomakeaprevalentpropelledworld.Tooutfittriesandindividuals with a continuous, on demand, all on the web, DIY, social (ROADS) experience requires an end to-end (E2E) encouraged building featuring deft, customized, and
  • 44. 26 Security Perspective of Cloud and Internet of Things With 5G Networks keen movement during each stage. The thorough cloud modification of frameworks, movementstructures,andorganizationsisabasicforthisenthusiasticallyanticipated propelled change (SBH Said 2013, J. Costa-Requena 2015). The “All Cloud” procedure is an enlightened investigation into equipment asset pools, Gives consistently autonomous system cutting on a solitary system foundation to meet differentiated assistance prerequisites and gives DC-based cloud engineering to help different application situations. ᵒ Uses Cloud RAN to recreate radio access systems (RAN) to give enormous associations of numerous models and actualize on-request arrangement of RAN capacities required by 5G. ᵒ Simplifies centre system design to execute on demand setup of system works through control and client plane division, part based capacities, and bound together database the executives. ᵒ Implements programmed arrange cutting assistance age, upkeep, and end for different administrations to diminish working costs through nimble system O&M, circulated programming design, and programmed sending. Administrators change systems utilizing a system engineering dependent on server farm (DC) in which all capacities and administration applications are running on the cloud DC, alluded to as a Cloud Native design (P. Demestichas 2013, Ali-Ahmad H 2013). The 5G (fifth Generation) is being viewed as client driven idea rather than administrator driven as seen in 3G or administration driven will observed for 4G. Versatile terminals always have the option to join numerous streams approaching from various advances. The 4G cell system uses the multimode versatile system. They expect to give unique client terminal which can participate in various remote systems and beat the structure issue of intensity utilization and cost old versatile terminals (M. Karakus 2017, R Trivisonno 2015). OWRstandsforOpenWirelessArchitecturewhichisengagedtoenabledistinctive extantremotetoaircoherencesimilarlyastomorrowremotecorrespondencestandard in an open building stage. Before long, the creating interest and the various instances of flexible traffic place an extending strain on cell frameworks. To consider the tremendous bulk of traffic passed on by the modern organizations and applications, the future fifth period 5G of remote/flexible broadband framework will give the basic establishment to tons of new contraptions with less obvious traffic models will join the framework. The 5G remote frameworks ought to enable the progression and abuse of tremendous utmost and immense accessibility of marvellous and mind boggling heterogeneous structures. In like way, the framework should be fit for dealing with the confusing setting of errands to help the relentlessly contrasting arrangement of new however then sudden organizations, customers and applications (i.e., including astute urban territories, compact mechanical automation, vehicle accessibility, machine-to-machine (M2M) modules, video perception, etc.), all with incredibly isolating essentials, which will push adaptable framework execution and abilities as far as possible. Moreover, it should give versatile and adaptable usage
  • 45. 27 Security Perspective of Cloud and Internet of Things With 5G Networks of all available non-circumscribing ranges (e.g., further LTE moves up to support littlecells(Non-OrthogonalMultipleAccess(NOMA),FutureRadioAccess(FRA)) for wildly uncommon framework game plan circumstances, in an imperativeness capable and secure way (X. Jin 2013, J. Lee 2014). The new period of remote correspondence is developing 5G technology. Users can be associated with a few remote access advances at the same time because of acknowledgment of omnipresent processing. Key highlights of 5G incorporate help VPNs stands for Virtual Private Networks and Wireless World Wide Web (WWWW) backing, and utilization of level IP. Utilization of level IP empowers distinguishing proof of gadgets utilizing representative names which permits 5G to be worthy for a wide range of innovations. The quantities of components in the information way are decreased because of the utilization of level IP. This outcomes in low capital cost (CapEx) and operational cost (OpEx). 5Gs significant favourable position is high information paces of up to 10Gbps, which is multiple times quicker than the 4G LTE. Likewise, low system inertness of underneath 1 millisecond which contrasts inactivity of 30-70 ms of 4G, makes 5G, route superior to its more seasoned innovation. Notwithstanding these focal points, high framework limit, vitality sparing enormous gadget backing and cost decrease has proposed 5G as the need of great importance. For the ultra-thick 5G systems with enormous remote traffic and administration necessities, the foundation must be isolated from the administrations it offers. System usage can be expanded by enabling separated administrations to dwell on the equivalent fundamental foundation. New items and innovations can be bolstered alongside heritage items by WNV by disengaging some portion of the system. The developing heterogeneous remote systems interest for a more grounded system the board instrument. To accomplish this, we require remote system virtualization (K.K. Yap 2010). Introduction of knowledge against 5G can address the multifaceted idea of Heterogeneous Networks (HetNets) by deciding and offering versatile responses for consider compose heterogeneity. Programming Defined Networking (SDN) has ascended as another astute plan for organize programmability. The fundamental concept towards SDN is to move the control plane outside the switches and engage external control of data through a predictable programming component which is called controller. SDN gives clear considerations to portray the fragments, the limits they give, and the show to conduct the sending plane from a remote controller by methods for an ensured channel. This consideration gets the essential requirements of sending tables for a bigger piece of switches and their stream tables. This united bleeding edge see makes the controller sensible to perform orchestrate the load up limits while allowing basic difference in the framework lead through the brought together control plane (A. Basta 2014).
