Space-Air-Ground Integrated Network Security


Book Description

This book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs). SAGIN are expected to play an increasingly important role in providing real-time, flexible, and integrated communication and data transmission services in an efficient manner. Today, SAGINs have been widely developed for a range of applications in navigation, environmental monitoring, traffic management, counter-terrorism, etc. However, security becomes a major concern, since the satellites, spacecrafts, and aircrafts are susceptible to a variety of traditional/specific network-based attacks, including eavesdropping, session hijacking, and illegal access. In this book, we review the theoretical foundations of SAGIN security. We also address a range of related security threats and provide cutting-edge solutions in the aspect of ground network security, airborne network security, space network security, and provide future trends in SAGIN security. The book goes from an introduction to the topic’s background, to a description of the basic theory, and then to cutting-edge technologies, making it suitable for readers at all levels including professional researchers and beginners. To gain the most from the book, readers should have taken prior courses in information theory, cryptography, network security, etc.




Mobile Multimedia Communications


Book Description

This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Mobile Multimedia Communications, Mobimedia 2021, held in July 2021. Due to COVID-19 pandemic the conference was held virtually. The 66 revised full papers presented were carefully selected from 166 submissions. The papers are organized in topical sections as follows: Internet of Things and Wireless Communications Communication; Strategy Optimization and Task Scheduling Oral Presentations; Privacy Computing Technology; Cyberspace Security and Access control; Neural Networks and Feature Learning Task Classification and Prediction; Object Recognition and Detection.




5G Wireless Network Security and Privacy


Book Description

5G WIRELESS NETWORK An expert presentation of 5G security, privacy, and network performance In 5G Wireless Network Security and Privacy, a team of veteran engineers delivers a robust and accessible discussion of 5G security solutions, including physical layer security, authentication, and mobility management. In the book, the authors expertly cover the requirements of 5G wireless network security and privacy, with explorations of existing solutions and vulnerabilities from security architecture and mechanism perspectives. Readers will learn how to enhance the security and network performance of 5G wireless networks in contexts like vehicle‐to‐vehicle and vehicle‐to‐infrastructure communications, industrial automation, health services, smart cities, and smart homes. They will develop a comprehensive understanding of 5G wireless network security as they move through the book’s 11 insightful chapters, developing in‐depth knowledge on the current state of 5G security and coming developments in the field. Readers will also find: A thorough introduction to legacy cellular network security, including network performance development from 1G to 4G In‐depth treatments of 5G network security, including the motivation and objectives of 5G wireless network security Comprehensive explorations of wireless security solutions, including cryptographic approaches and physical layer security Fulsome discussions of the security architecture of cellular networks, including 3G and 4G security Perfect for researchers and professionals working in the field of cybersecurity and 5G wireless networks, 5G Wireless Network Security and Privacy will also earn a place in the libraries of engineers, computer scientists, and graduate students studying 5G network security and privacy.




Communications, Signal Processing, and Systems


Book Description

This book brings together papers presented at the 2020 International Conference on Communications, Signal Processing, and Systems, which provides a venue to disseminate the latest developments and to discuss the interactions and links between these multidisciplinary fields. Spanning topics ranging from communications, signal processing and systems, this book is aimed at undergraduate and graduate students in Electrical Engineering, Computer Science and Mathematics, researchers and engineers from academia and industry as well as government employees (such as NSF, DOD and DOE).




Integration of MTC and Satellites for IoT toward 6G Era


Book Description

Comprehensive and authoritative resource paving the way for the integration of machine-type communications (MTC) and satellite connectivity toward 6G era This book focuses on the integration of machine-type communications (MTC) and satellite connectivity toward the 6th generation of mobile systems (i.e., the “6G”). Integrating these two technologies, especially within the emerging direct-to-satellite (DtS) concept employing direct connectivity between an MTC terminal and a satellite-based gateway, will be critical in enabling the future Internet of Things (IoT) applications in remote areas with limited connectivity infrastructure available. To this end, the book delivers an in-depth analysis of the drivers, use cases, scenarios, technical aspects, cybersecurity, and mechanisms spanning from the physical layer (PHY) to the application layer, regulation, standardization, and potential business models. In addition, many examples, illustrative figures, and tables support the text. With each chapter written by renowned experts in the field, Integration of MTC and Satellites for IoT toward 6G era contains information on: How to enable wireless connectivity for MTC/IoT devices in remote areas, which hardware and network architectures can be employed, and their pros and cons Fundamental and practical challenges, design dimensions, and perspective technologies for integrated MTC and satellite systems Applications and business areas that would be the first ones to employ DtS and status of standardization and regulation activities in the field The strong tutorial element makes the Integration of MTC and Satellites for IoT toward 6G era a convenient learning resource for students and educators in higher education institutions. Moreover, it is ideal for students obtaining their first professional degree and experts who operate in this or adjacent fields and want to revise and update their knowledge.




