Secure Communication for 5G and IoT Networks » MIRLIB.RU - ТВОЯ БИБЛИОТЕКА
Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills Linear Algebra for Data Science, Machine Learning, and Signal Processing Linear Algebra for Data Science, Machine Learning, and Signal Processing DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира Декоративно-прикладное искусство (2007) Декоративно-прикладное искусство (2007) США и борьба Латинской Америки за независимость, 1815 - 1830 США и борьба Латинской Америки за независимость, 1815 - 1830 Военный энциклопедический словарь ракетных войск стратегического назначения Военный энциклопедический словарь ракетных войск стратегического назначения Юный электротехник (1959) Юный электротехник (1959) Tipo 00 The Pasta Cookbook: For People Who Love Pasta Tipo 00 The Pasta Cookbook: For People Who Love Pasta Creating the Human Past: An Epistemology of Pleistocene Archaeology Creating the Human Past: An Epistemology of Pleistocene Archaeology Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) Обработка динамических характеристик систем автоматизации Обработка динамических характеристик систем автоматизации PowerShell: Lists and Arrays PowerShell: Lists and Arrays
Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Физико-химические расчеты. Возможности компьютерной математи­ки: учебное пособие Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Волшебство и вычисления: практическое пособие для начинающих фокусников и программистов Conjuring with Computation: A Manual of Magic and Computing for Beginners Conjuring with Computation: A Manual of Magic and Computing for Beginners A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills A Common-Sense Guide to Data Structures and Algorithms in Python, Volume 1: Level Up Your Core Programming Skills Linear Algebra for Data Science, Machine Learning, and Signal Processing Linear Algebra for Data Science, Machine Learning, and Signal Processing DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира DeFi 2.0: Новый Взгляд на Инвестиции и Будущее Эфира Декоративно-прикладное искусство (2007) Декоративно-прикладное искусство (2007) США и борьба Латинской Америки за независимость, 1815 - 1830 США и борьба Латинской Америки за независимость, 1815 - 1830 Военный энциклопедический словарь ракетных войск стратегического назначения Военный энциклопедический словарь ракетных войск стратегического назначения Юный электротехник (1959) Юный электротехник (1959) Tipo 00 The Pasta Cookbook: For People Who Love Pasta Tipo 00 The Pasta Cookbook: For People Who Love Pasta Creating the Human Past: An Epistemology of Pleistocene Archaeology Creating the Human Past: An Epistemology of Pleistocene Archaeology Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) Die Ersten und die Letzten: Jagdflieger im Zweiten Weltkrieg (Flechsig - Geschichte/Zeitgeschichte) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) The Caner's Handbook: Restoring Cane, Rush, Splint, Danish Cord, Rawhide, and Wicker Furniture (Updated & Revised Edition) Обработка динамических характеристик систем автоматизации Обработка динамических характеристик систем автоматизации PowerShell: Lists and Arrays PowerShell: Lists and Arrays
Категория: КНИГИ » СЕТЕВЫЕ ТЕХНОЛОГИИ
Secure Communication for 5G and IoT Networks
/
Secure Communication for 5G and IoT NetworksНазвание: Secure Communication for 5G and IoT Networks
Автор: S. Velliangiri, M. Gunasekaran, P. Karthikeyan
Издательство: Springer
Год: 2022
Страниц: 248
Язык: английский
Формат: pdf (true), epub
Размер: 20.1 MB

This book highlights research on secure communication of 5G and the Internet of Things (IoT) Networks, along with related areas to ensure secure and Internet-compatible IoT systems. The authors not only discuss 5G and IoT security and privacy challenges, but also energy efficient approaches to improving the ecosystems through communication. The book addresses the secure communication and privacy of the 5G and IoT technologies, while also revealing the impact of IoT technologies on several scenarios in smart city design. Intended as a comprehensive introduction, the book offers in-depth analysis and provides scientists, engineers and professionals the latest techniques, frameworks and strategies used in 5G and IoT technologies.

Detection of points, contextual and collective anomalies, network intrusion, malware, ransomware, and intruders are the identified application areas of IoT security. The technologies explored for providing security in the 5G-IoT scenario are presented here:

Authentication and Access Control
Authentication is rendered to be the prime security mechanism in IoT applications. However, these mechanisms have been challenged by attacks like node impersonation, node bypassing, and node capture attacks. Access control involves identification, authentication, authorization, and accountability. Behrad et al. proposed a slice-specific authentication and access control (SSAAC) protocol for a 5G-IoT scenario using three network functions, namely Gateway virtual function provided by a third party, Gateway function repository, and radio resource control connection endpoint

Blockchain-Based Security
Adoption of blockchain technology in this 5G-IoT scenario, which usually includes a trusted intermediary, clearly enhances the robustness and trustworthiness of the data involved. A block basically contains the data on transactions, timestamp, cryptographic hash function, reference to the previous block, and smart contracts if required. Blockchain technology provides security based on the transparency of data and auditability, information distribution, robustness, and decentralization.

Machine Learning and Big Data–Based Security
The machine learning (ML), deep learning (DL), and big data technologies used to secure the IoT services have also been reviewed here. Edge computing platform ushered in the analytics revolution and also enhances the performance of complex applications like virtual and augmented reality, smart city applications, and so on. Establishment of a strong defensive framework and detection of active and passive attacks in IoT networks can be done based on ML techniques, which comprise supervised, unsupervised, and reinforcement learning methodologies. Supervised learning techniques include support vector machine (SVM), random forest (RF), Bayesian theorem, k-nearest neighbor (k-NN), decision tree (DT), neural network (NN), and ensemble learning. Techniques like principal component analysis (PCA) and k-means clustering comprise the unsupervised techniques.

Скачать Secure Communication for 5G and IoT Networks





ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!





[related-news]
[/related-news]
Комментарии 0
Комментариев пока нет. Стань первым!