Security and privacy schemes for dense 6G wireless communication networks:
Fifth generation (5G) wireless networks are now commercialized, and the research focus has shifted towards sixth generation (6G) wireless systems. The integration of sensor nodes and massive machine type communication (MTC) devices (MDs) in ubiquitous 5G networks has facilitated the design of critic...
Gespeichert in:
Weitere Verfasser: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Stevenage
The Institution of Engineering and Technology
2023
|
Schriftenreihe: | IET security series
21 |
Online-Zugang: | TUM01 UBY01 Volltext |
Zusammenfassung: | Fifth generation (5G) wireless networks are now commercialized, and the research focus has shifted towards sixth generation (6G) wireless systems. The integration of sensor nodes and massive machine type communication (MTC) devices (MDs) in ubiquitous 5G networks has facilitated the design of critical enabling technologies to support billions of data-hungry applications. By leveraging sensor nodes in wireless sensor networks (WSNs), sensitive user information can be harvested and transmitted to receivers via WSN-assisted channels, which are often not well secured. Consequently, sensitive user information can be intercepted and used unlawfully. The security and confidentiality measures used for data transmission over existing 5G WSN-assisted channels are limited. 6G systems are envisaged to face fiercer security challenges. In 6G wireless networks, a new set of sensing and precise localization techniques are predicted. Thus, the need to secure user information against adversarial attacks needs to be implemented at the design stage. The book proposes viable solutions to revamp traditional security architecture by addressing critical security challenges in commercialized 5G and envisioned 6G wireless communication systems. Expert contributors bring new insights into real-world scenarios for the deployment, applications and management of robust, secure, and efficient security schemes for massive devices in 6G wireless networks. Finally, the book discusses critical security and privacy issues affecting the wireless ecosystem and provides practical AI-based solutions. "Security and Privacy Schemes for Dense 6G Wireless Communication Networks" is an essential reference for industry and academic researchers; scientists, engineers, lecturers and advanced students in the fields of cybersecurity wireless communication and networking, network security, computing, data science, AI/ML/DL, and sensing, as well as cybersecurity professionals and 6G standardization exper |
Beschreibung: | 1 Online-Ressource (xxxiv, 514 Seiten) |
ISBN: | 9781839536649 |
DOI: | 10.1049/PBSE021E |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV049297119 | ||
003 | DE-604 | ||
005 | 20240207 | ||
007 | cr|uuu---uuuuu | ||
008 | 230824s2023 |||| o||u| ||||||eng d | ||
020 | |a 9781839536649 |9 978-1-83953-664-9 | ||
024 | 7 | |a 10.1049/PBSE021E |2 doi | |
035 | |a (ZDB-100-IET)PBSE021E | ||
035 | |a (OCoLC)1401197019 | ||
035 | |a (DE-599)BVBBV049297119 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-706 | ||
245 | 1 | 0 | |a Security and privacy schemes for dense 6G wireless communication networks |c edited by Agbotiname Lucky Imoize, Chandrashekhar Meshram, Dinh-Thuan Do, Seifedine Kadry and Lakshmanan Muthukaruppan |
264 | 1 | |a Stevenage |b The Institution of Engineering and Technology |c 2023 | |
300 | |a 1 Online-Ressource (xxxiv, 514 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IET security series |v 21 | |
520 | |a Fifth generation (5G) wireless networks are now commercialized, and the research focus has shifted towards sixth generation (6G) wireless systems. The integration of sensor nodes and massive machine type communication (MTC) devices (MDs) in ubiquitous 5G networks has facilitated the design of critical enabling technologies to support billions of data-hungry applications. By leveraging sensor nodes in wireless sensor networks (WSNs), sensitive user information can be harvested and transmitted to receivers via WSN-assisted channels, which are often not well secured. Consequently, sensitive user information can be intercepted and used unlawfully. The security and confidentiality measures used for data transmission over existing 5G WSN-assisted channels are limited. 6G systems are envisaged to face fiercer security challenges. In 6G wireless networks, a new set of sensing and precise localization techniques are predicted. Thus, the need to secure user information against adversarial attacks needs to be implemented at the design stage. The book proposes viable solutions to revamp traditional security architecture by addressing critical security challenges in commercialized 5G and envisioned 6G wireless communication systems. Expert contributors bring new insights into real-world scenarios for the deployment, applications and management of robust, secure, and efficient security schemes for massive devices in 6G wireless networks. Finally, the book discusses critical security and privacy issues affecting the wireless ecosystem and provides practical AI-based solutions. "Security and Privacy Schemes for Dense 6G Wireless Communication Networks" is an essential reference for industry and academic researchers; scientists, engineers, lecturers and advanced students in the fields of cybersecurity wireless communication and networking, network security, computing, data science, AI/ML/DL, and sensing, as well as cybersecurity professionals and 6G standardization exper | ||
