|
Showing 1 - 1 of
1 matches in All Departments
This timely book provides broad coverage of security and privacy
issues in the macro and micro perspective. In macroperspective, the
system and algorithm fundamentals of next-generation wireless
networks are discussed. In micro-perspective, this book focuses on
the key secure and privacy techniques in different emerging
networks from the interconnection view of human and cyber-physical
world. This book includes 7 chapters from prominent international
researchers working in this subject area. This book serves as a
useful reference for researchers, graduate students, and
practitioners seeking solutions to wireless security and privacy
related issues Recent advances in wireless communication
technologies have enabled the large-scale deployment of
next-generation wireless networks, and many other wireless
applications are emerging. The next generation of mobile networks
continues to transform the way people communicate and access
information. As a matter of fact, next-generation emerging networks
are exploiting their numerous applications in both military and
civil fields. For most applications, it is important to guarantee
high security of the deployed network in order to defend against
attacks from adversaries, as well as the privacy intrusion. The key
target in the development of next-generation wireless networks is
to promote the integration of the human, cyber, and physical
worlds. Previous work in Cyber Physical Systems (CPS) considered
the connection between the cyber world and the physical world. In
the recent studies, human involvement brings new channels and
initiatives in this interconnection. In this integration process,
security and privacy are critical issues to many wireless network
applications, and it is a paramount concern for the growth of
next-generation wireless networks. This is due to the open nature
of wireless communication and the involvement of humans. New
opportunities for tackling these security and privacy issues in
next-generation wireless networks will be achieved by leveraging
the properties of interaction among human, computers and things.
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.