001471954 000__ 06095cam\\22006857a\4500 001471954 001__ 1471954 001471954 003__ OCoLC 001471954 005__ 20230908003323.0 001471954 006__ m\\\\\o\\d\\\\\\\\ 001471954 007__ cr\un\nnnunnun 001471954 008__ 230722s2023\\\\si\\\\\\o\\\\\101\0\eng\d 001471954 019__ $$a1390915002 001471954 020__ $$a9789819944309$$q(electronic bk.) 001471954 020__ $$a9819944309$$q(electronic bk.) 001471954 020__ $$z9819944295 001471954 020__ $$z9789819944293 001471954 0247_ $$a10.1007/978-981-99-4430-9$$2doi 001471954 035__ $$aSP(OCoLC)1390922020 001471954 040__ $$aEBLCP$$beng$$cEBLCP$$dGW5XE$$dYDX$$dEBLCP$$dOCLCQ 001471954 049__ $$aISEA 001471954 050_4 $$aTK5105.875.I57$$bM63 2022eb 001471954 08204 $$a005.8$$223/eng/20230726 001471954 1112_ $$aMobiSec (Symposium)$$n(6th :$$d2022 :$$cCheju Island, Korea) 001471954 24510 $$aMobile internet security :$$b6th International Symposium, MobiSec 2022, Jeju, South Korea, December 15-17, 2022, Revised selected papers /$$cIlsun You, Hwankuk Kim, Pelin Angin, editors. 001471954 2463_ $$aMobiSec 2022 001471954 260__ $$aSingapore :$$bSpringer,$$c2023. 001471954 300__ $$a1 online resource (345 p.). 001471954 4901_ $$aCommunications in Computer and Information Science ;$$v1644 001471954 500__ $$a1 Introduction 001471954 500__ $$aIncludes author index. 001471954 5050_ $$aIntro -- Preface -- Organization -- Contents -- 5G Advanced and 6G Security -- Attacks Against Security Context in 5G Network -- 1 Introduction -- 2 Background -- 2.1 USIM -- 2.2 5G Registration Procedure -- 2.3 5G Security Context -- 3 Modeling the Fast Registration Procedure in ProVerif -- 3.1 Security Assumptions -- 3.2 Security Goals -- 3.3 Overview of ProVerif -- 3.4 Formalizing Security Goals -- 3.5 ProVerif Model of the Fast Registration Procedure -- 4 Vulnerabilities -- 5 Attacks -- 5.1 Attack Model -- 5.2 Experimental Setup -- 5.3 Impersonation Using the Security Context in USIM 001471954 5058_ $$a5.4 Impersonation Using the Security Context in Baseband Chip -- 5.5 Other Attacks -- 6 Countermeasures -- 7 Related Work -- 8 Conclusion -- References -- A Systematic Approach to Security Management in the MonB5G Architecture -- 1 Introduction -- 2 Threats Related to the Network Slicing Ecosystem -- 3 Related Work on Network Slicing Security -- 4 Management Decomposition in the MonB5G Architecture -- 4.1 SOSS Role in NS Runtime Management -- 4.2 DOSS Role in NS Runtime Management -- 4.3 IDMO Role in NS Runtime Management -- 4.4 GOSS Role in NS Runtime Management 001471954 5058_ $$a4.5 IOSS Role in NS Runtime Management -- 5 Network Slicing Security Mechanisms in the MonB5G Architecture -- 5.1 Usage of SOSS Mechanisms for Security -- 5.2 Usage of DOSS Mechanisms for Security -- 5.3 Usage of IDMO Mechanisms for Security -- 5.4 Usage of IOSS Mechanisms for Security -- 5.5 Usage of GOSS Mechanisms for Security -- 6 Examples of the Usage of the Approach -- 6.1 DDoS Attack on the NS User Plane -- 6.2 Attack on the NS Control Plane -- 6.3 DDoS Attack on the Management Plane -- 6.4 Situation Awareness -- 7 Conclusions -- References -- A Study on 5G Security Activities in Japan 001471954 5058_ $$a1 Introduction -- 2 5G Security Guideline -- 2.1 Security Threat Analysis -- 2.2 Security Measure Requirements -- 3 Toward Local 5G Deployment -- 4 Local 5G Security Guideline -- 5 Conclusion -- References -- Spatial Multiplexing Techniques and Multifrequency Cells for Massive Machine-type Communications in Future 6G Networks -- 1 Introduction -- 2 State of the Art -- 3 Multifrequency Cells and Spatial Multiplexing for 6G mMTC -- 3.1 Device Clusters and Analog One-bit Modulation -- 3.2 Native 6G Cells -- 4 Experimental Validation: Simulation Results -- 5 Security Challenges and Considerations 001471954 5058_ $$a6 Conclusions and Future Works -- References -- Building and Utilizing Small-Scale Testbed for Research on 5G SA Network-Related Security Vulnerabilities -- 1 Introduction -- 2 Related Work -- 2.1 5G Testbed -- 2.2 Security Threats in 5G NSA Networks -- 3 Background -- 3.1 5G SA System Architecture -- 3.2 5G SA Registration Procedure and PDU Session Establishment -- 4 5G SA Network Testbed Toolkits -- 4.1 5G SA Core -- 4.2 5G SA RAN and UE -- 5 Testbeds Build -- 6 Consideration -- 7 Conclusion -- References -- AI for Security -- Parameters Transfer Framework for Multi-domain Fake News Detection 001471954 506__ $$aAccess limited to authorized users. 001471954 520__ $$aThis book constitutes the refereed proceedings of the 6th International Conference on Mobile Internet Security, MobiSec 2022, held in Jeju, South Korea, in December 1517, 2022. The 24 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: 5G advanced and 6G security; AI for security; cryptography and data security; cyber security; and IoT application and blockchain security. 001471954 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed July 26, 2023). 001471954 650_0 $$aInternet$$xSecurity measures$$vCongresses. 001471954 650_0 $$aMobile communication systems$$xSecurity measures$$vCongresses. 001471954 655_0 $$aElectronic books. 001471954 7001_ $$aYou, Ilsun. 001471954 7001_ $$aKim, Hwankuk. 001471954 7001_ $$aAngin, Pelin. 001471954 77608 $$iPrint version:$$aYou, Ilsun$$tMobile Internet Security$$dSingapore : Springer Singapore Pte. Limited,c2023$$z9789819944293 001471954 830_0 $$aCommunications in computer and information science ;$$v1644. 001471954 852__ $$bebk 001471954 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-99-4430-9$$zOnline Access$$91397441.1 001471954 909CO $$ooai:library.usi.edu:1471954$$pGLOBAL_SET 001471954 980__ $$aBIB 001471954 980__ $$aEBOOK 001471954 982__ $$aEbook 001471954 983__ $$aOnline 001471954 994__ $$a92$$bISE