  • 46. 28 Security Perspective of Cloud and Internet of Things With 5G Networks In heterogeneous systems, multi-connectivity gives an ideal client experience dependent on LTE and 5G capacities, for example, high data transfer capacity and paces of high recurrence, organize inclusion and solid versatility of low recurrence, and open Wi-Fi assets. In situations that require high transfer speed or congruity, a client requires numerous simultaneous associations. For instance, information total from different memberships to 5G, LTE, and Wi-Fi is required to deliver high data transfer capacity. A LTE arrange get to is required to keep up congruity after a client has gotten to a 5G high-recurrence little cell. The 5G adaptable frameworks should similarly reinforce instruments for traffic detachment. It should achieve from starting Quality of Service (QOS) to end requirements for moving toward applications of 5G. In reality, thus as to ensure a bigger QOS the officials, a few undertakings and task has monitored joining SDN and its introduction in future compact frameworks convincing responses for respectingQOSend-customers.In,maker’sinscriptionsmotivationswritinginOpen Flow-enabled SDN frameworks, they orchestrate the related functions conforming to stream where QOS can gain by the possibility of SDN. The makers can present the QOS Flow suggestion in order to develop the flexibility of QOS control in SDN frameworks. Delay estimation In SDN frameworks using Queue model delay estimation is analyzed. The designing proposed in a transport the limit of Open Flow in giving execution requirements to different applications (P. Rost 2016). In the SDN designing, the framework controller keeps up the information in general framework. In the other way, Data plane is appropriated to items switches and switches that offer essential stream sending or guiding subject to stream areas made through the control plane. The per-stream based controller figures guiding approach to give QOS, guarantee and bigger organization assets limits. Moreover, SDN presents an open Application programmability interfaces (API) among the data and control planes Fig.1, shows and offers a programmable framework and offer flexibility to orchestrate movement and rates the association of new headways and organizations, for instance, Open flow, For CES and PCE .This assurance programmability can open intriguing open entryways with respect to 5G adaptable systems. The Open flow is portrayed by the Open Networking Foundation (ONF) as the essential standard show in southbound interface between the data and control plane of SDN designing. It is thoroughly recognized as the predominant SDN show usedininterfacebetweentheframeworkcontrollerandframeworkdevices.However, there are various shows that can address an alternative to Open Flow in southbound SDN interface, for instance, the For CES and PCE shows portrayed by IETF. An epic southbound SDN shows are truly a work in progress and testing (B. Naudts 2012). Single application circumstance for 5G and IOT is the splendid supportable city. Zanellaetal.inspectsurbanIOTdevelopmentsthatareclosetoregulation,andagree that most by far of splendid city organizations rely upon a brought together structure
  • 47. 29 Security Perspective of Cloud and Internet of Things With 5G Networks where data is passed on to a control centre liable for thusly taking care of and taking care of the got traffic. Inside splendid urban territories, sharp transportability is one of the troublesome circumstances where self-administering or helped driving cars demand to constantly screen the direction outside and inside the vehicle and exchange data between the different individuals from the vehicle orchestrate, i.e., vehicle to vehicle (V2V) and vehicle to establishment (V2I) correspondences. Various organizations in a canny city incorporate the leading group of traffic blockage, sullying watching, halting, etc. Consequently, the crucial task of 5G is to facilitate the organization of these different organizations and contraptions in a productive manner, by thinking about the varying thought of the devices (e.g., vehicles moving at different versatility speeds and established traffic road sensors). Adaptability and re-configurability of SDN/NFV is helpful smart urban networks, wherefastre-configurationsofframeworkparametersasdemonstratedbytrafficstate would enhance the capacities in supporting and upgrading splendid urban networks organizations. For example emergency organizations could be passed on business orchestratewhilere-configurabilityofSDN/NFVwillconsiderassuringtheguarantees required