WIRELESS COMMUNICATION SECURITY Presenting the concepts and advances of wireless communication security, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, and other industry professionals. Covering a broad range of topics in wireless communication security and its solutions, this outstanding new volume is of great interest to engineers, scientists, and students from a variety of backgrounds and interests. Focusing on providing the theory of wireless communication within the framework of its practical…mehr
Presenting the concepts and advances of wireless communication security, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, and other industry professionals.
Covering a broad range of topics in wireless communication security and its solutions, this outstanding new volume is of great interest to engineers, scientists, and students from a variety of backgrounds and interests. Focusing on providing the theory of wireless communication within the framework of its practical applications, the contributors take on a wealth of topics, integrating seemingly diverse areas under one cover.
Wireless Communication Security has been divided into five units. The first unit presents the different protocols and standards for developing a real-time wireless communication security. The second unit presents different widely accepted networks, which are the core of wireless communication security. Unit three presents the various device and network controlling methodologies. Unit four presents the various high performance and computationally efficient algorithms for efficient and scalable implementation of network protocols, and the last unit presents the leading innovations and variety of usage of wireless communication security. Valuable as a learning tool for beginners in this area as well as a daily reference for engineers and scientists working in these areas, this is a must-have for any library.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Manju Khari, PhD, is an assistant professor in AIACTR, affiliated with GGSIP University, Delhi, India. She is also the professor-in-charge of the IT Services of the Institute and has experience of more than twelve years in network planning and management. She holds a PhD in computer science and engineering from the National Institute of Technology, Patna. Manisha Bharti, PhD, is an assistant professor at the National Institute of Technology (NIT) Delhi, India. She received her PhD from IKG Punjab Technical University, Jalandhar and has over 12 years of teaching and research experience. M. Niranjanamurthy, PhD, is an assistant professor in the Department of Computer Applications, M S Ramaiah Institute of Technology, Bangalore, Karnataka. He earned his PhD in computer science at JJTU. He has over 10 years of teaching experience and two years of industry experience as a software engineer. He has two patents to his credit and has won numerous awards. He has published four books, and he is currently working on numerous books for Scrivener Publishing. He has also published over 50 papers in scholarly journals.
Inhaltsangabe
Preface xiii
1 M2M in 5G Cellular Networks: Challenges, Proposed Solutions, and Future Directions 1 Kiran Ahuja and Indu Bala
1.1 Introduction 2
1.2 Literature Survey 5
1.3 Survey Challenges and Proposed Solutions of M2M 7
1.3.1 PARCH Overload Problem 8
1.3.2 Inefficient Radio Resource Utilization and Allocation 10
1.3.3 M2M Random Access Challenges 12
1.3.4 Clustering Techniques 13
1.3.5 QoS Provisioning for M2M Communications 15
1.3.6 Less Cost and Low Power Device Requirements 16
1.3.7 Security and Privacy 17
1.4 Conclusion 18
References 19
2 MAC Layer Protocol for Wireless Security 23 Sushmita Kumari and Manisha Bharti
2.1 Introduction 23
2.2 MAC Layer 24
2.2.1 Centralized Control 24
2.2.2 Deterministic Access 24
2.2.3 Non-Deterministic Access 24
2.3 Functions of the MAC Layer 25
2.4 MAC Layer Protocol 25
2.4.1 Random Access Protocol 26
2.4.2 Controlled Access Protocols 29
2.4.3 Channelization 31
2.5 MAC Address 31
2.6 Conclusion and Future Scope 33
References 33
3 Enhanced Image Security Through Hybrid Approach: Protect Your Copyright Over Digital Images 35 Shaifali M. Arora and Poonam Kadian
3.1 Introduction 36
3.2 Literature Review 38
3.3 Design Issues 40
3.3.1 Robustness Against Various Attack Conditions 40
3.3.2 Distortion and Visual Quality 41
3.3.3 Working Domain 42
3.3.4 Human Visual System (HVS) 43
3.3.5 The Trade-Off between Robustness and Imperceptibility 43
3.3.6 Computational Cost 43
3.4 A Secure Grayscale Image Watermarking Based on DWT-SVD 43
3.5 Experimental Results 45
3.6 Conclusion 52
References 52
4 Quantum Computing 59 Manisha Bharti and Tanvika Garg
4.1 Introduction 59
4.2 A Brief History of Quantum Computing 60
4.3 Postulate of Quantum Mechanics 61
4.4 Polarization and Entanglement 61
4.5 Applications and Advancements 63
4.5.1 Cryptography, Teleportation and Communication Networks 63
4.5.2 Quantum Computing and Memories 63
4.5.3 Satellite Communication Based on Quantum Computing 64