Physical-Layer Security for 6G


Book Description

Meet the wireless security challenges of the future with this key volume The 6th generation of wireless communication technology—known as 6G—promises to bring both revolutionary advances and unique challenges. Secure communications will be harder than ever to achieve under the new integrated ground, air, and space networking paradigm, with increased connectivity creating the potential for increased vulnerability. Physical-layer security, which draws upon the physical properties of the channel or network to secure information, has emerged as a promising solution to these challenges. Physical-Layer Security for 6G provides a working introduction to these technologies and their burgeoning wireless applications. With particular attention to heterogeneous and distributed network scenarios, this book offers both the information-theory fundamentals and the most recent developments in physical-layer security. It constitutes an essential resource for meeting the unique security challenges of 6G. Physical-Layer Security for 6G readers will also find: Analysis of physical-layer security in the quality of security framework (QoSec) Detailed discussion of physical-layer security applications in visible light communication (VLC), intelligence reflecting surface (IRS), and more Practical use cases and demonstrations Physical-Layer Security for 6G is ideal for wireless research engineers as well as advanced graduate students in wireless technology.




Proceedings of the International Conference on Advanced Computing Technology (ICACT’23)


Book Description

The International Conference on Advanced Computing Technology(ICACT 2023) has been organised by Department of Computer Science and Engineering, Velammal College of Engineering and Technology, Madurai. The thrust of this conference is to exchange and share the experiences and research results on all aspects of the design, development, testing, implementation of intelligent systems. It also provides a premier interdisciplinary platform for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of computational intelligence and its applications.




Wireless Communication in Cyber Security


Book Description

WIRELESS COMMUNICATION in CYBERSECURITY Presenting the concepts and advances of wireless communication in cybersecurity, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, and other industry professionals. Rapid advancement in wireless communications and related technologies has led to the use of newer technologies like 6G, Internet of Things (IoT), Radar, and others. Not only are the technologies expanding, but the impact of wireless communication is also changing, becoming an inevitable part of daily life. With increased use comes great responsibilities and challenges for any newer technology. The growing risks in the direction of security, authentication, and encryption are some major areas of concern, together with user privacy and security. We have seen significant development in blockchain technology along with development in a wireless network that has proved extremely useful in solving various security issues. Quite efficient secure cyber-physical systems can be constructed using these technologies. This comprehensive new volume covers the many methods and technologies used in intrusion detection in wireless networks. This book allows readers to reach their solutions using various predictive algorithm-based approaches and some curated real-time protective examples that are defined herein. Artificial intelligence (AI) concepts are devised and proposed for helping readers understand the core concepts of efficiencies of threats, and the parallel solutions are covered. The chapters also state the challenges in privacy and security levels for various algorithms and various techniques and tools are proposed for each challenge. It focuses on providing exposure to readers about data security and privacy for wider domains. The editorial and author team aims to address all possible solutions to the various problems faced in the newer techniques of wireless communications, improving the accuracies and reliability over the possible vulnerabilities and security threats to wireless communications. It is a must have for any engineer, scientist, or other industry professional working in this area.







Development of 6G Networks and Technology


Book Description

This book provides an in-depth exploration of the potential impact of 6G networks on various industries, including healthcare, agriculture, transport, and national security, making it an essential resource for researchers, scholars, and students working in the field of wireless networks and high-speed data processing systems. Development of 6G Networks and Technology explores the benefits and challenges of 5G and beyond that play a key role in the development of the next generation of internet. 6G is targeted to improve download speeds, eliminate latency, reduce congestion on mobile networks, and support advancements in technology. 6G has the potential to transform how the human, physical, and digital worlds interact with each other and the capability to support advancements in technology, such as virtual reality (VR), augmented reality (AR), the metaverse, and artificial intelligence (AI). Machine learning and deep learning modules are also an integral part of almost all automated systems where signal processing is performed at different levels. Signal processing in the form text, image, or video needs large data computational operations at the desired data rate and accuracy. Large data requires more use of IC area with embedded bulk memories that lead to power consumption. Trade-offs between power consumption, delay, and IC area are always a concern of designers and researchers. Energy-efficient, high-speed data processing is required in major areas like biomedicine and healthcare, agriculture, transport, climate change, and national security and defense. This book will provide a foundation and initial inputs for researchers, scholars, and students working in the areas of wireless networks and high-speed data processing systems. It also provides techniques, tools, and methodologies to develop next-generation internet and 6G.