Secure Communication for the 6G and the Internet of Things Networks : Advances, and Applications (Communication Networks and Smart Techniques for 5g and beyond)

個数:
  • 予約

Secure Communication for the 6G and the Internet of Things Networks : Advances, and Applications (Communication Networks and Smart Techniques for 5g and beyond)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 400 p.
  • 言語 ENG
  • 商品コード 9781032957654

Full Description

The book will serve as a comprehensive resource for readers interested in utilizing different technologies like fog computing, federated learning, cloud computing, and blockchain in 6G-enabled systems for addressing security concerns.

Discusses technologies such as fog computing, federated learning, and blockchain in 6G-enabled networks to address security threats.
Provides in-depth coverage of fundamental models, architectures, and security frameworks to readers in understanding the complex landscape of 6G and the Internet of Things security.
Covers diverse areas of security frameworks and software-defined fixes for security problems in 6G and the Internet of Things networks.
Presents protocols for authentication and key exchange in 6G and the Internet of Things networks.
Highlights the use of the Internet of Things for enhanced Biometric authentication in security.

The text is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electrical and communications engineering, telecommunications, and computer science and engineering.

Contents

1. Introduction.

2. Secure and Safe Communication in 6G and the Internet of Things Networks.

3. Protocols for Authentication and Key Exchange in 6G and the Internet of Things Networks.

4. Formal Security Study of 6G and the Internet of Things Networks Security Protocols.

5. Creating Safe Communication Environments or Systems in 6G and the Internet of Things Networks.

6. Assessment and Control of Security Risks in 6G and the Internet of Things Networks.

7. Case Studies and Applications on 6G and the Internet of Things Networks Usability.

8. Security and Reliability of 6G and the Internet of Things Networks.

9. Blockchain and 6G-enabled Internet of Things Networks.

10. 6G and the Internet of Things Networks High-quality Services.

11. Security Concerns on the Internet of Things and 6G Networks.

12. 6G and Sustainable Development Goals.

13. Securing the Internet of Things with Sustainable Development Goals.

14. Using Fog Computing in Securing 6G-enabled the Internet of Things.

15. Using Cloud Computing in securing 6G-enabled the Internet of Things.

16. Using Federated Learning for securing the Internet of Things and 6G.

17. Cyber Threat Hunting in 6G-enabled Internet of Things Devices.

18. Securing 6G-Enabled Internet of Things Devices: Smart Attack Detection System.

19. Securing 6G and the Internet of Things for the Metaverse.

20. Implementing the Internet of Things Solutions in Healthcare.

21. Utilizing the Internet of Things for Enhanced Biometric Authentication in Security.

最近チェックした商品