Security and Privacy for Next-Generation Wireless Networks

This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy techniques...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Zhong, Sheng (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut), Zhong, Hong (http://id.loc.gov/vocabulary/relators/aut), Huang, Xinyi (http://id.loc.gov/vocabulary/relators/aut), Yang, Panlong (http://id.loc.gov/vocabulary/relators/aut), Shi, Jin (http://id.loc.gov/vocabulary/relators/aut), Xie, Lei (http://id.loc.gov/vocabulary/relators/aut), Wang, Kun (http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:Wireless Networks,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05403nam a2200577 4500
001 978-3-030-01150-5
003 DE-He213
005 20191028091801.0
007 cr nn 008mamaa
008 181122s2019 gw | s |||| 0|eng d
020 |a 9783030011505  |9 978-3-030-01150-5 
024 7 |a 10.1007/978-3-030-01150-5  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Zhong, Sheng.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Security and Privacy for Next-Generation Wireless Networks  |h [electronic resource] /  |c by Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang. 
250 |a 1st ed. 2019. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2019. 
300 |a XII, 183 p. 19 illus., 14 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Wireless Networks,  |x 2366-1186 
505 0 |a 1 Networking Cyber-Physical Systems: System Fundamentals of Security and Privacy for Next-Generation Wireless Networks -- 2 Networking Cyber-Physical Systems: Algorithm Fundamentals of Security and Privacy for Next-Generation Wireless Networks -- 3 Connecting Physical-World to Cyber-World: Security and Privacy Issues in Pervasive Sensing -- 4 Connecting Human to Cyber-World: Security and Privacy Issues in Mobile Crowdsourcing Networks -- 5 Connecting Things to Things in Physical-World: Security and Privacy Issues in Vehicular Ad-hoc Networks -- 6 Connecting Things to Things in Physical-World: Security and Privacy Issues in Mobile Sensor Networks -- 7 Connecting Human to Physical-World: Security and Privacy Issues in Mobile Crowdsensing. 
520 |a This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy techniques in different emerging networks from the interconnection view of human and cyber-physical world. This book includes 7 chapters from prominent international researchers working in this subject area. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless security and privacy related issues Recent advances in wireless communication technologies have enabled the large-scale deployment of next-generation wireless networks, and many other wireless applications are emerging. The next generation of mobile networks continues to transform the way people communicate and access information. As a matter of fact, next-generation emerging networks are exploiting their numerous applications in both military and civil fields. For most applications, it is important to guarantee high security of the deployed network in order to defend against attacks from adversaries, as well as the privacy intrusion. The key target in the development of next-generation wireless networks is to promote the integration of the human, cyber, and physical worlds. Previous work in Cyber Physical Systems (CPS) considered the connection between the cyber world and the physical world. In the recent studies, human involvement brings new channels and initiatives in this interconnection. In this integration process, security and privacy are critical issues to many wireless network applications, and it is a paramount concern for the growth of next-generation wireless networks. This is due to the open nature of wireless communication and the involvement of humans. New opportunities for tackling these security and privacy issues in next-generation wireless networks will be achieved by leveraging the properties of interaction among human, computers and things. 
650 0 |a Data protection. 
650 0 |a Wireless communication systems. 
650 0 |a Mobile communication systems. 
650 0 |a Electrical engineering. 
650 1 4 |a Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28000 
650 2 4 |a Wireless and Mobile Communication.  |0 http://scigraph.springernature.com/things/product-market-codes/T24100 
650 2 4 |a Communications Engineering, Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/T24035 
700 1 |a Zhong, Hong.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Huang, Xinyi.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Yang, Panlong.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Shi, Jin.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Xie, Lei.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
700 1 |a Wang, Kun.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783030011499 
776 0 8 |i Printed edition:  |z 9783030011512 
830 0 |a Wireless Networks,  |x 2366-1186 
856 4 0 |u https://doi.org/10.1007/978-3-030-01150-5  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)