Vtome.ru - электронная библиотека

Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions

  • Добавил: literator
  • Дата: 11-10-2021, 01:24
  • Комментариев: 0
Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New DirectionsНазвание: Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions
Автор: Ahmed A. Abd El-Latif, Bassem Abd-El-Atty
Издательство: Springer
Год: 2022
Страниц: 283
Язык: английский
Формат: pdf (true), epub
Размер: 40.7 MB

The concept of Internet of Things (IoT) incorporates various types of interconnected objects and devices which are typically resource-constrained but still have access to the Internet. The popularity of IoT has dramatically increased in recent years, as such solutions can be utilized for various purposes, including enhanced communication, transportation, education, business development, etc. However, in such networks still privacy and security aspects are among the most significant challenges which include lack of efficient and robust security protocols, lack of user awareness or improper configuration.

Considering above, secure network architectures, mechanisms, and protocols are required as the basis for 5G as well as IoT networks to address these issues and follow security-by-design approach. Moreover, since in such type of networks even more user data and network traffic will be transmitted, big data security solutions should be considered in order to address the magnitude of the data volume and ensure data security and privacy.

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many others. Moreover, it proposes new models, practical solutions and technological advances related to transmitted data in 5G networks with IoT, cloud computing, and other applications in Smart Cities. Finally, it highlights and discusses the techniques and security challenges of data processing in IoT and 5G networks.

It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.

Contents:
Authentic QR Codes for Traceability and Tamper Detection in IoT Enabled Waste Management Networks
Data Security Challenges in Deep Neural Network for Healthcare IoT Systems
Efficacious Data Transfer Accomplished by Trustworthy Nodes in Cognitive Radio
A Multi-fusion IoT Authentication System Based on Internal Deep Fusion of ECG Signals
Overview of Information Hiding Algorithms for Ensuring Security in IoT Based Cyber-Physical Systems
Survey on Mobile Edge-Cloud Computing: A Taxonomy on Computation offloading Approaches
Security and Interoperability Issues with Internet of Things (IoT) in Healthcare Industry: A Survey
Assisted Fog Computing Approach for Data Privacy Preservation in IoT-Based Healthcare
Trusted Execution Environment-Enabled Platform for 5G Security and Privacy Enhancement
WSNs and IoTs for the Identification Issues: A Survey on Contributions, Challenges and Evolution
DDoS Attack Detection in Vehicular Ad-Hoc Network (VANET) for 5G Networks

Скачать Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions



ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!











ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.