<p>This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, includingΒ traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data tra
Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (Studies in Big Data, 95)
β Scribed by Ahmed A. Abd El-Latif (editor), Bassem Abd-El-Atty (editor), Salvador E. Venegas-Andraca (editor), Wojciech Mazurczyk (editor), Brij B. Gupta (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 289
- Edition
- 1st ed. 2022
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, includingΒ traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications
It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.Β
π SIMILAR VOLUMES
<p><span>This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, dat
Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Secu
<p><span>The integration of fog computing with the resource-limited Internet of Things (IoT) network formulates the concept of the fog-enabled IoT system. Due to a large number of IoT devices, the IoT is a main source of Big Data. A large volume of sensing data is generated by IoT systems such as sm
<p><span>The integration of fog computing with the resource-limited Internet of Things (IoT) network formulates the concept of the fog-enabled IoT system. Due to a large number of IoT devices, the IoT is a main source of Big Data. A large volume of sensing data is generated by IoT systems such as sm
This book discusses the evolution of security and privacy issues in the Internet of Things (IoT). The book focuses on assembling all security- and privacy-related technologies into a single source so that students, researchers, academics, and those in the industry can easily understand the IoT secur