1.

Record Nr.

UNISA996546842003316

Autore

Liu Jianwei

Titolo

Space-Air-Ground Integrated Network Security [[electronic resource] /] / by Jianwei Liu, Lin Bai, Chunxiao Jiang, Wei Zhang

Pubbl/distr/stampa

Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023

ISBN

981-9911-25-7

Edizione

[1st ed. 2023.]

Descrizione fisica

1 online resource (435 pages)

Disciplina

658.47

Soggetti

Computer networks - Security measures

Data protection

Security systems

Mobile and Network Security

Data and Information Security

Security Science and Technology

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references.

Nota di contenuto

Chapter 1 Introduction to SAGIN Security -- Chapter 2 Theory Foundation of SAGIN Security -- Chapter 3 Ground Network Security -- Chapter 4 Airborne Network Security -- Chapter 5 Space Network Security -- Chapter 6 Future Trend of Network Security.

Sommario/riassunto

This book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs). SAGIN are expected to play an increasingly important role in providing real-time, flexible, and integrated communication and data transmission services in an efficient manner. Today, SAGINs have been widely developed for a range of applications in navigation, environmental monitoring, traffic management, counter-terrorism, etc. However, security becomes a major concern, since the satellites, spacecrafts, and aircrafts are susceptible to a variety of traditional/specific network-based attacks, including eavesdropping, session hijacking, and illegal access. In this book, we review the theoretical foundations of SAGIN security. We also address a range of related security threats and provide cutting-edge solutions in the aspect of ground network security, airborne network



security, space network security, and provide future trends in SAGIN security. The book goes from an introduction to the topic’s background, to a description of the basic theory, and then to cutting-edge technologies, making it suitable for readers at all levels including professional researchers and beginners. To gain the most from the book, readers should have taken prior courses in information theory, cryptography, network security, etc.