Security and Privacy for Modern Wireless Communication Systems

The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the follow...

Full description

Saved in:
Bibliographic Details
Other Authors: Huang, Tao (Editor), Yan, Shihao (Editor), Zhang, Guanglin (Editor), Sun, Li (Editor), Yuen, Tsz Hon (Editor), Park, YoHan (Editor), Lee, Changhoon (Editor)
Format: Electronic Book Chapter
Language:English
Published: Basel MDPI - Multidisciplinary Digital Publishing Institute 2023
Subjects:
CNN
MDA
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_112514
005 20230808
003 oapen
006 m o d
007 cr|mn|---annan
008 20230808s2023 xx |||||o ||| 0|eng d
020 |a books978-3-0365-8229-0 
020 |a 9783036582283 
020 |a 9783036582290 
040 |a oapen  |c oapen 
024 7 |a 10.3390/books978-3-0365-8229-0  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a KNTX  |2 bicssc 
072 7 |a UY  |2 bicssc 
100 1 |a Huang, Tao  |4 edt 
700 1 |a Yan, Shihao  |4 edt 
700 1 |a Zhang, Guanglin  |4 edt 
700 1 |a Sun, Li  |4 edt 
700 1 |a Yuen, Tsz Hon  |4 edt 
700 1 |a Park, YoHan  |4 edt 
700 1 |a Lee, Changhoon  |4 edt 
700 1 |a Huang, Tao  |4 oth 
700 1 |a Yan, Shihao  |4 oth 
700 1 |a Zhang, Guanglin  |4 oth 
700 1 |a Sun, Li  |4 oth 
700 1 |a Yuen, Tsz Hon  |4 oth 
700 1 |a Park, YoHan  |4 oth 
700 1 |a Lee, Changhoon  |4 oth 
245 1 0 |a Security and Privacy for Modern Wireless Communication Systems 
260 |a Basel  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2023 
300 |a 1 electronic resource (308 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power-constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node-edge-cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Information technology industries  |2 bicssc 
650 7 |a Computer science  |2 bicssc 
653 |a propagation trends 
653 |a social networks 
653 |a group features 
653 |a dilated CNN 
653 |a machine learning 
653 |a physical layer security 
653 |a Rice channels 
653 |a wireless communications 
653 |a 6G security 
653 |a sycon 
653 |a cube attack 
653 |a state recovery 
653 |a wireless body area networks 
653 |a authentication 
653 |a biometric 
653 |a physical unclonable function 
653 |a BAN logic 
653 |a RoR model 
653 |a AVISPA 
653 |a 6G wireless communications 
653 |a chi-square 
653 |a cybersecurity 
653 |a intrusion detection system 
653 |a machine learning techniques 
653 |a meta-model 
653 |a stacking ensemble learning 
653 |a voting techniques 
653 |a fault attack 
653 |a error detection 
653 |a code abiding 
653 |a overcost 
653 |a bitslice cipher 
653 |a multiple eavesdroppers 
653 |a full-duplex 
653 |a underground mine 
653 |a amplify-and-forward relay 
653 |a communication system security 
653 |a physical layer 
653 |a wireless communication 
653 |a precoding 
653 |a wire-tap channel 
653 |a blockchain 
653 |a wireless communication network 
653 |a malicious node 
653 |a security protocol 
653 |a intrusion detection 
653 |a in-vehicle communication 
653 |a inter-vehicle communication 
653 |a optical communication 
653 |a security wireless 
653 |a visible light communication 
653 |a wireless optical communication 
653 |a convolutional neural network 
653 |a CNN 
653 |a counterfeit detection 
653 |a device fingerprinting 
653 |a distinct native attribute (DNA) 
653 |a information and communications technology 
653 |a multiple discriminant analysis 
653 |a MDA 
653 |a WirelessHART 
653 |a wireless communications security 
653 |a digital twin 
653 |a Internet of Things 
653 |a healthcare 
653 |a encryption 
653 |a privacy 
653 |a rural 
653 |a LPWAN 
653 |a secure localization 
653 |a positioning 
653 |a distance vector hop 
653 |a DV-Hop 
653 |a security attacks 
653 |a wireless sensor network 
653 |a security 
653 |a steganalysis 
653 |a covert channel 
653 |a steganography 
653 |a undetectability 
653 |a aggregator-based grouping 
653 |a wireless sensor networks 
653 |a encryption and decryption operations 
856 4 0 |a www.oapen.org  |u https://mdpi.com/books/pdfview/book/7633  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/112514  |7 0  |z DOAB: description of the publication