Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions

Author:   Ahmed A. Abd El-Latif ,  Bassem Abd-El-Atty ,  Salvador E. Venegas-Andraca ,  Wojciech Mazurczyk
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2022
Volume:   95
ISBN:  

9783030854300


Pages:   278
Publication Date:   10 October 2022
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $362.22 Quantity:  
Add to Cart

Share |

Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions


Add your own review!

Overview

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including  traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks. 

Full Product Details

Author:   Ahmed A. Abd El-Latif ,  Bassem Abd-El-Atty ,  Salvador E. Venegas-Andraca ,  Wojciech Mazurczyk
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2022
Volume:   95
Weight:   0.450kg
ISBN:  

9783030854300


ISBN 10:   3030854302
Pages:   278
Publication Date:   10 October 2022
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Authentic QR codes for Traceability and Tamper Detection in IoT Enabled Waste Management Networks.- Data Security Challenges in Deep Neural Network for Healthcare IoT Systems.- Efficacious Data Transfer Accomplished by Trustworthy Nodes in Cognitive Radio.- A Multi-fusion IoT Authentication System Based on Internal Deep Fusion of ECG signals.- Overview of information hiding algorithms for ensuring security in IoT based cyber-physical systems.- Survey on Mobile Edge-Cloud Computing: A Taxonomy on Computation offloading Approaches.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List