top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The Internet of things [[electronic resource] ] : connecting objects to the web / / edited by Hakima Chaouchi
The Internet of things [[electronic resource] ] : connecting objects to the web / / edited by Hakima Chaouchi
Autore Chaouchi Hakima
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (283 p.)
Disciplina 004
621.382
Altri autori (Persone) ChaouchiHakima
Collana ISTE
Soggetto topico Ubiquitous computing
Computer networks
Radio frequency identification systems
ISBN 1-118-60014-2
1-118-60017-7
1-118-60001-0
1-299-18737-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; The Internet of Things; Title Page; Copyright Page; Table of Contents; Preface; Chapter 1. Introduction to the Internet of Things; 1.1. Introduction; 1.2. History of IoT; 1.3. About objects/things in the IoT; 1.4. The identifier in the IoT; 1.5. Enabling technologies of IoT; 1.5.1. Identification technology; 1.5.2. Sensing and actuating technology; 1.5.3. Other technologies; 1.5.4. Connected objects' communication; 1.6. About the Internet in IoT; 1.7. Bibliography; Chapter 2. Radio Frequency Identification Technology Overview; 2.1. Introduction; 2.2. Principle of RFID
2.3. Components of an RFID system2.3.1. Reader; 2.3.2. RFID tag; 2.3.3. RFID middleware; 2.4. Issues; 2.5. Bibliography; Chapter 3. Wireless Sensor Networks: Technology Overview; 3.1. History and context; 3.1.1. From smart dust to smart plants; 3.1.2. Application requirements in modern WSNs; 3.2. The node; 3.2.1. Communication; 3.2.2. Computation; 3.2.3. Sensing; 3.2.4. Energy; 3.3. Connecting nodes; 3.3.1. Radio basics; 3.3.2. Common misconceptions; 3.3.3. Reliable communication in practice: channel hopping; 3.4. Networking nodes; 3.4.1. Medium access control; 3.4.2. Multi-hop routing
3.5. Securing communication3.6. Standards and Fora; 3.7. Conclusion; 3.8. Bibliography; Chapter 4. Power Line Communication Technology Overview; 4.1. Introduction; 4.2. Overview of existing PLC technologies and standards; 4.2.1. History of PLC technologies; 4.2.2. Different types of in-home PLC technologies; 4.2.3. Security; 4.2.4. Performances of PLC technologies; 4.2.5. Standards and normalization; 4.3. Architectures for home network applications; 4.3.1. Architecture for a high bit-rate home network application; 4.3.2. Architecture for low bit-rate home network application
4.4. Internet of things using PLC technology4.4.1. Connecting objects in the indoor environment; 4.4.2. Interoperability of connecting objects in the home environment; 4.5. Conclusion; 4.6. Bibliography; Chapter 5. RFID Applications and Related Research Issues; 5.1. Introduction; 5.2. Concepts and terminology; 5.2.1. Radio-frequency identification; 5.2.2. Transponder (tag) classes; 5.2.3. Standards; 5.2.4. RFID system architecture; 5.2.5. Other related technologies; 5.3. RFID applications; 5.3.1. Logistics and supply chain; 5.3.2. Production, monitoring and maintenance
5.3.3. Product safety, quality and information5.3.4. Access control and tracking and tracing of individuals; 5.3.5. Loyalty, membership and payment; 5.3.6. Household; 5.3.7. Other applications; 5.4. Ongoing research projects; 5.4.1. Hardware issues; 5.4.2. Protocols; 5.5. Summary and conclusions; 5.6. Bibliography; Chapter 6. RFID Deployment for Location and Mobility Management on the Internet; 6.1. Introduction; 6.2. Background and related work; 6.2.1. Localization; 6.2.2. Mobility management; 6.3. Localization and handover management relying on RFID; 6.3.1. A technology overview of RFID
6.3.2. How RFID can help localization and mobility management
Record Nr. UNINA-9910138855603321
Chaouchi Hakima  
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Internet of things [[electronic resource] ] : connecting objects to the web / / edited by Hakima Chaouchi
The Internet of things [[electronic resource] ] : connecting objects to the web / / edited by Hakima Chaouchi
Autore Chaouchi Hakima
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (283 p.)
