Explore
Security and Privacy for Modern Wireless Communication Systems
0 Ungluers have
Faved this Work
Login to Fave
The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power-constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks.
This book is included in DOAB.
Why read this book? Have your say.
You must be logged in to comment.
Rights Information
Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.Downloads
This work has been downloaded 53 times via unglue.it ebook links.
- 53 - pdf (CC BY) at Unglue.it.
Keywords
- 6G security
- 6G wireless communications
- aggregator-based grouping
- amplify-and-forward relay
- authentication
- AVISPA
- BAN logic
- biometric
- bitslice cipher
- blockchain
- chi-square
- CNN
- code abiding
- communication system security
- Computer science
- Computing & information technology
- convolutional neural network
- counterfeit detection
- covert channel
- cube attack
- cybersecurity
- device fingerprinting
- Digital twin
- Dilated CNN
- distance vector hop
- distinct native attribute (DNA)
- DV-Hop
- Economics, finance, business & management
- encryption
- encryption and decryption operations
- Error Detection
- fault attack
- full-duplex
- group features
- Healthcare
- in-vehicle communication
- Industry & industrial studies
- Information and communications technology
- Information technology industries
- inter-vehicle communication
- Internet of Things
- intrusion detection
- intrusion detection system
- LPWAN
- Machine learning
- machine learning techniques
- malicious node
- MDA
- Media, information & communication industries
- meta-model
- multiple discriminant analysis
- multiple eavesdroppers
- Optical Communication
- overcost
- Physical layer
- physical layer security
- physical unclonable function
- positioning
- precoding
- privacy
- propagation trends
- Rice channels
- RoR model
- Rural
- secure localization
- security
- security attacks
- security protocol
- security wireless
- Social networks
- stacking ensemble learning
- state recovery
- steganalysis
- steganography
- sycon
- underground mine
- undetectability
- visible light communication
- voting techniques
- wire-tap channel
- wireless body area networks
- wireless communication
- Wireless Communication Network
- wireless communications
- wireless communications security
- wireless optical communication
- wireless sensor network
- Wireless sensor networks
- WirelessHART