![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid's different communication networks and preserve the privacy of the involved. Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid's control center doesn't get enough information about customers' requirements and consequently can't prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers' requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution. That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid's resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid's control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.
This book constitutes the refereed post-conference proceedings of the 7th International Conference on Mobile Communication and Healthcare, MobiHealth 2017, held in Vienna, Austria, in November 2017. The 34 revised full papers were reviewed and selected from more than 50 submissions and are organized in topical sections covering data analysis, systems, work-in-process, pervasive and wearable health monitoring, advances in healthcare services, design for healthcare, advances in soft wearable technology for mobile-health, sensors and circuits.
A wireless sensor network (WSN) uses a number of autonomous devices to cooperatively monitor physical or environmental conditions via a wireless network. Since its military beginnings as a means of battlefield surveillance, practical use of this technology has extended to a range of civilian applications including environmental monitoring, natural disaster prediction and relief, health monitoring and fire detection. Technological advancements, coupled with lowering costs, suggest that wireless sensor networks will have a significant impact on 21st century life. The design of wireless sensor networks requires consideration for several disciplines such as distributed signal processing, communications and cross-layer design. "Wireless Sensor Networks: Signal Processing and Communications" focuses on the theoretical aspects of wireless sensor networks and offers readers signal processing and communication perspectives on the design of large-scale networks. It explains state-of-the-art design theories and techniques to readers and places emphasis on the fundamental properties of large-scale sensor networks. "Wireless Sensor Networks: Signal Processing and Communications" Approaches WSNs from a new angle - distributed signal processing, communication algorithms and novel cross-layer design paradigms. Applies ideas and illustrations from classical theory to an emerging field of WSN applications. Presents important analytical tools for use in the design of application-specific WSNs. "Wireless Sensor Networks" will be of use to signal processing and communications researchers and practitioners in applying classical theory to network design. It identifies research directions for senior undergraduate and graduate students and offers a rich bibliography for further reading and investigation.
This book highlights routing protocols for wireless mesh networks (WMNs; IEEE 802.11s). It provides an overview of the wireless networks (history, MANET, family of IEEE 802.11, WMNS, etc.) and routing protocols, such as AODV, DSR, OLSR, etc, and also highlights two resolutions of routing protocols with respect to end-to-end delay, packet delivery ratio and routing overhead in WMNs. Wireless mesh networks have become a hot topic for researcher into the deployment of wireless networks, and they represents the connectivity of mesh networking in IEEE 802.11 amendment in static and ad-hoc networks. Moreover, WMNs have numerous attractive features, such as highly reliable connectivity, easy deployment, self-healing, self-configuring, and flexible network expansion. The book describes two routing mechanisms: novel cluster-based routing protocols (NCBRP), and decentralized hybrid wireless mesh protocol (DHWMP).
The important and fascinating topics of radar enjoy an extensive audience in industry and government but deserve more attention in undergraduate education to better prepare graduating engineers to meet the demands of modern mankind. Radar is not only one of the major applications of electronics and electromagnetic communications, but it is also a mature scientific discipline with significant theoretical and mathematical foundations that warrant an intellectual and educational challenge. Fundamental Principles of Radar is a textbook providing a first exposure to radar principles. It provides a broad concept underlying the basic principle of operations of most existing radar systems and maintains a good balance of mathematical rigor to convince readers without losing interest. The book provides an extensive exposition of the techniques currently being used for radar system design, analysis, and evaluation. It presents a comprehensive set of radar principles, including all features of modern radar applications, with their underlying derivations using simple mathematics. Coverage is limited to the main concepts of radar in order to present them in a systematic and organized fashion. Topics are treated not as abstruse and esoteric to the point of incomprehensibility, but the very complex and rich technology of radar is distilled into its fundamentals. The author's emphasis is on clarity without sacrificing rigor and completeness, thus making the book broad enough to satisfy a variety of backgrounds and interests. Thorough documentation provides an unusual degree of completeness for a textbook at this level, with interesting and sometimes thought-provoking content to make the subject even more appealing. Key Features: Covers a wide range of topics in radar systems Includes examples and exercises to reinforce the concepts presented and explain their applications Provides self-contained chapters useful for readers seeking selective topics Provides broad concepts underlying the basic principles of operations of most types of radars in use today Includes documentation to lead to further reading of interesting concepts and applications
This book presents the state of the art in the field of mobile and wireless networks, and anticipates the arrival of new standards and architectures. It focuses on wireless networks, starting with small personal area networks and progressing onto the very large cells of wireless regional area networks, via local area networks dominated by WiFi technology, and finally metropolitan networks. After a description of the existing 2G and 3G standards, with LTE being the latest release, LTE-A is addressed, which is the first 4G release, and a first indication of 5G is provided as seen through the standardizing bodies. 4G technology is described in detail along with the different LTE extensions related to the massive arrival of femtocells, the increase to a 1 Gbps capacity, and relay techniques. 5G is also discussed in order to show what can be expected in the near future. The Internet of Things is explained in a specific chapter due to its omnipresence in the literature, ad hoc and mesh networks form another important chapter as they have made a comeback after a long period of near hibernation, and the final chapter discusses a particularly recent topic: Mobile-Edge Computing (MEC) servers.