for such emergency organizations. To engage such re-configurability, data from sharp city organizations can be abused, with the ultimate objective that adroit city framework and organizations could stay in amicable manner (P. Sidhu 2015). In 5G frameworks, C-RAN is gripping from having a central director of modernized work unit, a.k.a. baseband getting ready unit (BBU), to a dynamically expansive thought of limit split. To moreover grow the flexibility, to diminish the capriciousness and to enhance the QOS, 5G frameworks are moving close to an adaptable edge enlisting approach where organizations, (for instance, saving) despite limits are moved closer to the edge. When considering edge-masterminded associations,forinstance,C-RANoradaptableedge,theactivityofvirtualizationand softwarization is as such to re-configure the framework by moving framework limits or organizations and to suitably revive the related traffic ways. If a chop’s QOS is separating or the traffic requirement from this cut is over-troubling a given territory of the framework, NFV can trigger a re-region of framework works approaching to the edge and SDN can revive the framework topology to react to the recently referenced changes. In the field of conveying virtualization closer to the edge, the virtualization of BS’s low level limits is tended to in. The essential test identified in is the virtualization of procedure heightened baseband limits, for instance, the PHY layer, generally executed on submitted gear or on all around valuable hardware enliveningoperators.Thisusecaseofphysicallayervirtualizationisanalyzedsimilar to accelerating developments (M. Condoluci 2016). Inorganizesoftwarizationengineeringtheprimary5GarrangesectionsareRadio Networks, Front take and Backhaul Networks, Aggregation and Core Networks, Network Clouds, Mobile Network and empowering innovations like Mobile Edge
  • 48. 30 Security Perspective of Cloud and Internet of Things With 5G Networks Networks,Service/SoftwareNetworks,Software-DefinedCloudNetworks,Satellite Networks, IOT Networks. The natures of this proposition are allowed as isolated planes.Inindependentlycharacterized,theplanesarenottotallyautonomous:primary terms in each plane are identifies with the principle terms of different planes in the design. The structure is isolated in these significant terms which are Application and Business Service Plane, Multi-Service Management Plane, Integrated Network Management and Operations Plane, Infrastructure Softwarization Plane, Control Plane and Forwarding/Data Plane. OtherthanandaccordingtoITU-T,SDNdisplaysacoupleofleveloforganizations security provided into 5G mastermind structure, for instance, Data genuineness, Data protection, confirmation. With respect to, SDN will improve security in the accompanying 5G convenient frameworks. Additionally, with the use of Open Flow showin5Gflexibleframeworks,theframeworkwillassemblethepointofconfinement of component parameters will delineate the stream features and choose the critical parameters that impact the QOS of each stream. The Open Flow always uses these parameters in order to develop course of action models and to achieve high QOS. The accompanying 5G focus frameworks is used to astoundingly versatile, flexible and will reinforce more significant level of programmability and robotization. Thus, the 5G focus frameworks will be cloud-based condition. Seen as the accompanying virtualization-based EPC building (vEPC) for the accompanying 5G frameworks. The 5G SDN-based Core Networks will introduce virtualization, and will give innovative courses of action, with to a more prominent degree a consideration on the information unavoidable for 5G compose, moreover SDN will drive the feeds and speedsofdatain5Gorchestratesandwillintenselygivesortoutsystemorganizations. The execution of SDN in 5G focus frameworks will give a remote ability to manage the direct of framework contraptions by pushing intensely the distinction in device game plan and the administrators (M. Sama 2014). Wireless Communication towards the 5G Evolution of wireless world has been evolved from first generation (1G) and then second generation (2G) and then third generation (3G) to the finally came forth generation (4G). 1G i.e. Advanced Mobile Phone System (AMPS) and 2G (i.e. GSM and GPRS) were designed for circuit switched voice application. In the other hand 3G and 4G were developed for packet switched services. 5G networks will not be based on routing and switching technologies anymore. They will be more flexible, open and able to evolve more easily than previously evolved networks (A. Gudipati 2012).