700 | 1 | |a Imoize, Agbotiname Lucky |0 (DE-588)1240342586 |4 edt | |
700 | 1 | |a Meshram, Chandrashekhar |0 (DE-588)1264955820 |4 edt | |
700 | 1 | |a Do, Dinh-Thuan |d 1980- |0 (DE-588)1304396150 |4 edt | |
700 | 1 | |a Kadry, Seifedine |d 1977- |0 (DE-588)118610144X |4 edt | |
700 | 1 | |a Muthukaruppan, Lakshmanan |0 (DE-588)1304400883 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781839536632 |
856 | 4 | 0 | |u https://doi.org/10.1049/PBSE021E |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-100-IET | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034558428 | ||
966 | e | |u https://doi.org/10.1049/PBSE021E |l TUM01 |p ZDB-100-IET |q TUM_Paketkauf_2023 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1049/PBSE021E |l UBY01 |p ZDB-100-IET |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804185790348001280 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Imoize, Agbotiname Lucky Meshram, Chandrashekhar Do, Dinh-Thuan 1980- Kadry, Seifedine 1977- Muthukaruppan, Lakshmanan |
author2_role | edt edt edt edt edt |
author2_variant | a l i al ali c m cm d t d dtd s k sk l m lm |
author_GND | (DE-588)1240342586 (DE-588)1264955820 (DE-588)1304396150 (DE-588)118610144X (DE-588)1304400883 |
author_facet | Imoize, Agbotiname Lucky Meshram, Chandrashekhar Do, Dinh-Thuan 1980- Kadry, Seifedine 1977- Muthukaruppan, Lakshmanan |
building | Verbundindex |
bvnumber | BV049297119 |
collection | ZDB-100-IET |
ctrlnum | (ZDB-100-IET)PBSE021E (OCoLC)1401197019 (DE-599)BVBBV049297119 |
doi_str_mv | 10.1049/PBSE021E |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03703nmm a2200409zcb4500</leader><controlfield tag="001">BV049297119</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240207 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230824s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781839536649</subfield><subfield code="9">978-1-83953-664-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1049/PBSE021E</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-100-IET)PBSE021E</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1401197019</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049297119</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security and privacy schemes for dense 6G wireless communication networks</subfield><subfield code="c">edited by Agbotiname Lucky Imoize, Chandrashekhar Meshram, Dinh-Thuan Do, Seifedine Kadry and Lakshmanan Muthukaruppan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Stevenage</subfield><subfield code="b">The Institution of Engineering and Technology</subfield><subfield code="c">2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxiv, 514 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IET security series</subfield><subfield code="v">21</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Fifth generation (5G) wireless networks are now commercialized, and the research focus has shifted towards sixth generation (6G) wireless systems. The integration of sensor nodes and massive machine type communication (MTC) devices (MDs) in ubiquitous 5G networks has facilitated the design of critical enabling technologies to support billions of data-hungry applications. By leveraging sensor nodes in wireless sensor networks (WSNs), sensitive user information can be harvested and transmitted to receivers via WSN-assisted channels, which are often not well secured. Consequently, sensitive user information can be intercepted and used unlawfully. The security and confidentiality measures used for data transmission over existing 5G WSN-assisted channels are limited. 6G systems are envisaged to face fiercer security challenges. In 6G wireless networks, a new set of sensing and precise localization techniques are predicted. Thus, the need to secure user information against adversarial attacks needs to be implemented at the design stage. The book proposes viable solutions to revamp traditional security architecture by addressing critical security challenges in commercialized 5G and envisioned 6G wireless communication systems. Expert contributors bring new insights into real-world scenarios for the deployment, applications and management of robust, secure, and efficient security schemes for massive devices in 6G wireless networks. Finally, the book discusses critical security and privacy issues affecting the wireless ecosystem and provides practical AI-based solutions. "Security and Privacy Schemes for Dense 6G Wireless Communication Networks" is an essential reference for industry and academic researchers; scientists, engineers, lecturers and advanced students in the fields of cybersecurity wireless communication and networking, network security, computing, data science, AI/ML/DL, and sensing, as well as cybersecurity professionals and 6G standardization exper</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Imoize, Agbotiname Lucky</subfield><subfield code="0">(DE-588)1240342586</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meshram, Chandrashekhar</subfield><subfield code="0">(DE-588)1264955820</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Do, Dinh-Thuan</subfield><subfield code="d">1980-</subfield><subfield code="0">(DE-588)1304396150</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kadry, Seifedine</subfield><subfield code="d">1977-</subfield><subfield code="0">(DE-588)118610144X</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Muthukaruppan, Lakshmanan</subfield><subfield code="0">(DE-588)1304400883</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781839536632</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1049/PBSE021E</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-100-IET</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034558428</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBSE021E</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="q">TUM_Paketkauf_2023</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1049/PBSE021E</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-100-IET</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049297119 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:38:18Z |