Disciplina 004
621.382
Altri autori (Persone) ChaouchiHakima
Collana ISTE
Soggetto topico Ubiquitous computing
Computer networks
Radio frequency identification systems
ISBN 1-118-60014-2
1-118-60017-7
1-118-60001-0
1-299-18737-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; The Internet of Things; Title Page; Copyright Page; Table of Contents; Preface; Chapter 1. Introduction to the Internet of Things; 1.1. Introduction; 1.2. History of IoT; 1.3. About objects/things in the IoT; 1.4. The identifier in the IoT; 1.5. Enabling technologies of IoT; 1.5.1. Identification technology; 1.5.2. Sensing and actuating technology; 1.5.3. Other technologies; 1.5.4. Connected objects' communication; 1.6. About the Internet in IoT; 1.7. Bibliography; Chapter 2. Radio Frequency Identification Technology Overview; 2.1. Introduction; 2.2. Principle of RFID
2.3. Components of an RFID system2.3.1. Reader; 2.3.2. RFID tag; 2.3.3. RFID middleware; 2.4. Issues; 2.5. Bibliography; Chapter 3. Wireless Sensor Networks: Technology Overview; 3.1. History and context; 3.1.1. From smart dust to smart plants; 3.1.2. Application requirements in modern WSNs; 3.2. The node; 3.2.1. Communication; 3.2.2. Computation; 3.2.3. Sensing; 3.2.4. Energy; 3.3. Connecting nodes; 3.3.1. Radio basics; 3.3.2. Common misconceptions; 3.3.3. Reliable communication in practice: channel hopping; 3.4. Networking nodes; 3.4.1. Medium access control; 3.4.2. Multi-hop routing
3.5. Securing communication3.6. Standards and Fora; 3.7. Conclusion; 3.8. Bibliography; Chapter 4. Power Line Communication Technology Overview; 4.1. Introduction; 4.2. Overview of existing PLC technologies and standards; 4.2.1. History of PLC technologies; 4.2.2. Different types of in-home PLC technologies; 4.2.3. Security; 4.2.4. Performances of PLC technologies; 4.2.5. Standards and normalization; 4.3. Architectures for home network applications; 4.3.1. Architecture for a high bit-rate home network application; 4.3.2. Architecture for low bit-rate home network application
4.4. Internet of things using PLC technology4.4.1. Connecting objects in the indoor environment; 4.4.2. Interoperability of connecting objects in the home environment; 4.5. Conclusion; 4.6. Bibliography; Chapter 5. RFID Applications and Related Research Issues; 5.1. Introduction; 5.2. Concepts and terminology; 5.2.1. Radio-frequency identification; 5.2.2. Transponder (tag) classes; 5.2.3. Standards; 5.2.4. RFID system architecture; 5.2.5. Other related technologies; 5.3. RFID applications; 5.3.1. Logistics and supply chain; 5.3.2. Production, monitoring and maintenance
5.3.3. Product safety, quality and information5.3.4. Access control and tracking and tracing of individuals; 5.3.5. Loyalty, membership and payment; 5.3.6. Household; 5.3.7. Other applications; 5.4. Ongoing research projects; 5.4.1. Hardware issues; 5.4.2. Protocols; 5.5. Summary and conclusions; 5.6. Bibliography; Chapter 6. RFID Deployment for Location and Mobility Management on the Internet; 6.1. Introduction; 6.2. Background and related work; 6.2.1. Localization; 6.2.2. Mobility management; 6.3. Localization and handover management relying on RFID; 6.3.1. A technology overview of RFID
6.3.2. How RFID can help localization and mobility management
Record Nr. UNINA-9910830539503321
Chaouchi Hakima  
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The Internet of things : connecting objects to the web / / edited by Hakima Chaouchi
The Internet of things : connecting objects to the web / / edited by Hakima Chaouchi
Edizione [1st edition]
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (283 p.)