  • 49. 31 Security Perspective of Cloud and Internet of Things With 5G Networks Software Defined Networks (SDN) 5G network identified the complexity of Heterogeneous Networks (HetNets)by providingthemorereliablesolutiontoHetNets.SDNisthenewemergingintelligent architecture for the programming of networks. The logic behind the SDN is to move control plane outside the switches and enable the data of external control through a logical software entity called controller. SDN gives the descriptions of components, functions and the protocol to manage the forwarding plane from a remote controller via some secure channel (. Network Function Virtualization (NFV) SDN is the most emerging framework for the future 5G networking and how to re-factor the architecture of legacy networks, is virtualization so called Network FunctionVirtualization.NFVisalsocallednetworksoftwarizationi.e.setofnetwork functionsbyutilizingthemintosoftwarepackages.TheconceptofNFVcomesfrom the classical server virtualization that could by installing multiple virtual machines running different operating systems, software and processes. CONCLUSION 5Gtechnologyroutesareevolution,convergenceandinnovationtofulfiltheservices and applications requirements of the society in near future and beyond. In the near future a network must be designed using a virtualization technology that is why a holistic SDN and NFV strategies are paramount. 5G network will provide the frequency spectrum as well as the physical infrastructure because it is the combination of multi-systems, multi-technologies. Thechallengingissuetowardsthe5Gnetworkarewirelessandmobilenetwork.Even while SDN and NFV will support to overcome these issues. The SDN programming structure presents a complex set of problems facing the increasing weakness, which will change the dynamics around securing the wireless infrastructure.
  • 50. 32 Security Perspective of Cloud and Internet of Things With 5G Networks REFERENCES Abdelwahab, S., Hamdaoui, B., Guizani, M., & Rayes, A. (2014). Enabling smart cloud services through remote sensing: An Internet of Everything enabler. IEEE Internet Things Journal, 1(3), 276–288. doi:10.1109/JIOT.2014.2325071 Akyildiz, I. F., Wang, P., & Lin, S.-C. (2015). SoftAir: Software de-fined networking architecture for 5G wireless systems. In Computer Netwworkins. Elsevier. Ali-Ahmad, H., Cicconetti, C., De la Oliva, A., & Mancuso, V. (2013). SDN-based network architecture for extremely dense wireless networks. IEEE SDN for Future Networks and Services (SDN4FNS). Ameigeiras,P.,Ramos-Muñoz,J.,Schumacher,L.,Prados-Garzon,J.,Navarro-Ortiz, J., & López-Soler, J. M. (2015). Link-level access cloud architecture design based on SDN for 5G networks. IEEE Network. Advance online publication. doi:10.1109/ MNET.2015.7064899 Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787–2805. doi:10.1016/j.comnet.2010.05.010 Basta, A., Kellerer, W., Hoffmann, M., Morper, H. J., & Hoffmann, K. (2014). Applying NFV and SDN to LTE Mobile Core Gateways, the Functions Placement Problem.ACMProceedingsofthe4thWorkshoponAllThingsCellular:Operations, Applications, Challenges, All Things Cellular ’14, 33–38. Brief, O. N. F. Solution. (2015). Open Flow enabled SDN and Network Functions Virtualization. On-line at https://www.opennetworking.org/images/stories/ downloads/sdnresources/solution briefs/sb-sdn-nvf-solution.pdf Condoluci, M., Dohler, M., Araniti, G., Molinaro, A., & Sachs, J. (2016, February). Enhanced Radio Access and Data Transmission Procedures Facilitating Industry- Compliant Machine-Type Communications over LTE-Based 5G Networks. IEEE Wireless Communications, 23(1), 56–63. doi:10.1109/MWC.2016.7422406 Costa-Requena, J. (2015). SDN and NFV Integration in Generalized Mobile NetworkArchitecture.EuropeanConf.NetworksandCommunications,1-6.10.1109/ EuCNC.2015.7194059 Demestichas, P., Georgakopoulos, A., Karvounas, D., Tsagkaris, K., Stavroulaki, V., Lu, J., Xiong, C., & Yao, J. (2013). 5G on the Horizon: Key Challenges for the Radio-Access Network. Vehicular Technology, 8(3), 47–53. doi:10.1109/ MVT.2013.2269187
