|
|
|
|
LEADER |
00000nam a2200000 i 4500 |
001 |
MGH_AEACE20121405 |
003 |
IN-ChSCO |
005 |
20210416124538.0 |
006 |
m||||||||||||||||| |
007 |
cr |n||||||||n |
008 |
210416s2021||||nyu|||||o|||||||||||eng|| |
010 |
|
|
|z 2020943208
|
020 |
|
|
|a 9781260460360 (e-ISBN)
|
020 |
|
|
|a 1260460363 (e-ISBN)
|
020 |
|
|
|a 9781260460353 (print-ISBN)
|
020 |
|
|
|a 1260460355 (print-ISBN)
|
035 |
|
|
|a (OCoLC)1229080917
|
040 |
|
|
|a IN-ChSCO
|b eng
|e rda
|
041 |
0 |
|
|a eng
|
050 |
|
4 |
|a TK5103.4885
|
072 |
|
7 |
|a TEC
|x 007000
|2 bisacsh
|
082 |
0 |
4 |
|a 384.3
|2 23
|
100 |
1 |
|
|a Shajaiah, Haya,
|e author.
|
245 |
1 |
0 |
|a Performance and Security for the Internet of Things :
|b Emerging Wireless Technologies /
|c Haya Shajaiah, Ahmed Abdelhadi, Charles Clancy.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a New York, N.Y. :
|b McGraw-Hill Education,
|c [2021]
|
264 |
|
4 |
|c ?2021
|
300 |
|
|
|a 1 online resource (204 pages) :
|b 150 illustrations.
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
490 |
1 |
|
|a McGraw-Hill's AccessEngineering
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cover --
|t Title Page --
|t Copyright Page --
|t Dedication --
|t About the Authors --
|t Contents --
|t Acknowledgments --
|t Acronyms --
|t 1 Introduction --
|t 1.1 Motivation and Background --
|t 1.2 Security and Performance Challenges in IoT Communications --
|t 1.3 Previous Studies in Performance and Security of IoT Communications --
|t 1.4 Overview --
|t 1.5 Book Organization --
|t 2 Secure IoT Spectrum Sharing System Leveraging Secure Spectrum Auctions --
|t 2.1 Introduction --
|t 2.2 System Model --
|t 2.3 Design Considerations --
|t 2.4 MTSSA: Secure Spectrum Auction Design --
|t 2.5 Numerical Results and Analysis --
|t 2.6 Conclusion --
|t 3 Robust Joint Carrier Aggregation for IoT Spectrum Sharing Systems --
|t 3.1 Introduction --
|t 3.2 Problem Formulation --
|t 3.3 The Global Optimal Solution --
|t 3.4 The Dual Problem --
|t 3.5 Distributed Optimization Algorithm --
|t 3.6 Convergence Analysis --
|t 3.7 Numerical Results --
|t 3.8 Conclusion --
|t 4 Optimal Bidding Strategy for Secure Spectrum Auctions --
|t 4.1 Introduction --
|t 4.2 System Model --
|t 4.3 Spectrum Sharing through Secure and Truthful Spectrum Auction --
|t 4.4 Numerical Results --
|t 4.5 Conclusion and Future Work --
|t 5 Secure Smart Grids Communications Using Homomorphic Encryption --
|t 5.1 Introduction --
|t 5.2 System Model and Design Assumptions --
|t 5.3 Design Considerations --
|t 5.4 Secure Power Scheduling Auction Mechanism --
|t 5.5 Numerical Results --
|t 5.6 Conclusion --
|t 6 Performance Trade-Offs in IoT Uplink Networks under Secrecy Constraints --
|t 6.1 Introduction --
|t 6.2 IoT Network Model --
|t 6.3 Latency-Centric IoT Uplink Framework --
|t 6.4 Secrecy in IoT: Attack Models --
|t 6.5 Numerical Results --
|t 6.6 Conclusion --
|t 7 Securing Machine-to-Machine Uplink Communications --
|t 7.1 Introduction --
|t 7.2 System Model --
|t 7.3 Anomaly Detection Metrics --
|t 7.4 Anomaly Detection and Classification --
|t 7.5 Numerical Results --
|t 7.6 Conclusion --
|t 8 Conclusion and Future Work --
|t A MATLAB Code for IoT Spectrum Sharing --
|t B MATLAB Code for IoT Smart Grid --
|t References --
|t Index.
|
520 |
0 |
|
|a "A hands-on guide and mathematical approach to tackling security challenges and overall performance issues in 5G-based IoT communications. The Internet of Things (IoT) provides connectivity and data exchange anytime and anywhere among a wide variety of physical objects such as sensors, vehicles, and mobile phones. This book is a concise guide to securing wireless IoT systems at the communications level, covering wireless spectrum sharing systems, smart grid communications, machine-to-machine communications, and uplink/downlink communications for IoT applications. The methods, optimization problems, mathematical solutions, algorithms, and programming codes in the book can be applied directly or extended as countermeasures for different IoT vulnerabilities."--Publisher's description.
|
530 |
|
|
|a Also available in print edition.
|
533 |
|
|
|a Electronic reproduction.
|b New York, N.Y. :
|c McGraw Hill,
|d 2021.
|n Mode of access: World Wide Web.
|n System requirements: Web browser.
|n Access may be restricted to users at subscribing institutions.
|
538 |
|
|
|a Mode of access: Internet via World Wide Web.
|
546 |
|
|
|a In English.
|
588 |
|
|
|a Description based on e-Publication PDF.
|
650 |
|
0 |
|a Wireless Internet.
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING / Electrical
|2 bisacsh.
|
655 |
|
0 |
|a Electronic books.
|
700 |
1 |
|
|a Abdelhadi, Ahmed,
|e author.
|
700 |
1 |
|
|a Clancy, Charles,
|e author.
|
776 |
0 |
|
|i Print version:
|t Performance and Security for the Internet of Things : Emerging Wireless Technologies.
|b First edition.
|d New York, N.Y. : McGraw-Hill Education, 2021
|w (OCoLC)1138598340
|
830 |
|
0 |
|a McGraw-Hill's AccessEngineering.
|
856 |
4 |
0 |
|u https://accessengineeringlibrary.uam.elogim.com/content/book/9781260460353
|z Texto completo
|