Security and Privacy Schemes for Dense 6G Wireless Communication Networks (Security)

個数:
  • ポイントキャンペーン

Security and Privacy Schemes for Dense 6G Wireless Communication Networks (Security)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 550 p.
  • 言語 ENG
  • 商品コード 9781839536632
  • DDC分類 621.384

Full Description

Fifth generation (5G) wireless networks are now commercialized, and the research focus has shifted towards sixth generation (6G) wireless systems. The integration of sensor nodes and massive machine type communication (MTC) devices (MDs) in ubiquitous 5G networks has facilitated the design of critical enabling technologies to support billions of data-hungry applications. By leveraging sensor nodes in wireless sensor networks (WSNs), sensitive user information can be harvested and transmitted to receivers via WSN-assisted channels, which are often not well secured. Consequently, sensitive user information can be intercepted and used unlawfully. The security and confidentiality measures used for data transmission over existing 5G WSN-assisted channels are limited. 6G systems are envisaged to face fiercer security challenges. In 6G wireless networks, a new set of sensing and precise localization techniques are predicted. Thus, the need to secure user information against adversarial attacks needs to be implemented at the design stage.

The book proposes viable solutions to revamp traditional security architecture by addressing critical security challenges in commercialized 5G and envisioned 6G wireless communication systems. Expert contributors bring new insights into real-world scenarios for the deployment, applications and management of robust, secure, and efficient security schemes for massive devices in 6G wireless networks. Finally, the book discusses critical security and privacy issues affecting the wireless ecosystem and provides practical AI-based solutions.

Security and Privacy Schemes for Dense 6G Wireless Communication Networks is an essential reference for industry and academic researchers; scientists, engineers, lecturers and advanced students in the fields of cybersecurity wireless communication and networking, network security, computing, data science, AI/ML/DL, and sensing, as well as cybersecurity professionals and 6G standardization experts.

Contents

Chapter 1: Introduction to emerging security and privacy schemes for dense 6G wireless communication networks
Chapter 2: History of security and privacy in wireless communication systems: open research issues and future directions
Chapter 3: Artificial intelligence-enabled security systems for 6G wireless networks: algorithms, strategies, and applications
Chapter 4: The vision of 6G security and privacy
Chapter 5: Security threat landscape for 6G architecture
Chapter 6: Dynamic optical beam transmitter of secure visible light communication systems
Chapter 7: A new machine learning-based scheme for physical layer security
Chapter 8: Vehicular ad hoc networks employing intelligent reflective surfaces for physical layer security
Chapter 9: Physical layer security solutions and technologies
Chapter 10: Steganography-based secure communication via single carrier frequency division multiple access (SC-FDMA) transceiver
Chapter 11: A lightweight algorithm for the detection of fake incident reports in wireless communication systems
Chapter 12: A real-time intrusion detection system for service availability in cloud computing environments
Chapter 13: Addressing the security challenges of IoT-enabled networks using artificial intelligence, machine learning, and blockchain technology
Chapter 14: Alleviating 6G security and privacy issues using artificial intelligence
Chapter 15: Interference and phase noise in millimeter wave MIMO-NOMA and OFDM systems for beyond 5G networks
Chapter 16: A generative adversarial network-based approach for mitigating inference attacks in emerging wireless networks
Chapter 17: Adversarial resilience of self-normalizing convolutional neural networks for deep learning-based intrusion detection systems
Chapter 18: Legal frameworks for security schemes in wireless communication systems
Chapter 19: Design of a quantum true random number generator using quantum gates and benchmarking its performance on an IBM quantum-computer
Chapter 20: Security challenges and prospects of 6G network in cloud environments

最近チェックした商品