Security and Privacy in Wireless and Mobile Networks

Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless ecosystem is an ideal playground for many perpetrator...

ver descrição completa

Na minha lista:
Detalhes bibliográficos
Autor principal: Georgios Kambourakis (Ed.) (auth)
Outros Autores: Guojun Wang (Ed.) (auth), Félix Gómez Mármol (Ed.) (auth)
Formato: Recurso Electrónico Capítulo de Livro
Idioma:inglês
Publicado em: MDPI - Multidisciplinary Digital Publishing Institute 2018
Assuntos:
Acesso em linha:DOAB: download the publication
DOAB: description of the publication
Tags: Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_59094
005 20210212
003 oapen
006 m o d
007 cr|mn|---annan
008 20210212s2018 xx |||||o ||| 0|eng d
020 |a 9783038427797 
020 |a 9783038427803 
040 |a oapen  |c oapen 
041 0 |a eng 
042 |a dc 
100 1 |a Georgios Kambourakis (Ed.)  |4 auth 
700 1 |a Guojun Wang (Ed.)  |4 auth 
700 1 |a Félix Gómez Mármol (Ed.)  |4 auth 
245 1 0 |a Security and Privacy in Wireless and Mobile Networks 
260 |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2018 
300 |a 1 electronic resource (VIII, 164 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless ecosystem is an ideal playground for many perpetrators: (a) handheld devices are used for critical tasks, such as e-commerce, bank transactions, payments, application purchases, as well as social interaction; (b) such devices uniquely identify their users and store sensitive and detailed information about them; and (c) despite all their sophistication, native security mechanisms of mobile operating systems can be bypassed, and several wireless interfaces and protocols have been proven to be vulnerable to attack. As the attacker is given so many alternative entry points for penetration, the creation of assaults against the end-user and the underlying systems and services have been augmented, both in amount, as well as in matters of complexity. It is, therefore, imperative that new and advanced security and privacy-preserving measures are deployed. To cope with the aforementioned challenges, this edited book has been dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. Particularly, apart from network and link layer security, the focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps. This edited book presents a collection of nine chapters. All the chapters constitute original research work addressing a variety of topics pertaining to the above-mentioned challenges. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by-nc-nd/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by-nc-nd/4.0/ 
546 |a English 
653 |a intrusion 
653 |a defense 
653 |a attack 
653 |a mobile 
653 |a privacy 
653 |a wireless 
653 |a anonymity 
653 |a threat 
653 |a vulnerability 
653 |a Security 
653 |a IoT 
856 4 0 |a www.oapen.org  |u http://www.mdpi.com/books/pdfview/book/578  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/59094  |7 0  |z DOAB: description of the publication