indexdate | 2024-07-10T10:00:50Z |
institution | BVB |
isbn | 9781839536649 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034558428 |
oclc_num | 1401197019 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-706 |
owner_facet | DE-91 DE-BY-TUM DE-706 |
physical | 1 Online-Ressource (xxxiv, 514 Seiten) |
psigel | ZDB-100-IET ZDB-100-IET TUM_Paketkauf_2023 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | The Institution of Engineering and Technology |
record_format | marc |
series2 | IET security series |
spelling | Security and privacy schemes for dense 6G wireless communication networks edited by Agbotiname Lucky Imoize, Chandrashekhar Meshram, Dinh-Thuan Do, Seifedine Kadry and Lakshmanan Muthukaruppan Stevenage The Institution of Engineering and Technology 2023 1 Online-Ressource (xxxiv, 514 Seiten) txt rdacontent c rdamedia cr rdacarrier IET security series 21 Fifth generation (5G) wireless networks are now commercialized, and the research focus has shifted towards sixth generation (6G) wireless systems. The integration of sensor nodes and massive machine type communication (MTC) devices (MDs) in ubiquitous 5G networks has facilitated the design of critical enabling technologies to support billions of data-hungry applications. By leveraging sensor nodes in wireless sensor networks (WSNs), sensitive user information can be harvested and transmitted to receivers via WSN-assisted channels, which are often not well secured. Consequently, sensitive user information can be intercepted and used unlawfully. The security and confidentiality measures used for data transmission over existing 5G WSN-assisted channels are limited. 6G systems are envisaged to face fiercer security challenges. In 6G wireless networks, a new set of sensing and precise localization techniques are predicted. Thus, the need to secure user information against adversarial attacks needs to be implemented at the design stage. The book proposes viable solutions to revamp traditional security architecture by addressing critical security challenges in commercialized 5G and envisioned 6G wireless communication systems. Expert contributors bring new insights into real-world scenarios for the deployment, applications and management of robust, secure, and efficient security schemes for massive devices in 6G wireless networks. Finally, the book discusses critical security and privacy issues affecting the wireless ecosystem and provides practical AI-based solutions. "Security and Privacy Schemes for Dense 6G Wireless Communication Networks" is an essential reference for industry and academic researchers; scientists, engineers, lecturers and advanced students in the fields of cybersecurity wireless communication and networking, network security, computing, data science, AI/ML/DL, and sensing, as well as cybersecurity professionals and 6G standardization exper Imoize, Agbotiname Lucky (DE-588)1240342586 edt Meshram, Chandrashekhar (DE-588)1264955820 edt Do, Dinh-Thuan 1980- (DE-588)1304396150 edt Kadry, Seifedine 1977- (DE-588)118610144X edt Muthukaruppan, Lakshmanan (DE-588)1304400883 edt Erscheint auch als Druck-Ausgabe 9781839536632 https://doi.org/10.1049/PBSE021E Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Security and privacy schemes for dense 6G wireless communication networks |
title | Security and privacy schemes for dense 6G wireless communication networks |
title_auth | Security and privacy schemes for dense 6G wireless communication networks |
title_exact_search | Security and privacy schemes for dense 6G wireless communication networks |
title_exact_search_txtP | Security and privacy schemes for dense 6G wireless communication networks |
title_full | Security and privacy schemes for dense 6G wireless communication networks edited by Agbotiname Lucky Imoize, Chandrashekhar Meshram, Dinh-Thuan Do, Seifedine Kadry and Lakshmanan Muthukaruppan |
title_fullStr | Security and privacy schemes for dense 6G wireless communication networks edited by Agbotiname Lucky Imoize, Chandrashekhar Meshram, Dinh-Thuan Do, Seifedine Kadry and Lakshmanan Muthukaruppan |
title_full_unstemmed | Security and privacy schemes for dense 6G wireless communication networks edited by Agbotiname Lucky Imoize, Chandrashekhar Meshram, Dinh-Thuan Do, Seifedine Kadry and Lakshmanan Muthukaruppan |
title_short | Security and privacy schemes for dense 6G wireless communication networks |
title_sort | security and privacy schemes for dense 6g wireless communication networks |
url | https://doi.org/10.1049/PBSE021E |
work_keys_str_mv | AT imoizeagbotinamelucky securityandprivacyschemesfordense6gwirelesscommunicationnetworks AT meshramchandrashekhar securityandprivacyschemesfordense6gwirelesscommunicationnetworks AT dodinhthuan securityandprivacyschemesfordense6gwirelesscommunicationnetworks AT kadryseifedine securityandprivacyschemesfordense6gwirelesscommunicationnetworks AT muthukaruppanlakshmanan securityandprivacyschemesfordense6gwirelesscommunicationnetworks |