Limit search to available items
Book Cover
E-book

Title Wireless networks : cyber security threats and countermeasures / edited by Hamid Jahankhani, Ayman El Hajjar, editors
Published Cham, Switzerland : Springer International Publishing AG, [2023]

Copies

Description 1 online resource (vi, 348 pages) : illustrations (chiefly color)
Series Advanced Sciences and Technologies for Security Applications
Advanced sciences and technologies for security applications.
Contents Intro -- Contents -- Key-Pre Distribution for the Internet of Things Challenges, Threats and Recommendations -- 1 Introduction -- 2 Chapter Question -- 2.1 Differences Between DSN and IoT -- 2.2 Threat Model for IoT and the Research Problem -- 3 Internet of Things -- 4 6LoWPAN -- 5 Routing -- 5.1 RPL Messages -- 5.2 RPL Routing Metrics and Constraints -- 5.3 RPL Objective Functions -- 6 Security -- 6.1 Security in RPL -- 6.2 Cryptography in IoT -- 6.3 Key Pre-distribution in DSN -- 6.4 Probabilistic Key Pre-distribution -- 6.5 Deterministic Key Pre-distribution -- 6.6 Threats Attacks Trees
7 Summary -- References -- Approaches and Methods for Regulation of Security Risks in 5G and 6G -- 1 Introduction -- 1.1 Fundamentals of Mobile Communication Technology -- 1.2 Technologies Behind the 5G and 6G Cellular Network -- 1.3 Strategic Directions from Government -- 1.4 Smart City Impacts and Interactions with Individuals -- 1.5 Ethics and Regulations -- 2 The Age of Digital Transformation Moving to 5G/6G -- 2.1 Digital Identity and Emerging Technologies Relationship with Data Protection of Societies -- 2.2 Current Infrastructure Weakness and Cyberattack Manipulations
2.3 Data Privacy and Security Challenges -- 3 Governance and Adopting Methodologies for Managing Standardisation and Interoperability -- 3.1 Enabling Secure and Resilient Societies -- 3.2 Disaster Resilience and Managing the Risks -- 4 Strengthening Trust in Complex Private and Public Supply Chains -- 5 Conclusion -- References -- Investigating Gesture Control of Robotic Arm via Lora Technology for Smart Cities -- 1 Introduction -- 1.1 Significance of Study -- 1.2 Scope of Research -- 1.3 Applications -- 2 Literature Review -- 2.1 Gesture Control of Robotic Arm Using Infrared
2.2 Wireless Gesture Controlled Robot via Bluetooth Wireless Connectivity -- 2.3 Gesture Control of Robotic Arm Using Zigbee Technology -- 2.4 Gesture Based Wireless Mobile Robotic Arm via WiFi Connection -- 2.5 Gesture Controlled Robotic Arm Using 433 MHz RF Module -- 2.6 An Overview of Lora Technology -- 2.7 Lora Transceiver -- 2.8 Lora Protocol Stack -- 2.9 Lora Network Architecture -- 3 Flex Sensors -- 3.1 What is a Flex Sensor? -- 4 Servo Motors -- 4.1 What is a Servomotor? -- 5 System Design -- 5.1 Microcontroller -- 5.2 Hardware Design Analysis -- 5.3 Lora Transceiver -- 5.4 Output Unit
5.5 Software Design Analysis -- 5.6 Flow Chart of the System -- 5.7 Circuit Diagram of the System -- 6 Results, Analysis and Findings -- 6.1 Breadboarding -- 6.2 Serial Plot -- 6.3 Servo Motors Calibration of Prototype -- 6.4 Flex Sensor Calibration and Calculation -- 6.5 Transmitter System -- 6.6 Receiver System -- 6.7 Transmitter and Receiver System -- 6.8 LoRa Spread Factor, Bit Rate and Data Range -- 6.9 Mode of Operation -- 7 Conclusion -- References -- Safety and Security Issues in Employing Drones -- 1 Introduction -- 1.1 Attacks on UAVs-Based Systems
Summary In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats. This book addresses some of these challenges focusing on the implication, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicious use of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security. The book provides a valuable reference for cyber-security experts, practitioners, and network security professionals, particularly those interested in the security of the various wireless networks. It is also aimed at researchers seeking to obtain a more profound knowledge in various types of wireless networks in the context of cyber-security, wireless networks, and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and masters degree programs in cyber-security, network security, cyber-terrorism, and computer science who are investigating or evaluating a security of a specific wireless network. Each chapter is written by an internationally-renowned expert who has extensive experience in law enforcement, industry, or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills
Bibliography Includes bibliographical references
Notes Description based on online resource; title from digital title page (viewed on October 16, 2023)
Subject Wireless communication systems -- Security measures
Wireless communication systems -- Security measures
Form Electronic book
Author Jahankhani, Hamid, editor.
El Hajjar, Ayman, editor
ISBN 9783031336317
3031336313