  • 51. 33 Security Perspective of Cloud and Internet of Things With 5G Networks Demestichas, P., Georgakopoulos, A., Karvounas, D., Tsagkaris, K., Stavroulaki, V., Lu, J., Xiong, C., & Yao, J. (2013). 5G on the Horizon: Key Challenges for the Radio-Access Network. Vehicular Technology, 8(3), 47–53. doi:10.1109/ MVT.2013.2269187 Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision architectural elements and future directions. Future Generation Computer Systems, 29(7), 1645–1660. doi:10.1016/j.future.2013.01.010 Gudipati, A., Perry, D., Li, L. E., & Katti, S. (2013). Soft RAN: Software Defined Radio Access Network. Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN ’13, 25–30. Jansen, W. A. (2011). Cloud hooks: Security and privacy issues in cloud computing. Proc. 44th Hawaii Int. Conf. Syst. Sci. (HICSS), 1-10. 10.1109/HICSS.2011.103 Jin, X., Li, L. E., Vanbever, L., & Rexford, J. (2013). SoftCell: Scalable and Flexible Cellular Core Network Architecture. Proceedings of CoNEXT, 2013, 163–174. John, W., Pentikousis, K., Agapiou, G., Jacob, E., Kind, M., Manzalini, A., Risso, F., Staessens, D., Steinert, R., & Meirosu, C. (2013). Research Directions in Network Service Chaining. IEEE SDN forFuture Networks and Services (SDN4FNS). Karakus, M., & Durres, A. (2017). Quality of Service (QoS) in Software De-fined Networking (SDN): A survey. Journal of Network and Computer Applications, 80, 200-218. Karakus, M., & Durres, A. (2017). Quality of Service (QoS) in Software Defined Networking (SDN): A survey. Journal of Network and Computer Applications, 80, 200-218. Keoh, S. L., Kumar, S., & Tschofenig, H. (2014). Securing the Internet of Things: A standardization perspective. IEEE Internet Things J., 1(3), 265–275. doi:10.1109/ JIOT.2014.2323395 Khan, Khan, Zaheer, & Khan. (2012). Future internet: The Internet of Things architecture possible applications and key challenges. Proc. IEEE 10th Int. Conf. Frontiers Inf. Technol., 257-260. Kim, H., & Feamster, N. (2013). Improving network management with software definednetworking.IEEECommunicationsMagazine,51(2),114–119.doi:10.1109/ MCOM.2013.6461195 Lafuente,G.(2015).Thebigdatasecuritychallenge.NetworkSecurity,20(1),12–14. doi:10.1016/S1353-4858(15)70009-7
  • 52. 34 Security Perspective of Cloud and Internet of Things With 5G Networks Lee, J., Uddin, M., Tourrilhes, J., Sen, S., Banerjee, S., Arndt, M., Kim, K.-H., & Nadeem, T. (2014). Mesdn: Mobile extension of SDN. ACM Proceedings of the Fifth International Workshop on Mobile Cloud Computing; Services, 7–14. Lesjak, C., Ruprechter, T., Haid, J., Bock, H., & Brenner, E. (2014). A secure hardwaremoduleandsystemconceptforlocalandremoteindustrialembeddedsystem identification. In Proceeding Emerging Technology Factory Automation. ETFA. Li, W., Meng, W., & Kwok, L. F. (2016). A survey on openflow based soft-ware defined networks: Security challenges and countermeasures. Journal of Network and Computer Applications, 68, 126–139. doi:10.1016/j.jnca.2016.04.011 Mahalle, P. N., Anggorojati, B., Prasad, N. R., & Prasad, R. (2013). Identity authentication and capability based access control (IACAC) for the Internet of Things. Journal Cyber Security Mobility, 1(4), 309–348. Masoudi, R., & Ghaffari, A. (2016). Software defined networks: A survey. Journal of Network and Computer Applications, 67, 1–25. doi:10.1016/j.jnca.2016.03.016 Mineraud, J., Mazhelis, O., Su, X., & Tarkoma, S. (2015). A gap analysis of Internet- of-Things platforms. Available: http://arxiv.org/abs/1502.01181 Naudts, B., Kind, M., Westphal, F., Verbrugge, S., Colle, D., & Pickavet, M. (2012). Techno economic Analysis of Software Defined Networking as Architecture for the Virtualization of a Mobile Network. Workshop on Software Defined Networking (EWSDN), 2012 European, 67–72. 