Local cover image
Local cover image

Security and privacy preserving for IoT and 5G networks : techniques, challenges, and new directions Ahmed A. Abd El-Latif (Editor), Bassem Abd-El-Atty (Editor), Salvador Elías Venegas-Andraca (Editor), Wojciech Mazurczyk (Editor), Brij Gupta (Editor)

By: Material type: TextTextSeries: Studies in big data ; 95Publication details: Cham Springer 2022Description: 278 pages 30 cmISBN:
  • 9783030854270
Subject(s): DDC classification:
  • 005.8 ABD
Contents:
Authentic QR codes for Traceability and Tamper Detection in IoT Enabled Waste Management Networks Data Security Challenges in Deep Neural Network for Healthcare IoT Systems Efficacious Data Transfer Accomplished by Trustworthy Nodes in Cognitive Radio A Multi-fusion IoT Authentication System Based on Internal Deep Fusion of ECG signals Overview of information hiding algorithms for ensuring security in IoT based cyber-physical systems Survey on Mobile Edge-Cloud Computing: A Taxonomy on Computation offloading Approaches
Summary: This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Authentic QR codes for Traceability and Tamper Detection in IoT Enabled Waste Management Networks
Data Security Challenges in Deep Neural Network for Healthcare IoT Systems
Efficacious Data Transfer Accomplished by Trustworthy Nodes in Cognitive Radio
A Multi-fusion IoT Authentication System Based on Internal Deep Fusion of ECG signals
Overview of information hiding algorithms for ensuring security in IoT based cyber-physical systems
Survey on Mobile Edge-Cloud Computing: A Taxonomy on Computation offloading Approaches

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image