This book constitutes the proceedings of the 9th International Conference on Wireless and Satellite Services, WiSATS 2017, held in Oxford, UK, in September 2017. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. The aim of this conference is to bring together researchers, developers and practitioners from around the world in the field of wireless and satellite systems. The theme of WiSATS 2017 was on the means of using the wireless and satellite services directly to the user for personal communications, multimedia and location identification.
The latest edition provides a comprehensive foundation for image and video compression. It covers HEVC/H.265 and future video coding activities, in addition to Internet Video Coding. The book features updated chapters and content, along with several new chapters and sections. It adheres to the current international standards, including the JPEG standard.
In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As always, adequate security remains one of the open areas of concern before wide deployment of RFID and WSNs can be achieved. Security in RFID and Sensor Networks is the first book to offer a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and integrated RFID and WSNs, providing an essential reference for those who regularly interface with these versatile technologies. Exposes Security Risks The book begins with a discussion of current security issues that threaten the effective use of RFID technology. The contributors examine multi-tag systems, relay attacks, authentication protocols, lightweight cryptography, and host of other topics related to RFID safety. The book then shifts the focus to WSNs, beginning with a background in sensor network security before moving on to survey intrusion detection, malicious node detection, jamming, and other issues of concern to WSNs and their myriad of applications. Offers Viable Solutions In each chapter, the contributors propose effective solutions to the plethora of security challenges that confront users, offering practical examples to aid in intuitive understanding. The last part of the book reviews the security problems inherent in integrated RFID & WSNs. The book ends with a glimpse of the future possibilities in these burgeoning technologies and provides recommendations for the proactive design of secure wireless embedded systems.
This book constitutes the proceedings of the First International Conference on 5G for Future Wireless Networks, 5GWN 2017, held in Beijing, China, in April 2017. The 64 full papers were selected from 135 submissions and present the state of the art and practical applications of 5G technologies. The exponentially growing data traffic caused by the development of mobile Internet and smart phones requires powerful networks. The fifth generation (5G) techniques are promising to meet the requirements of this explosive data traffic in future mobile communications.
This book gathers the Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, held on November 8-10, 2017 in Barcelona, Spain. Information networking is currently undergoing a rapid evolution. Different kinds of networks with different characteristics are emerging and being integrated in heterogeneous networks. As a result, there are many interconnected problems that can occur at different levels of the hardware and software design of communicating entities and communication networks. These networks are expected to manage increasing usage demand, provide support for a significant number of services, guarantee Quality of Service (QoS), and optimize the use of network resources. The success of all-IP networking and wireless technology has changed the lifestyles of people around the world, and advances in electronic integration and wireless communications will pave the way to providing access to wireless networks on the fly, as electronic devices can increasingly exchange information with each other virtually anytime and anywhere. The aim of this book is to provide the latest findings, methods and development techniques from both theoretical and practical perspectives regarding the emerging areas of broad-band and wireless computing.
