Security and Privacy in Wireless and Mobile Networks

Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless ecosystem is an ideal playground for many perpetrator...

Full description

Saved in:
Bibliographic Details
Main Author: Georgios Kambourakis (Ed.) (auth)
Other Authors: Guojun Wang (Ed.) (auth), Félix Gómez Mármol (Ed.) (auth)
Format: Electronic Book Chapter
Language:English
Published: MDPI - Multidisciplinary Digital Publishing Institute 2018
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_59094
005 20210212
003 oapen
006 m o d
007 cr|mn|---annan
008 20210212s2018 xx |||||o ||| 0|eng d
020 |a 9783038427797 
020 |a 9783038427803 
040 |a oapen  |c oapen 
041 0 |a eng 
042 |a dc 
100 1 |a Georgios Kambourakis (Ed.)  |4 auth 
700 1 |a Guojun Wang (Ed.)  |4 auth 
700 1 |a Félix Gómez Mármol (Ed.)  |4 auth 
245 1 0 |a Security and Privacy in Wireless and Mobile Networks 
260 |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2018 
300 |a 1 electronic resource (VIII, 164 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Currently, at the dawn of 5G networks, and the era of the Internet-of-Things, wireless and mobile networking is becoming increasingly ubiquitous. In this landscape, security and privacy turn into decisive factors. That is, the mobile and wireless ecosystem is an ideal playground for many perpetrators: (a) handheld devices are used for critical tasks, such as e-commerce, bank transactions, payments, application purchases, as well as social interaction; (b) such devices uniquely identify their users and store sensitive and detailed information about them; and (c) despite all their sophistication, native security mechanisms of mobile operating systems can be bypassed, and several wireless interfaces and protocols have been proven to be vulnerable to attack. As the attacker is given so many alternative entry points for penetration, the creation of assaults against the end-user and the underlying systems and services have been augmented, both in amount, as well as in matters of complexity. It is, therefore, imperative that new and advanced security and privacy-preserving measures are deployed. To cope with the aforementioned challenges, this edited book has been dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. Particularly, apart from network and link layer security, the focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps. This edited book presents a collection of nine chapters. All the chapters constitute original research work addressing a variety of topics pertaining to the above-mentioned challenges. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by-nc-nd/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by-nc-nd/4.0/ 
546 |a English 
653 |a intrusion 
653 |a defense 
653 |a attack 
653 |a mobile 
653 |a privacy 
653 |a wireless 
653 |a anonymity 
653 |a threat 
653 |a vulnerability 
653 |a Security 
653 |a IoT 
856 4 0 |a www.oapen.org  |u http://www.mdpi.com/books/pdfview/book/578  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/59094  |7 0  |z DOAB: description of the publication