<p><span>Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subjec
Computational Intelligent Security in Wireless Communications
β Scribed by Suhel Ahmad Khan, Rajeev Kumar, Omprakash Kaiwartya, Mohammad Faisal, Raees Ahmad Khan
- Publisher
- CRC Press
- Year
- 2022
- Tongue
- English
- Leaves
- 281
- Series
- Wireless Communications and Networking Technologies: Classifications, Advancement and Applications
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security.
It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval.
The book:
Discusses computational algorithms for system modeling and optimization in security perspective.
Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies.
Explores a group of practical research problems where security experts can help develop new data-driven methodologies.
Covers application on artificial intelligence and wireless communication security risk perspective
The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.
The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.
β¦ Table of Contents
Cover
Half Title
Series Page
Title Page
Copyright Page
Table of Contents
Preface
Editors
Acknowledgment
Contributor List
Chapter 1 An investigation on Cooperative Communication Techniques in Mobile Ad-Hoc Networks
1.1 Introduction
1.2 Cooperation Techniques
1.2.1 Crediting Mechanisms
1.2.1.1 Incentive-based Approach
1.2.1.2 Reputation Schemes
1.2.1.3 Hybrid system
1.2.1.4 Trust-based schemes
1.2.2 Acknowledgment-based Mechanisms
1.2.2.1 End-to-End ACK Method
1.2.2.2 TWO ACK Method
1.2.2.3 Cryptographic-based signature
1.2.3 Punishment-based mechanism
1.2.3.1 Game-Theoretic Approach
1.2.3.2 Non-cooperative Game-Theoretic Approach
1.3 Discussion and Evaluation of research findings
1.4 Conclusion
References
Chapter 2 IoE-Based Genetic Algorithms and Their Requisition
2.1 Introduction
2.2 Need of IoE-Based Genetic Algorithms
2.3 Basic terminologies related to IoE-based GAs
2.3.1 Chromosomes
2.3.2 Population
2.3.3 Genes
2.3.4 Allele
2.3.5 Genotype and Phenotype
2.4 General Genetic Algorithm
2.5 Operators in GAs
2.5.1 Encoding
2.6 Stopping Condition for the Genetic Algorithm
2.7 Constraints in the Genetic Algorithm
2.8 Similarity and Comparison between IoE and IoT
2.8.1 Similarity between IoE and IoT [58β61]
2.8.2 IoE vs IoT: Whatβs the Difference?
2.9 Problem-Solving Using the GA
2.10 Advantages
2.11 IoE-based GA Application
2.12 Limitations
2.13 Conclusion
References
Chapter 3 A Framework for Hybrid WBSN-VANET-based Health Monitoring Systems
3.1 Introduction
3.2 Literature Review
3.3 Proposed Framework
3.4 Flowchart and Algorithm for the proposed framework
3.5 Conclusion
References
Chapter 4 Managing IoT β Cloud-based Security: Needs and Importance
4.1 Introduction
4.2 Background
4.2.1 Cloud computing
4.2.1.1 Characteristics of Cloud computing
4.2.1.2 Cloud computing deployment models
4.2.1.3 Cloud Computing Service Models
4.2.2 IoT (Internet of things)
4.2.2.1 Evolution
4.2.2.2 Architecture of Internet of Things (IoT)
4.2.2.3 Components of Internet of Things
4.3 Security challenges in IoT-Cloud
4.3.1 Challenges of Cloud-Based IoT Integration
4.4 Literature survey related to IoT-Cloud Security
4.5 Conclusion
References
Chapter 5 Predictive Maintenance in Industry 4.0
5.1 Introduction
5.2 Related Work
5.3 Materials and Methods
5.3.1 Data Set
5.3.2 Data Insights
5.3.3 Outlier Detection
5.4 ML Model Evaluation Metrics
5.5 Results with the Multinomial NaΓ―ve Bayes Algorithm
5.6 Markov Chain
5.7 Weibull Process for Predictive Maintenance
5.8 Discussion and Conclusion
References
Chapter 6 Fast and Efficient Lightweight Block Ciphers Involving 2d-Key Vectors for Resource-Poor Settings
6.1 Introduction
6.2 Fast and Lightweight Block Cipher Model Development for the Resource-poor Healthcare System
6.3 Mathematical Models and Design Details
6.3.1 Pseudo-codes for the Cryptic Procedures
6.4 Exemplification and the Outcomes
6.4.1 Avalanche Effect Analysis
6.5 Simulation and Performance Analysis
6.5.1 Comparative Analysis of Popular Ciphers
6.6 Cryptanalysis
6.7 Conclusive Remarks and Future Directions
Acknowledgments
Funding
Contributions
Corresponding Author
Ethics Declarations
References
Chapter 7 Sentiment Analysis of Scraped Consumer Reviews (SASCR) Using Parallel and Distributed Analytics Approaches on Big Data in Cloud Environment
7.1 Introduction: Background and Driving Forces
7.2 Big Data
7.3 Methodology
7.4 Tool and Techniques
7.5 System Design
7.6 Technology Used
7.7 Result
7.8 Conclusion
Chapter 8 The UAV-Assisted Wireless Ad hoc Network
8.1 Introduction
8.2 Dynamic Mobility Inclusion in a Routing Protocol
8.3 UAV Placement and Ground Node Grouping
8.4 Data Dissemination
8.5 Trajectory Optimization
8.6 Discussion