Delay- and Disruption Tolerant Networks (DTNs) are networks subject to arbitrarily long-lived disruptions in connectivity and therefore cannot guarantee end-to-end connectivity at all times. Consequently DTNs called for novel core networking protocols since most existing Internet protocols rely on the network's ability to maintain end-to-end communication between participating nodes. This book presents the fundamental principles that underline DTNs. It explains the state-of-the-art on DTNs, their architecture, protocols, and applications. It also explores DTN's future technological trends and applications. Its main goal is to serve as a reference for researchers and practitioners.
This book constitutes the refereed proceedings of the 13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017, held in Beijing, China, in December 2017. The 39 revised full papers presented were carefully reviewed and selected from 145 submissions. The papers address issues such as multi-hop wireless networks and wireless mesh networks; sensor and actuator networks; vehicle ad hoc networks; mobile social network; delay tolerant networks and opportunistic networking; cyber-physical systems; internet of things; system modeling and performance analysis; routing and network protocols; data transport and management in mobile networks; resource management and wireless QoS provisioning; security and privacy; cross layer design and optimization; novel applications and architectures.
This open access book, authored by a world-leading researcher in this field, describes fundamentals of dynamic spectrum management, provides a systematic overview on the enabling technologies covering cognitive radio, blockchain, and artificial intelligence, and offers valuable guidance for designing advanced wireless communications systems. This book is intended for a broad range of readers, including students and professionals in this field, as well as radio spectrum policy makers.
This book constitutes the thoroughly refereed conference proceedings of the 12th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2017, held in Lisbon, Portugal, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from numerous submissions and cover the evolution of cognitive radio technology pertaining to 5G networks. The papers are clustered to topics on spectrum management; network management; trials, test beds, and tools; PHY and sensing; spectrum management.
This book includes proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), which took place in Asan, Korea, on July 1-3, 2021. With the proliferation of wireless technologies and electronic devices, there is a fast-growing interest in Ubiquitous and Pervasive Computing (UPC). The UPC enables to create a human-oriented computing environment where computer chips are embedded in everyday objects and interact with physical world. Through UPC, people can get online even while moving around, thus, having almost permanent access to their preferred services. With a great potential to revolutionize our lives, UPC also poses new research challenges.The aim of the book is to provide the latest research findings, methods, development techniques, challenges, and solutions from both theoretical and practical perspectives related to UPC with an emphasis on innovative, mobile, and Internet services.
There have been recent advancements in wireless network technologies such as wireless virtualization to accommodate the exponential growth in demand, as well as to increase energy and infrastructure efficiencies. This SpringerBrief discusses the user-association and resource-allocation aspects in Virtualized Wireless Networks (VWNs) and highlights key technology innovations to meet their requirements. Various issues in practical implementation of VWNs are discussed along with potential techniques such as Massive MIMO, Cloud-Radio Access Network (C-RAN), and non-orthogonal multiple access (NOMA). This SpringerBrief will target researchers and professionals working on current and next-generation wireless networks. The content is also valuable for advanced-level students interested in wireless communications and signal processing for communications.
IEEE 802.11ba Discover the latest developments in IEEE 802.11ba and Wake-up Radios In IEEE 802.11ba: Ultra-Low Power Wake-up Radio Standard, expert engineers Drs. Steve Shellhammer, Alfred Asterjadhi, and Yanjun Sun deliver a detailed discussion of the IEEE 802.11ba standard. The book begins by explaining the concept of a wake-up radio (WUR) and how it fits into the overall 802.11 standard, as well as how a WUR saves power and extends battery life. The authors go on to describe the medium access control (MAC) layer in detail and then talk about the various protocols used to negotiate WUR operation, its uses for different functionalities (like wake up of the main radio, discovery, synchronization, and security). The book offers a detailed description of the physical (PHY) layer packet construction and the rationale for the design, as well as the various design aspects of the medium access control layer. It also includes: A thorough introduction to the motivations driving the development of the WUR in 802.11 Practical overviews of IEEE 802.11, including the basic concepts of 802.11 (the PHY and MAC) and background material on current low power modes Comprehensive discussions of the physical layer and PHY layer performance, including the generic receiver, the PPDU, Transmit Diversity, and the FDMA mode In-depth examinations of the medium access layer and its frame designs Perfect for professional wireless engineers, IEEE 802.11ba: Ultra-Low Power Wake-up Radio Standard will also earn a place in the libraries of academics and students researching and studying in fields involving wireless communications.
