Information security practices for the Internet of Things, 5G, and next-generation wireless networks

"This book highlights research on secure communication of 5G, Internet of Things (IoT) and Next-Generation wireless networks, along with related areas to ensure secure and Internet-compatible IoT systems"--

Bibliographic Details
Other Authors: Sahoo, Biswa, 1982-, Yadav, Suman, 1986-
Format: eBook
Language:English
Published: Hershey, PA Information Science Reference, an imprint of IGI Global, [2022]
Series:Advances in information security, privacy, and ethics (AISPE) book series.
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 03504cam a2200529 i 4500
001 koha001013780
003 OCoLC
005 20250222070012.0
006 m d
007 cr cnu---unuuu
008 220302s2022 paua ob 001 0 eng
010 |a  2022970057 
035 |a koha001013780 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d OCLCO  |d IGIGL  |d EBLCP  |d OCLCQ  |d YDX  |d N$T 
019 |a 1302014269  |a 1302334250  |a 1334892095 
020 |a 9781668439234  |q electronic book 
020 |a 1668439239  |q electronic book 
020 |a 9781668439241  |q (electronic bk.) 
020 |a 1668439247  |q (electronic bk.) 
020 |z 9781668439210  |q hardcover 
020 |z 9781668439227  |q paperback 
042 |a pcc 
050 0 4 |a TK5105.8857  |b .I4854 2022 
082 0 0 |a 004.67/8  |2 23/eng/20220304 
049 |a MAIN 
245 0 0 |a Information security practices for the Internet of Things, 5G, and next-generation wireless networks  |c Biswa Mohan Sahoo, Suman Avdhesh Yadav. 
264 1 |a Hershey, PA  |b Information Science Reference, an imprint of IGI Global,  |c [2022] 
300 |a 1 online resource (xv, 313 pages)  |b illustrations (some color). 
490 1 |a Advances in information security, privacy, and ethics (AISPE) book series 
504 |a Includes bibliographical references and index. 
505 0 |a Chapter 1. IoT-enabled 5G networks for secure communication -- Chapter 2. 5th generation security threats and responses -- Chapter 3. Machine learning algorithms for 6G wireless networks: a survey -- Chapter 4. Security and privacy issues in the Internet of things -- Chapter 5. Role of artificial intelligence in cyber security: a useful overview -- Chapter 6. Privacy and security in wireless devices for the Internet of things -- Chapter 7. Application of blockchain technology in an IoT-integrated framework -- Chapter 8. Cryptography and blockchain solutions for security protection of Internet of things applications -- Chapter 9. Security optimization of resource-constrained internet of healthcare things (IohT) devices using lightweight cryptography -- Chapter 10. Edge computing enabled by 5G for computing offloading in the industrial Internet of things -- Chapter 11. Quantum communication is the next level of wireless networking and security -- Chapter 12. Scheduling optimization based on energy prediction using ARIMA model in WSN. 
520 |a "This book highlights research on secure communication of 5G, Internet of Things (IoT) and Next-Generation wireless networks, along with related areas to ensure secure and Internet-compatible IoT systems"--  |c Provided by publisher 
588 |a Description based on online resource; title from digital title page (viewed on August 03, 2022). 
653 0 |a Internet of things  |x Security measures. 
653 0 |a 5G mobile communication systems  |x Security measures. 
653 6 |a Internet des objets  |x Sécurité  |x Mesures. 
653 6 |a Communications mobiles 5G  |x Sécurité  |x Mesures. 
655 0 |a EBSCO eBooks  |9 905790 
655 4 |a Electronic books.  |9 899821 
700 1 |a Sahoo, Biswa,  |d 1982-  |9 912509 
700 1 |a Yadav, Suman,  |d 1986-  |9 912510 
830 0 |a Advances in information security, privacy, and ethics (AISPE) book series.  |9 911200 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/3324975.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1013780 
910 |a EBSCO eBooks 
999 |c 1013780  |d 1013780 
039