8.7 Summary
References
Chapter 9 Integrating Cybernetics into Healthcare Systems: Security Perspective
9.1 Introduction
9.2 Data Breach in Healthcare
9.3 Previous Similar Research Initiatives
9.4 Needs and Importance of Cybernetics in Healthcare Security
9.5 Challenges
9.6 Future Works
9.7 Conclusion
References
Chapter 10 Threats and Countermeasures in Digital Crime and Cyberterrorism
10.1 Introduction
10.2 Literature Review
10.3 Proposed Framework
10.4 Data Flow Diagram
10.5 Countermeasures against Cybercrime and Cyberterrorism
10.6 Comparative Analysis
10.7 Application Work
10.8 Research Implications
10.9 Research Limitations
10.10 Conclusion and Future Scope
References
Chapter 11 Cryptography Techniques for Information Security: A Review
11.1 Introduction
11.2 Literature Review
11.3 Cryptography Techniques
11.3.1 Substitution Technique
11.3.1.1 Caesar Cipher
11.3.1.2 Mono Alphabetic Ciphers
11.3.1.3 Homophonic Cipher
11.3.1.4 Polyalphabetic Cipher
11.3.1.5 Playfair Cipher
11.3.2 Transposition Technique
11.3.2.1 Rail Fence Technique
11.3.2.2 Simple Columnar Technique
11.4 Discussion
11.5 Conclusion
References
Chapter 12 A Critical Analysis of Cyber Threats and Their Global Impact
12.1 Introduction
12.2 Classifications of E-crimes
12.3 Beginning and Growth of E-crimes
12.4 Advances in Cyber Threats and Computer Crime
12.4.1 System Exploitation
12.4.2 Phishing
12.4.3 A Man-in-the-Middle Attack
12.4.4 DoS Attack
12.4.5 Wi-Fi Exploitation
12.4.6 Ransomware
12.5 Indian Cyber Situation
12.6 Cyberattacks in India of Late
12.7 Global Organizations Fighting against Cybercrime
12.7.1 Careless Behaviors
Understanding and optim
Phishing Emails
12.8 Conclusion
References
Chapter 13 A Cybersecurity Perspective of Machine Learning Algorithms
13.1 Introduction
13.2 Supervised ML Approaches
13.2.1 Classification-Based Supervised ML Techniques
13.2.2 Regression-Based Supervised ML Techniques
13.3 Unsupervised ML Approaches
13.3.1 Clustering-Based Unsupervised ML Techniques
13.3.2 Association-Based Unsupervised ML Techniques
13.4 Cybersecurity Perspective
13.5 Conclusion
References
Chapter 14 Statistical Trend in CyberΒ Attacks and Security Measures
14.1 Introduction
14.1.1 Health Expenditure Indicators and Allocations
14.1.2 Role Players in the Medical Sector
14.1.3 Essential Considerations in the Healthcare Domain in Resource-Poor Contexts
14.1.3.1 Data Sharing among the Medical Sector Players
14.1.3.2 Rising Usage of Smart Devices among the Key Players of All Sectors
14.1.3.3 Economic and Educational Advancement of the Users Using Smartphones/Tablets
14.1.3.4 Need of Lightweight Computing for Maintaining the Data Secrecy of the Patientsβ Sensitive Data among the Resource-Poor Nations due to Weak Infrastructures
14.1.3.5 Adaptable Data-Sharing Protocols and Standards in Resource-Poor Setups
14.2 Role of Fundamental Elements for Enhancing Healthcare Quality in Resource-Poor Settings
14.2.1 Adaptive Systems
14.2.2 Participatory Approach
14.2.3 Accountability
14.2.4 Evidence and Audit-Based Intervention
14.2.5 Innovative Assessment and Evaluation
14.3 Data Security Threats and Countermeasures
14.3.1 Classification of Security Threats Breaching the Data Privacy
14.3.2 Healthcare Data Protection Laws
14.3.3 Healthcare Sector Security Practices
14.3.3.1 Database Standards Compliance and Monitoring
14.3.3.2 Datasets Classification and Assessment of User Rights Management
14.3.3.3 Data Masking
14.3.3.4 Data Confidentiality Using Encryption
14.4 Concluding Remarks
Contributions
References
Index
π SIMILAR VOLUMES
<p><span>This book looks at cyber security challenges with topical advancements in computational intelligence and communication technologies. This book includes invited peer-reviewed chapters on the emerging intelligent computing and communication technology research advancements, experimental outco
This cutting-edge resource offers practical overview of cognitive radio - a paradigm for wireless communications in which a network or a wireless node changes its transmission or reception parameters. The alteration of parameters is based on the active monitoring of several factors in the external a
<p><p>This book highlights the emerging field of intelligent computing and developing smart systems. It includes chapters discussing the outcome of challenging research related to distributed computing, smart machines and their security related research, and also covers next-generation communication
<span>WIRELESS COMMUNICATION </span><span>in</span><span> CYBERSECURITY</span><p><span>Presenting the concepts and advances of wireless communication in cybersecurity, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, an
Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a so