10.1109/EWSDN.2012.27 Nguyen, Do, & Kim (2016). SDN and Virtualization-Based LTE Mobile Network Architectures: A Comprehensive Survey. DOI doi:10.100711277-015-2997-7 Nguyen & Kim. (2015). Proposal and evaluation of SDN-based mobile packet core networks. Journal on Wireless Communications and Networking, 172. Nia,M.,Mozaffari-Kermani,M.,Sur-Kolay,S.,Raghunathan,A.,&Jha,N.K.(2015). Energy-efficientlong-termcontinuouspersonalhealthmonitoring.IEEETransaction onMulti-ScaleComputingSystem,1(2),85–98.doi:10.1109/TMSCS.2015.2494021 Pentikousis,K.,Wang,Y.,&Hu,W.(2013).MobileFlow:TowardSoft-ware-Defined Mobile Networks. IEEE Communications Magazine. Rost, P., Banchs, A., Berberana, I., Breitbach, M., Doll, M., Droste, H., Mannweiler, C., Puente, M. A., Samdanis, K., & Sayadi, B. (2016, May). Mobile network architecture evolution toward 5G. IEEE Communications Magazine, 54(5), 84–91. doi:10.1109/MCOM.2016.7470940
  • 53. 35 Security Perspective of Cloud and Internet of Things With 5G Networks Said, S. B. H., Sama, M. R., Guillouard, K., Suciu, L., Simon, G., Lagrange, X., & Bonnin, J.-M. (2013), New control plane in 3GPP LTE/EPC architecture for on- demandconnectivityservice.ProceedingsofsecondIEEEInternationalConference on Cloud Networking (CLOUDNET), 205–209. 10.1109/CloudNet.2013.6710579 Salmani, H., & Tehranipoor, M. M. (2016). Vulnerability analysis of a circuit layout to hardware Trojan insertion. IEEE Transactions on Information Forensics and Security, 11(6), 1214–1225. doi:10.1109/TIFS.2016.2520910 Sama, M., Ben Hadj Said, S., Guillouard, K., & Suciu, L. (2014). Enabling network programmability in LTE/EPC architecture using OpenFlow. 12th International Symposium on Modelling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 389–396. Sidhu, P., Woungang, I., Carvalho, G. H. S., Anpalagan, A., & Dhurandher, S. K. (2015). An Analysis of Machine-Type-Communication on Human-Type- Communication over Wireless Communication Networks. IEEE 29th International Conference in Advanced Information Networking and Applications Workshops (WAINA), 332–337. Singh, D., Tripathi, G., & Jara, A. J. (2014). A survey of Internet-of-Things: Future visionarchitecturechallengesandservices.Proc.IEEEWorldForumInternetThings, 287-292. 10.1109/WF-IoT.2014.6803174 Tehranipoor, M., & Koushanfar, F. (2010). A survey of hardware Trojan taxonomy and detection. IEEE Design & Test of Computers, 27(1), 10–25. doi:10.1109/ MDT.2010.7 Thakurdesai, P. A., Kole, P. L., & Pareek, R. P. (2004). Evaluation of the quality and contents of diabetes mellitus patient education on Internet. Patient Education and Counseling, 53, 309–313. Tomovic, S., Pejanovic-Djurisic, M., & Radusinovic, I. (2014). SDN based mobile networks: Concepts and benefits. Wireless Personal Communications, 78(3), 1629–1644. doi:10.100711277-014-1909-6 Trivisonno, R., Guerzoni, R., Vaishnavi, I., & Soldani, D. (2015). SDN-based 5G mobile networks: Architecture, functions, procedures and backward compatibility, Transmission.EmergingTelecommunicationTechnology,26(1),82–92.doi:10.1002/ ett.2915
  • 54. 36 Security Perspective of Cloud and Internet of Things With 5G Networks Yap, K. K., Sherwood, R., Kobayashi, M., Huang, T.-Y., Chan, M., Handigol, N., McKeown, N., & Parulkar, G. (2010). Blueprint for introducing innovation into wireless mobile networks. ACM Proceedings of the Second ACM SIGCOMM WorkshoponVirtualizedInfrastructureSystemsandArchitectures,VISA’10,25–32.
