Performance and Security for the Internet of Things : Emerging Wireless Technologies /
"A hands-on guide and mathematical approach to tackling security challenges and overall performance issues in 5G-based IoT communications. The Internet of Things (IoT) provides connectivity and data exchange anytime and anywhere among a wide variety of physical objects such as sensors, vehicles...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, N.Y. :
McGraw-Hill Education,
[2021]
|
Edición: | First edition. |
Colección: | McGraw-Hill's AccessEngineering.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Dedication
- About the Authors
- Contents
- Acknowledgments
- Acronyms
- 1 Introduction
- 1.1 Motivation and Background
- 1.2 Security and Performance Challenges in IoT Communications
- 1.3 Previous Studies in Performance and Security of IoT Communications
- 1.4 Overview
- 1.5 Book Organization
- 2 Secure IoT Spectrum Sharing System Leveraging Secure Spectrum Auctions
- 2.1 Introduction
- 2.2 System Model
- 2.3 Design Considerations
- 2.4 MTSSA: Secure Spectrum Auction Design
- 2.5 Numerical Results and Analysis
- 2.6 Conclusion
- 3 Robust Joint Carrier Aggregation for IoT Spectrum Sharing Systems
- 3.1 Introduction
- 3.2 Problem Formulation
- 3.3 The Global Optimal Solution
- 3.4 The Dual Problem
- 3.5 Distributed Optimization Algorithm
- 3.6 Convergence Analysis
- 3.7 Numerical Results
- 3.8 Conclusion
- 4 Optimal Bidding Strategy for Secure Spectrum Auctions
- 4.1 Introduction
- 4.2 System Model
- 4.3 Spectrum Sharing through Secure and Truthful Spectrum Auction
- 4.4 Numerical Results
- 4.5 Conclusion and Future Work
- 5 Secure Smart Grids Communications Using Homomorphic Encryption
- 5.1 Introduction
- 5.2 System Model and Design Assumptions
- 5.3 Design Considerations
- 5.4 Secure Power Scheduling Auction Mechanism
- 5.5 Numerical Results
- 5.6 Conclusion
- 6 Performance Trade-Offs in IoT Uplink Networks under Secrecy Constraints
- 6.1 Introduction
- 6.2 IoT Network Model
- 6.3 Latency-Centric IoT Uplink Framework
- 6.4 Secrecy in IoT: Attack Models
- 6.5 Numerical Results
- 6.6 Conclusion
- 7 Securing Machine-to-Machine Uplink Communications
- 7.1 Introduction
- 7.2 System Model
- 7.3 Anomaly Detection Metrics
- 7.4 Anomaly Detection and Classification
- 7.5 Numerical Results
- 7.6 Conclusion
- 8 Conclusion and Future Work
- A MATLAB Code for IoT Spectrum Sharing
- B MATLAB Code for IoT Smart Grid
- References
- Index.