The transformational technologies of the Internet-Web compound continue to exert a vast and readily apparent influence on the way we live and work. In recent times, internet penetration is now very high in most parts of the world, impacting the context and content of the workplace and the boundary between work and private life is even more porous. Not only has the reach increased, but the technologies to access the Internet-Web have further evolved towards increasing portability. The hardware evolution from desktops to laptops to mobile technologies (phones, tablets, watches, eyeglasses) marches forward. The increasing mobility and 24/7 accessibility offers the opportune time to revisit the transformations occurring. Today the Internet consists of billions of digital devices, people, services and other physical objects with the potential to seamlessly connect, interact and exchange information about themselves and their environment. Organizations now use these digital devices and physical objects to produce and consume Internet-based services. This new Internet ecosystem is commonly referred to as the Internet of People, Things and Services (IoPTS). In this follow-up to their 2006 volume, Simmers & Anandarajan examine how The Internet of People, Things and Services (IoPTS) transforms our workplaces. Information and communications technology (ICT) expansion from desktops to laptops to ubiquitous smart objects that sense and communicate directly over the internet - the IoPTS - offers us the opportune time to revisit how the Internet transforms our workplaces.
This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.
The success of all-IP networking and wireless technology has changed the ways of living the people around the world. The progress of electronic integration and wireless communications is going to pave the way to offer people the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the information with each other in ubiquitous way whenever necessary. The aim of the volume is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of broadband and wireless computing. This proceedings volume presents the results of the 11th International Conference on Broad-Band Wireless Computing, Communication And Applications (BWCCA-2016), held November 5-7, 2016, at Soonchunhyang University, Asan, Korea.
The book contains three parts: Spectral theory of large dimensional random matrices; Applications to wireless communications; and Applications to finance. In the first part, we introduce some basic theorems of spectral analysis of large dimensional random matrices that are obtained under finite moment conditions, such as the limiting spectral distributions of Wigner matrix and that of large dimensional sample covariance matrix, limits of extreme eigenvalues, and the central limit theorems for linear spectral statistics. In the second part, we introduce some basic examples of applications of random matrix theory to wireless communications and in the third part, we present some examples of Applications to statistical finance.
This book introduces Radio Frequency Channel Coding to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applications of wireless communications. The presentation is designed to be easily accessible, minimizing mathematics and maximizing visuals.
This book presents Internet of Things (IoT) technology and security-related solutions that employ intelligent data processing technologies and machine learning (ML) approaches for data analytics. It presents practical scenarios from the industry for the application of the internet of things in various domains. Next Generation Communication Networks for Industrial Internet of Things Systems presents concepts and research challenges in communication networking for Industrial internet of things systems. Features: Discusses process monitoring, environmental monitoring, control, and maintenance monitoring. Covers data collection and communication protocols in a comprehensive manner. Highlights the internet of things industrial applications, and industrial revolution 4.0. Presents 5G-enabled internet of things technology and architecture. Showcases artificial intelligence techniques in the IoT networks. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in the areas of electrical engineering, electronics, and communications engineering, computer engineering, and information technology.
This book provides a comprehensive coverage of major channel codes adopted since the 3rd generation of mobile communication. Modulation schemes suitable for 5G mobile communications are also described based on key New Radio application scenarios and performance requirements. It covers low density parity check (LDPC) codes, Polar codes, tail-biting convolutional codes (TBCC) and Turbo codes. Outer codes and a few advanced coding and modulations are also discussed. In addition, it includes detailed illustration of each channel coding scheme such as the basic code structure, decoding algorithms, performance evaluation and complexity analysis. The book offers insights on why and how channel codes are designed and developed in standardization organizations, which significantly facilitates the reading and understanding of the of 5G channel coding technologies. Channel Coding in 5G New Radio will be an essential read for researchers and students of digital communications, wireless communications engineers, and those who are interested in mobile communications in general. |
![]() ![]() You may like...
Advances in Sensitivity Analysis and…
Tomas Gal, H.J. Greenberg
Hardcover
R7,407
Discovery Miles 74 070
|