  • 55. Exploring the Variety of Random Documents with Different Content
  • 56. with active links or immediate access to the full terms of the Project Gutenberg™ License. 1.E.6. You may convert to and distribute this work in any binary, compressed, marked up, nonproprietary or proprietary form, including any word processing or hypertext form. However, if you provide access to or distribute copies of a Project Gutenberg™ work in a format other than “Plain Vanilla ASCII” or other format used in the official version posted on the official Project Gutenberg™ website (www.gutenberg.org), you must, at no additional cost, fee or expense to the user, provide a copy, a means of exporting a copy, or a means of obtaining a copy upon request, of the work in its original “Plain Vanilla ASCII” or other form. Any alternate format must include the full Project Gutenberg™ License as specified in paragraph 1.E.1. 1.E.7. Do not charge a fee for access to, viewing, displaying, performing, copying or distributing any Project Gutenberg™ works unless you comply with paragraph 1.E.8 or 1.E.9. 1.E.8. You may charge a reasonable fee for copies of or providing access to or distributing Project Gutenberg™ electronic works provided that: • You pay a royalty fee of 20% of the gross profits you derive from the use of Project Gutenberg™ works calculated using the method you already use to calculate your applicable taxes. The fee is owed to the owner of the Project Gutenberg™ trademark, but he has agreed to donate royalties under this paragraph to the Project Gutenberg Literary Archive Foundation. Royalty payments must be paid within 60 days following each date on which you prepare (or are legally required to prepare) your periodic tax returns. Royalty payments should be clearly marked as such and sent to the Project Gutenberg Literary Archive Foundation at the address specified in Section 4, “Information
  • 57. about donations to the Project Gutenberg Literary Archive Foundation.” • You provide a full refund of any money paid by a user who notifies you in writing (or by e-mail) within 30 days of receipt that s/he does not agree to the terms of the full Project Gutenberg™ License. You must require such a user to return or destroy all copies of the works possessed in a physical medium and discontinue all use of and all access to other copies of Project Gutenberg™ works. • You provide, in accordance with paragraph 1.F.3, a full refund of any money paid for a work or a replacement copy, if a defect in the electronic work is discovered and reported to you within 90 days of receipt of the work. • You comply with all other terms of this agreement for free distribution of Project Gutenberg™ works. 1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™ electronic work or group of works on different terms than are set forth in this agreement, you must obtain permission in writing from the Project Gutenberg Literary Archive Foundation, the manager of the Project Gutenberg™ trademark. Contact the Foundation as set forth in Section 3 below. 1.F. 1.F.1. Project Gutenberg volunteers and employees expend considerable effort to identify, do copyright research on, transcribe and proofread works not protected by U.S. copyright law in creating the Project Gutenberg™ collection. Despite these efforts, Project Gutenberg™ electronic works, and the medium on which they may be stored, may contain “Defects,” such as, but not limited to, incomplete, inaccurate or corrupt data, transcription errors, a copyright or other intellectual property infringement, a defective or
  • 58. damaged disk or other medium, a computer virus, or computer codes that damage or cannot be read by your equipment. 1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for the “Right of Replacement or Refund” described in paragraph 1.F.3, the Project Gutenberg Literary Archive Foundation, the owner of the Project Gutenberg™ trademark, and any other party distributing a Project Gutenberg™ electronic work under this agreement, disclaim all liability to you for damages, costs and expenses, including legal fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE. 1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you discover a defect in this electronic work within 90 days of receiving it, you can receive a refund of the money (if any) you paid for it by sending a written explanation to the person you received the work from. If you received the work on a physical medium, you must return the medium with your written explanation. The person or entity that provided you with the defective work may elect to provide a replacement copy in lieu of a refund. If you received the work electronically, the person or entity providing it to you may choose to give you a second opportunity to receive the work electronically in lieu of a refund. If the second copy is also defective, you may demand a refund in writing without further opportunities to fix the problem. 1.F.4. Except for the limited right of replacement or refund set forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
