|
![]() |
|||
|
||||
OverviewThis timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy techniques in different emerging networks from the interconnection view of human and cyber-physical world. This book includes 7 chapters from prominent international researchers working in this subject area. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless security and privacy related issues Recent advances in wireless communication technologies have enabled the large-scale deployment of next-generation wireless networks, and many other wireless applications are emerging. The next generation of mobile networks continues to transform the way people communicate and access information. As a matter of fact, next-generation emerging networks are exploiting their numerous applications in both military and civil fields. For most applications, it is important to guarantee high security of the deployed network in order to defend against attacks from adversaries, as well as the privacy intrusion. The key target in the development of next-generation wireless networks is to promote the integration of the human, cyber, and physical worlds. Previous work in Cyber Physical Systems (CPS) considered the connection between the cyber world and the physical world. In the recent studies, human involvement brings new channels and initiatives in this interconnection. In this integration process, security and privacy are critical issues to many wireless network applications, and it is a paramount concern for the growth of next-generation wireless networks. This is due to the open nature of wireless communication and the involvement of humans. New opportunities for tackling these security and privacy issues in next-generation wireless networks will be achieved by leveraging the properties of interaction among human, computers and things. Full Product DetailsAuthor: Sheng Zhong , Hong Zhong , Xinyi Huang , Panlong YangPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG Edition: 1st ed. 2019 Weight: 0.465kg ISBN: 9783030011499ISBN 10: 3030011496 Pages: 183 Publication Date: 03 December 2018 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsChapter 1 Networking Cyber-Physical Systems: System Fundamentals of Security and Privacy for Next-Generation Wireless Networks (Jin Shi) 1.1 Systems: Foundation of next-generation wireless network 1.2 Security and Privacy Issues in Cloud Computing Systems 1.3 Security Threats in Mobile System 1.4 Security and Privacy Challenges in Embedded Systems 1.5 What Remains Unsolved: Future Research Trends Chapter 2 Networking Cyber-Physical Systems: Algorithm Fundamentals of Security and Privacy for Next-Generation Wireless Networks (Sheng Zhong) 2.1 Challenges and Opportunities 2.2 Algorithms on Security Issues in Wireless Networks 2.3 Algorithms on Privacy Issues in Wireless Networks 2.4 Future Research Trends Chapter 3 Connecting Physical-World to Cyber-World: Security and Privacy Issues in Pervasive Sensing (Lei Xie) 3.1 Connecting Physical-World to Cyber-World: Gains and Losses 3.2 Investigating into Security and Privacy Issues in Pervasive Sensing 3.3 Challenges and Opportunities 3.4 Security Issues in Pervasive Sensing 3.4.1 Authentication 3.4.2 Secret Key Extraction 3.5 Privacy Issues in Pervasive Sensing 3.5.1 Sensitive Information Privacy 3.5.2 Location Privacy 3.6 What Remains Unsolved: Future Research Trends Chapter 4 Connecting Human to Cyber-World: Security and Privacy Issues in Mobile Crowdsourcing (Kun Wang) 4.1 Overview of MC 4.2 Threats and challenges in MC 4.2.1 Security 4.2.2 Privacy 4.3 Security assuring and privacy preserving solutions 4.4 Future research directions Chapter 5 Connecting Things to Things in Physical-World: Security and Privacy Issues in Vehicular Ad-hoc Networks (Hong Zhong) 5.1 Introduction of a brand-new network: VANET 5.2 Overviews of Security and Privacy 5.3 Methods and Strategies 5.4 Security Issues in VANET 5.4.1 Secret Key Management 5.4.2 Message verification 5.4.3 Identity Traceability 5.5 Privacy Issues in VANET 5.5.1 Identity Privacy 5.5.2 Location Privacy 5.6 Conclusions and Future Research Directions Chapter 6 Connecting Things to Things in Physical-World: Security and Privacy Issues in Mobile Sensor Networks (Xinyi Huang) 6.1 Sensor Networks 6.2 Challenges 6.3 Security Issues in Sensor Networks 6.3.1 Key Establishment Protocols at Higher Layer 6.3.2 Key Establishment Protocols at the Physical Layer 6.4 Privacy Issues in Sensor Networks 6.4.1 Localization Protocols at Higher Layers 6.4.2 Localization Protocols at the Physical Layer 6.5 Future Research Trends Chapter 7 Connecting Human to Physical-World: Security and Privacy Issues in Mobile Crowdsensing (Panlong Yang) 7.1 Overview 7.2 Mobile Crowdsensing Basics and How Human are connected to Cyber-World 7.3 Security and Privacy Issues when Using Inertial Sensors 7.4 Security and Privacy Issues when Using Communication links 7.5 Security and Privacy Issues when Using Side Channels 7.6 Future Research TrendsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |