Vehicular Social Networks


Book Description

The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.




Secure and Privacy-Preserving Data Communication in Internet of Things


Book Description

This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader’s horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.




Vehicular Social Networks


Book Description

The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.




Security and Privacy Preserving for IoT and 5G Networks


Book Description

This book presents state-of-the-art research on security and privacy- preserving for IoT and 5G networks and applications. The accepted book chapters covered many themes, including traceability and tamper detection in IoT enabled waste management networks, secure Healthcare IoT Systems, data transfer accomplished by trustworthy nodes in cognitive radio, DDoS Attack Detection in Vehicular Ad-hoc Network (VANET) for 5G Networks, Mobile Edge-Cloud Computing, biometric authentication systems for IoT applications, and many other applications It aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this particular area or those interested in grasping its diverse facets and exploring the latest advances on security and privacy- preserving for IoT and 5G networks.




Vehicular Ad Hoc Network Security and Privacy


Book Description

This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique Richly illustrated with detailed designs and results for all approaches used Introduces standardization and industry activities, and government regulation in secure vehicular networking







Security and Privacy in Internet of Things (IoTs)


Book Description

The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledg




Research Anthology on Securing Mobile Technologies and Applications


Book Description

Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including gaming and e-commerce and to access confidential information including banking accounts and medical records. While mobile devices are being so widely used and accepted in daily life, and subsequently housing more and more personal data, it is evident that the security of these devices is paramount. As mobile applications now create easy access to personal information, they can incorporate location tracking services, and data collection can happen discreetly behind the scenes. Hence, there needs to be more security and privacy measures enacted to ensure that mobile technologies can be used safely. Advancements in trust and privacy, defensive strategies, and steps for securing the device are important foci as mobile technologies are highly popular and rapidly developing. The Research Anthology on Securing Mobile Technologies and Applications discusses the strategies, methods, and technologies being employed for security amongst mobile devices and applications. This comprehensive book explores the security support that needs to be required on mobile devices to avoid application damage, hacking, security breaches and attacks, or unauthorized accesses to personal data. The chapters cover the latest technologies that are being used such as cryptography, verification systems, security policies and contracts, and general network security procedures along with a look into cybercrime and forensics. This book is essential for software engineers, app developers, computer scientists, security and IT professionals, practitioners, stakeholders, researchers, academicians, and students interested in how mobile technologies and applications are implementing security protocols and tactics amongst devices.







Privacy Preservation and Secured Data Storage in Cloud Computing


Book Description

As cloud services become increasingly popular, safeguarding sensitive data has become paramount. Privacy Preservation and Secured Data Storage in Cloud Computing is a comprehensive book that addresses the critical concerns surrounding privacy and security in the realm of cloud computing. Beginning with an introduction to cloud computing and its underlying technologies, the book explores various models of cloud service delivery. It then delves into the challenges and risks associated with storing and processing data in the cloud, including data breaches, insider threats, and third-party access. The book thoroughly examines techniques and tools to enhance privacy and security in the cloud, covering encryption, access control, data anonymization, and other measures to mitigate risks. Additionally, it explores emerging trends and opportunities in cloud security, such as blockchain-based solutions, homomorphic encryption, and other cutting-edge technologies poised to transform data privacy and security. This invaluable resource offers practical advice and in-depth analysis for cloud service providers, IT professionals, researchers, and students seeking to understand best practices for securing data in the cloud.