  • 59. INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PURPOSE. 1.F.5. Some states do not allow disclaimers of certain implied warranties or the exclusion or limitation of certain types of damages. If any disclaimer or limitation set forth in this agreement violates the law of the state applicable to this agreement, the agreement shall be interpreted to make the maximum disclaimer or limitation permitted by the applicable state law. The invalidity or unenforceability of any provision of this agreement shall not void the remaining provisions. 1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation, the trademark owner, any agent or employee of the Foundation, anyone providing copies of Project Gutenberg™ electronic works in accordance with this agreement, and any volunteers associated with the production, promotion and distribution of Project Gutenberg™ electronic works, harmless from all liability, costs and expenses, including legal fees, that arise directly or indirectly from any of the following which you do or cause to occur: (a) distribution of this or any Project Gutenberg™ work, (b) alteration, modification, or additions or deletions to any Project Gutenberg™ work, and (c) any Defect you cause. Section 2. Information about the Mission of Project Gutenberg™ Project Gutenberg™ is synonymous with the free distribution of electronic works in formats readable by the widest variety of computers including obsolete, old, middle-aged and new computers. It exists because of the efforts of hundreds of volunteers and donations from people in all walks of life. Volunteers and financial support to provide volunteers with the assistance they need are critical to reaching Project Gutenberg™’s goals and ensuring that the Project Gutenberg™ collection will
  • 60. remain freely available for generations to come. In 2001, the Project Gutenberg Literary Archive Foundation was created to provide a secure and permanent future for Project Gutenberg™ and future generations. To learn more about the Project Gutenberg Literary Archive Foundation and how your efforts and donations can help, see Sections 3 and 4 and the Foundation information page at www.gutenberg.org. Section 3. Information about the Project Gutenberg Literary Archive Foundation The Project Gutenberg Literary Archive Foundation is a non-profit 501(c)(3) educational corporation organized under the laws of the state of Mississippi and granted tax exempt status by the Internal Revenue Service. The Foundation’s EIN or federal tax identification number is 64-6221541. Contributions to the Project Gutenberg Literary Archive Foundation are tax deductible to the full extent permitted by U.S. federal laws and your state’s laws. The Foundation’s business office is located at 809 North 1500 West, Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up to date contact information can be found at the Foundation’s website and official page at www.gutenberg.org/contact Section 4. Information about Donations to the Project Gutenberg Literary Archive Foundation Project Gutenberg™ depends upon and cannot survive without widespread public support and donations to carry out its mission of increasing the number of public domain and licensed works that can be freely distributed in machine-readable form accessible by the widest array of equipment including outdated equipment. Many
  • 61. small donations ($1 to $5,000) are particularly important to maintaining tax exempt status with the IRS. The Foundation is committed to complying with the laws regulating charities and charitable donations in all 50 states of the United States. Compliance requirements are not uniform and it takes a considerable effort, much paperwork and many fees to meet and keep up with these requirements. We do not solicit donations in locations where we have not received written confirmation of compliance. To SEND DONATIONS or determine the status of compliance for any particular state visit www.gutenberg.org/donate. While we cannot and do not solicit contributions from states where we have not met the solicitation requirements, we know of no prohibition against accepting unsolicited donations from donors in such states who approach us with offers to donate. International donations are gratefully accepted, but we cannot make any statements concerning tax treatment of donations received from outside the United States. U.S. laws alone swamp our small staff. Please check the Project Gutenberg web pages for current donation methods and addresses. Donations are accepted in a number of other ways including checks, online payments and credit card donations. To donate, please visit: www.gutenberg.org/donate. Section 5. General Information About Project Gutenberg™ electronic works Professor Michael S. Hart was the originator of the Project Gutenberg™ concept of a library of electronic works that could be freely shared with anyone. For forty years, he produced and distributed Project Gutenberg™ eBooks with only a loose network of volunteer support.
  • 62. Project Gutenberg™ eBooks are often created from several printed editions, all of which are confirmed as not protected by copyright in the U.S. unless a copyright notice is included. Thus, we do not necessarily keep eBooks in compliance with any particular paper edition. Most people start at our website which has the main PG search facility: www.gutenberg.org. This website includes information about Project Gutenberg™, including how to make donations to the Project Gutenberg Literary Archive Foundation, how to help produce our new eBooks, and how to subscribe to our email newsletter to hear about new eBooks.
  • 63. Welcome to our website – the perfect destination for book lovers and knowledge seekers. We believe that every book holds a new world, offering opportunities for learning, discovery, and personal growth. That’s why we are dedicated to bringing you a diverse collection of books, ranging from classic literature and specialized publications to self-development guides and children's books. More than just a book-buying platform, we strive to be a bridge connecting you with timeless cultural and intellectual values. With an elegant, user-friendly interface and a smart search system, you can quickly find the books that best suit your interests. Additionally, our special promotions and home delivery services help you save time and fully enjoy the joy of reading. Join us on a journey of knowledge exploration, passion nurturing, and personal growth every day! ebookbell.com