• Complain

Ahmed A. Abd El-Latif (editor) - Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (Studies in Big Data, 95)

Here you can read online Ahmed A. Abd El-Latif (editor) - Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (Studies in Big Data, 95) full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Springer, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Ahmed A. Abd El-Latif (editor) Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (Studies in Big Data, 95)

Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (Studies in Big Data, 95): summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (Studies in Big Data, 95)" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications

It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.

Ahmed A. Abd El-Latif (editor): author's other books


Who wrote Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (Studies in Big Data, 95)? Find out the surname, the name of the author of the book and a list of all author's works by series.

Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (Studies in Big Data, 95) — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (Studies in Big Data, 95)" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Security and Privacy Preserving for IoT and 5G Networks Volume - photo 1
Book cover of Security and Privacy Preserving for IoT and 5G Networks
Volume 95
Studies in Big Data
Series Editor
Janusz Kacprzyk
Polish Academy of Sciences, Warsaw, Poland

The series Studies in Big Data (SBD) publishes new developments and advances in the various areas of Big Data- quickly and with a high quality. The intent is to cover the theory, research, development, and applications of Big Data, as embedded in the fields of engineering, computer science, physics, economics and life sciences. The books of the series refer to the analysis and understanding of large, complex, and/or distributed data sets generated from recent digital sources coming from sensors or other physical instruments as well as simulations, crowd sourcing, social networks or other internet transactions, such as emails or video click streams and other. The series contains monographs, lecture notes and edited volumes in Big Data spanning the areas of computational intelligence including neural networks, evolutionary computation, soft computing, fuzzy systems, as well as artificial intelligence, data mining, modern statistics and Operations research, as well as self-organizing systems. Of particular value to both the contributors and the readership are the short publication timeframe and the world-wide distribution, which enable both wide and rapid dissemination of research output.

The books of this series are reviewed in a single blind peer review process.

Indexed by SCOPUS, EI Compendex, SCIMAGO and zbMATH.

All books published in the series are submitted for consideration in Web of Science.

More information about this series at http://www.springer.com/series/11970

Editors
Ahmed A. Abd El-Latif , Bassem Abd-El-Atty , Salvador E. Venegas-Andraca , Wojciech Mazurczyk and Brij B. Gupta
Security and Privacy Preserving for IoT and 5G Networks
Techniques, Challenges, and New Directions
1st ed. 2022
Logo of the publisher Editors Ahmed A Abd El-Latif Department of - photo 2
Logo of the publisher
Editors
Ahmed A. Abd El-Latif
Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, Menoufia, Egypt
Bassem Abd-El-Atty
Department of Computer Science, Luxor University, Luxor, Egypt
Salvador E. Venegas-Andraca
School of Engineering and Sciences, Tecnologico de Monterrey, Monterrey, Mexico
Wojciech Mazurczyk
Institute of Computer Science, Warsaw University of Technology, Warsaw, Poland
Brij B. Gupta
National Institute of Technology Kurukshetra, Kurukshetra, India
ISSN 2197-6503 e-ISSN 2197-6511
Studies in Big Data
ISBN 978-3-030-85427-0 e-ISBN 978-3-030-85428-7
https://doi.org/10.1007/978-3-030-85428-7
The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2022
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Preface

Complexity is the worst enemy of security, and our systems are getting more complex all the time.

Bruce Schneier, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

The communication in 5G networks and beyond is currently in the center of attention of industry, academia, and government worldwide. 5G network concepts drive many new requirements for different network capabilities. As these networks aim at utilizing many promising network technologies, such as Software Defined Networking (SDN), Network Functions Virtualization (NFV), Information Centric Network (ICN), Network Slicing or Cloud Computing and supporting a huge number of connected devices integrating above mentioned advanced technologies and innovating new techniques will surely bring tremendous challenges for security, privacy and trust.

Based on the above mentioned technologies, it is predicted that communication in 5G networks will offer significantly greater data bandwidth and almost infinite capability of networking resulting in unfaltering user experiences for, among others: virtual/augmented reality, massive content streaming, telepresence, user-centric computing, crowded area services, smart personal networks, smart buildings/cities, and Internet of Things (IoT).

The concept of Internet of Things (IoT) incorporates various types of interconnected objects and devices which are typically resource-constrained but still have access to the Internet. The popularity of IoT has dramatically increased in recent years, as such solutions can be utilized for various purposes, including enhanced communication, transportation, education, business development, etc. However, in such networks still privacy and security aspects are among the most significant challenges which include lack of efficient and robust security protocols, lack of user awareness or improper configuration.

Considering above, secure network architectures, mechanisms, and protocols are required as the basis for 5G as well as IoT networks to address these issues and follow security-by-design approach. Moreover, since in such type of networks even more user data and network traffic will be transmitted, big data security solutions should be considered in order to address the magnitude of the data volume and ensure data security and privacy.

This book presents state-of-the-art research and the latest discoveries related to security and privacy-preserving mechanisms for 5G and IoT networks and their applications. Its chapters cover many important topics in this area, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS attack detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many others. Moreover, it proposes new models, practical solutions and technological advances related to transmitted data in 5G networks with IoT, cloud computing, and other applications in Smart Cities. Finally, it highlights and discusses the techniques and security challenges of data processing in IoT and 5G networks.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (Studies in Big Data, 95)»

Look at similar books to Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (Studies in Big Data, 95). We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (Studies in Big Data, 95)»

Discussion, reviews of the book Security and Privacy Preserving for IoT and 5G Networks: Techniques, Challenges, and New Directions (Studies in Big Data, 95) and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.