Fr. 270.00

Wireless Communication Security

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

WIRELESS COMMUNICATION SECURITY
 
Presenting the concepts and advances of wireless communication security, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, and other industry professionals.
 
Covering a broad range of topics in wireless communication security and its solutions, this outstanding new volume is of great interest to engineers, scientists, and students from a variety of backgrounds and interests. Focusing on providing the theory of wireless communication within the framework of its practical applications, the contributors take on a wealth of topics, integrating seemingly diverse areas under one cover.
 
Wireless Communication Security has been divided into five units. The first unit presents the different protocols and standards for developing a real-time wireless communication security. The second unit presents different widely accepted networks, which are the core of wireless communication security. Unit three presents the various device and network controlling methodologies. Unit four presents the various high performance and computationally efficient algorithms for efficient and scalable implementation of network protocols, and the last unit presents the leading innovations and variety of usage of wireless communication security. Valuable as a learning tool for beginners in this area as well as a daily reference for engineers and scientists working in these areas, this is a must-have for any library.

List of contents

Preface xiii
 
1 M2M in 5G Cellular Networks: Challenges, Proposed Solutions, and Future Directions 1
Kiran Ahuja and Indu Bala
 
1.1 Introduction 2
 
1.2 Literature Survey 5
 
1.3 Survey Challenges and Proposed Solutions of M2M 7
 
1.3.1 PARCH Overload Problem 8
 
1.3.2 Inefficient Radio Resource Utilization and Allocation 10
 
1.3.3 M2M Random Access Challenges 12
 
1.3.4 Clustering Techniques 13
 
1.3.5 QoS Provisioning for M2M Communications 15
 
1.3.6 Less Cost and Low Power Device Requirements 16
 
1.3.7 Security and Privacy 17
 
1.4 Conclusion 18
 
References 19
 
2 MAC Layer Protocol for Wireless Security 23
Sushmita Kumari and Manisha Bharti
 
2.1 Introduction 23
 
2.2 MAC Layer 24
 
2.2.1 Centralized Control 24
 
2.2.2 Deterministic Access 24
 
2.2.3 Non-Deterministic Access 24
 
2.3 Functions of the MAC Layer 25
 
2.4 MAC Layer Protocol 25
 
2.4.1 Random Access Protocol 26
 
2.4.2 Controlled Access Protocols 29
 
2.4.3 Channelization 31
 
2.5 MAC Address 31
 
2.6 Conclusion and Future Scope 33
 
References 33
 
3 Enhanced Image Security Through Hybrid Approach: Protect Your Copyright Over Digital Images 35
Shaifali M. Arora and Poonam Kadian
 
3.1 Introduction 36
 
3.2 Literature Review 38
 
3.3 Design Issues 40
 
3.3.1 Robustness Against Various Attack Conditions 40
 
3.3.2 Distortion and Visual Quality 41
 
3.3.3 Working Domain 42
 
3.3.4 Human Visual System (HVS) 43
 
3.3.5 The Trade-Off between Robustness and Imperceptibility 43
 
3.3.6 Computational Cost 43
 
3.4 A Secure Grayscale Image Watermarking Based on DWT-SVD 43
 
3.5 Experimental Results 45
 
3.6 Conclusion 52
 
References 52
 
4 Quantum Computing 59
Manisha Bharti and Tanvika Garg
 
4.1 Introduction 59
 
4.2 A Brief History of Quantum Computing 60
 
4.3 Postulate of Quantum Mechanics 61
 
4.4 Polarization and Entanglement 61
 
4.5 Applications and Advancements 63
 
4.5.1 Cryptography, Teleportation and Communication Networks 63
 
4.5.2 Quantum Computing and Memories 63
 
4.5.3 Satellite Communication Based on Quantum Computing 64
 
4.5.4 Machine Learning & Artificial Intelligence 65
 
4.6 Optical Quantum Computing 65
 
4.7 Experimental Realisation of Quantum Computer 66
 
4.7.1 Hetero-Polymers 66
 
4.7.2 Ion Traps 67
 
4.7.3 Quantum Electrodynamics Cavity 67
 
4.7.4 Quantum Dots 67
 
4.8 Challenges of Quantum Computing 67
 
4.9 Conclusion and Future Scope 68
 
References 68
 
5 Feature Engineering for Flow-Based IDS 69
Rahul B. Adhao and Vinod K. Pachghare
 
5.1 Introduction 70
 
5.1.1 Intrusion Detection System 71
 
5.1.2 IDS Classification 71
 
5.2 IP Flows 72
 
5.2.1 The Architecture of Flow-Based IDS 73
 
5.2.2 Wireless IDS Designed Using Flow-Based Approach 73
 
5.2.3 Comparison of Flow- and Packet-Based IDS 74
 
5.3 Feature Engineering 75
 
5.3.1 Curse of Dimensionality 76
 
5.3.2 Feature Selection 78
 
5.3.3 Feature Categorization 78
 
5.4 Classification of Feature Selection Technique 78
 
5.4.1 The Wrapper, Filter, and Embedded Feature Selection 78
 
5.4.2 Correlation, Consistency, and PCA-Based Feature Selection 80
 
5.4.3 Similarity, Information Theoretical, Sparse Learning, and Statistical-Based Feature Se

About the author










Manju Khari, PhD, is an assistant professor in AIACTR, affiliated with GGSIP University, Delhi, India. She is also the professor-in-charge of the IT Services of the Institute and has experience of more than twelve years in network planning and management. She holds a PhD in computer science and engineering from the National Institute of Technology, Patna. Manisha Bharti, PhD, is an assistant professor at the National Institute of Technology (NIT) Delhi, India. She received her PhD from IKG Punjab Technical University, Jalandhar and has over 12 years of teaching and research experience. M. Niranjanamurthy, PhD, is an assistant professor in the Department of Computer Applications, M S Ramaiah Institute of Technology, Bangalore, Karnataka. He earned his PhD in computer science at JJTU. He has over 10 years of teaching experience and two years of industry experience as a software engineer. He has two patents to his credit and has won numerous awards. He has published four books, and he is currently working on numerous books for Scrivener Publishing. He has also published over 50 papers in scholarly journals.

Summary

WIRELESS COMMUNICATION SECURITY

Presenting the concepts and advances of wireless communication security, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, and other industry professionals.

Covering a broad range of topics in wireless communication security and its solutions, this outstanding new volume is of great interest to engineers, scientists, and students from a variety of backgrounds and interests. Focusing on providing the theory of wireless communication within the framework of its practical applications, the contributors take on a wealth of topics, integrating seemingly diverse areas under one cover.

Wireless Communication Security has been divided into five units. The first unit presents the different protocols and standards for developing a real-time wireless communication security. The second unit presents different widely accepted networks, which are the core of wireless communication security. Unit three presents the various device and network controlling methodologies. Unit four presents the various high performance and computationally efficient algorithms for efficient and scalable implementation of network protocols, and the last unit presents the leading innovations and variety of usage of wireless communication security. Valuable as a learning tool for beginners in this area as well as a daily reference for engineers and scientists working in these areas, this is a must-have for any library.

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.