LEADER 04504nam 22006975 450 001 9910337632503321 005 20200703230123.0 010 $a3-030-03508-5 024 7 $a10.1007/978-3-030-03508-2 035 $a(CKB)4100000007598188 035 $a(DE-He213)978-3-030-03508-2 035 $a(MiAaPQ)EBC5675626 035 $a(PPN)235006718 035 $a(EXLCZ)994100000007598188 100 $a20190205d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$a5G Enabled Secure Wireless Networks /$fedited by Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, Vishal Sharma 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XVIII, 200 p. 64 illus., 62 illus. in color.) 311 $a3-030-03507-7 327 $aChapter1: 5G Enabled Wireless Networks: A Security, Data and Privacy Perspective -- Chapter2: 5G Applications and Architectures -- Chapter3:A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks -- Chapter4: Physical Layer Security in 5G Hybrid Heterogeneous Networks -- Chapter5: Physical Layer Security of Energy Harvesting M2M Communication System -- Chapter6: Beam-Domain Full-Duplex Massive MIMO Transmission in the Cellular System. 330 $aThis book covers issues related to 5G network security. The authors start by providing details on network architecture and key requirements. They then outline the issues concerning security policies and various solutions that can handle these policies. Use of SDN-NFV technologies for security enhancement is also covered. The book includes intelligent solutions by utilizing the features of artificial intelligence and machine learning to improve the performance of the 5G security protocols and models. Optimization of security models is covered as a separate section with a detailed information on the security of 5G-based edge, fog, and osmotic computing. This book provides detailed guidance and reference material for academicians, professionals, and researchers. Presents extensive information and data on research and challenges in 5G networks; Covers basic architectures, models, security frameworks, and software-defined solutions for security issues in 5G networks; Provides solutions that can help in the growth of new startups as well as research directions concerning the future of 5G networks. 606 $aElectrical engineering 606 $aPower electronics 606 $aData protection 606 $aElectronics 606 $aMicroelectronics 606 $aApplication software 606 $aEnergy efficiency 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aPower Electronics, Electrical Machines and Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24070 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aElectronics and Microelectronics, Instrumentation$3https://scigraph.springernature.com/ontologies/product-market-codes/T24027 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aEnergy Efficiency$3https://scigraph.springernature.com/ontologies/product-market-codes/118000 615 0$aElectrical engineering. 615 0$aPower electronics. 615 0$aData protection. 615 0$aElectronics. 615 0$aMicroelectronics. 615 0$aApplication software. 615 0$aEnergy efficiency. 615 14$aCommunications Engineering, Networks. 615 24$aPower Electronics, Electrical Machines and Networks. 615 24$aSecurity. 615 24$aElectronics and Microelectronics, Instrumentation. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aEnergy Efficiency. 676 $a621.382 702 $aJayakody$b Dushantha Nalin K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSrinivasan$b Kathiravan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSharma$b Vishal$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910337632503321 996 $a5G Enabled Secure Wireless Networks$91935516 997 $aUNINA