Cargando…

Performance and Security for the Internet of Things : Emerging Wireless Technologies /

"A hands-on guide and mathematical approach to tackling security challenges and overall performance issues in 5G-based IoT communications. The Internet of Things (IoT) provides connectivity and data exchange anytime and anywhere among a wide variety of physical objects such as sensors, vehicles...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Shajaiah, Haya (Autor), Abdelhadi, Ahmed (Autor), Clancy, Charles (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, N.Y. : McGraw-Hill Education, [2021]
Edición:First edition.
Colección:McGraw-Hill's AccessEngineering.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Dedication
  • About the Authors
  • Contents
  • Acknowledgments
  • Acronyms
  • 1 Introduction
  • 1.1 Motivation and Background
  • 1.2 Security and Performance Challenges in IoT Communications
  • 1.3 Previous Studies in Performance and Security of IoT Communications
  • 1.4 Overview
  • 1.5 Book Organization
  • 2 Secure IoT Spectrum Sharing System Leveraging Secure Spectrum Auctions
  • 2.1 Introduction
  • 2.2 System Model
  • 2.3 Design Considerations
  • 2.4 MTSSA: Secure Spectrum Auction Design
  • 2.5 Numerical Results and Analysis
  • 2.6 Conclusion
  • 3 Robust Joint Carrier Aggregation for IoT Spectrum Sharing Systems
  • 3.1 Introduction
  • 3.2 Problem Formulation
  • 3.3 The Global Optimal Solution
  • 3.4 The Dual Problem
  • 3.5 Distributed Optimization Algorithm
  • 3.6 Convergence Analysis
  • 3.7 Numerical Results
  • 3.8 Conclusion
  • 4 Optimal Bidding Strategy for Secure Spectrum Auctions
  • 4.1 Introduction
  • 4.2 System Model
  • 4.3 Spectrum Sharing through Secure and Truthful Spectrum Auction
  • 4.4 Numerical Results
  • 4.5 Conclusion and Future Work
  • 5 Secure Smart Grids Communications Using Homomorphic Encryption
  • 5.1 Introduction
  • 5.2 System Model and Design Assumptions
  • 5.3 Design Considerations
  • 5.4 Secure Power Scheduling Auction Mechanism
  • 5.5 Numerical Results
  • 5.6 Conclusion
  • 6 Performance Trade-Offs in IoT Uplink Networks under Secrecy Constraints
  • 6.1 Introduction
  • 6.2 IoT Network Model
  • 6.3 Latency-Centric IoT Uplink Framework
  • 6.4 Secrecy in IoT: Attack Models
  • 6.5 Numerical Results
  • 6.6 Conclusion
  • 7 Securing Machine-to-Machine Uplink Communications
  • 7.1 Introduction
  • 7.2 System Model
  • 7.3 Anomaly Detection Metrics
  • 7.4 Anomaly Detection and Classification
  • 7.5 Numerical Results
  • 7.6 Conclusion
  • 8 Conclusion and Future Work
  • A MATLAB Code for IoT Spectrum Sharing
  • B MATLAB Code for IoT Smart Grid
  • References
  • Index.