Disciplina 004
Altri autori (Persone) ChaouchiHakima
Collana ISTE
Soggetto topico Ubiquitous computing
Computer networks
Radio frequency identification systems
ISBN 9781118600146
1118600142
9781118600177
1118600177
9781118600016
1118600010
9781299187375
1299187374
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; The Internet of Things; Title Page; Copyright Page; Table of Contents; Preface; Chapter 1. Introduction to the Internet of Things; 1.1. Introduction; 1.2. History of IoT; 1.3. About objects/things in the IoT; 1.4. The identifier in the IoT; 1.5. Enabling technologies of IoT; 1.5.1. Identification technology; 1.5.2. Sensing and actuating technology; 1.5.3. Other technologies; 1.5.4. Connected objects' communication; 1.6. About the Internet in IoT; 1.7. Bibliography; Chapter 2. Radio Frequency Identification Technology Overview; 2.1. Introduction; 2.2. Principle of RFID
2.3. Components of an RFID system2.3.1. Reader; 2.3.2. RFID tag; 2.3.3. RFID middleware; 2.4. Issues; 2.5. Bibliography; Chapter 3. Wireless Sensor Networks: Technology Overview; 3.1. History and context; 3.1.1. From smart dust to smart plants; 3.1.2. Application requirements in modern WSNs; 3.2. The node; 3.2.1. Communication; 3.2.2. Computation; 3.2.3. Sensing; 3.2.4. Energy; 3.3. Connecting nodes; 3.3.1. Radio basics; 3.3.2. Common misconceptions; 3.3.3. Reliable communication in practice: channel hopping; 3.4. Networking nodes; 3.4.1. Medium access control; 3.4.2. Multi-hop routing
3.5. Securing communication3.6. Standards and Fora; 3.7. Conclusion; 3.8. Bibliography; Chapter 4. Power Line Communication Technology Overview; 4.1. Introduction; 4.2. Overview of existing PLC technologies and standards; 4.2.1. History of PLC technologies; 4.2.2. Different types of in-home PLC technologies; 4.2.3. Security; 4.2.4. Performances of PLC technologies; 4.2.5. Standards and normalization; 4.3. Architectures for home network applications; 4.3.1. Architecture for a high bit-rate home network application; 4.3.2. Architecture for low bit-rate home network application
4.4. Internet of things using PLC technology4.4.1. Connecting objects in the indoor environment; 4.4.2. Interoperability of connecting objects in the home environment; 4.5. Conclusion; 4.6. Bibliography; Chapter 5. RFID Applications and Related Research Issues; 5.1. Introduction; 5.2. Concepts and terminology; 5.2.1. Radio-frequency identification; 5.2.2. Transponder (tag) classes; 5.2.3. Standards; 5.2.4. RFID system architecture; 5.2.5. Other related technologies; 5.3. RFID applications; 5.3.1. Logistics and supply chain; 5.3.2. Production, monitoring and maintenance
5.3.3. Product safety, quality and information5.3.4. Access control and tracking and tracing of individuals; 5.3.5. Loyalty, membership and payment; 5.3.6. Household; 5.3.7. Other applications; 5.4. Ongoing research projects; 5.4.1. Hardware issues; 5.4.2. Protocols; 5.5. Summary and conclusions; 5.6. Bibliography; Chapter 6. RFID Deployment for Location and Mobility Management on the Internet; 6.1. Introduction; 6.2. Background and related work; 6.2.1. Localization; 6.2.2. Mobility management; 6.3. Localization and handover management relying on RFID; 6.3.1. A technology overview of RFID
6.3.2. How RFID can help localization and mobility management
Altri titoli varianti Internet of things : connecting objects
Record Nr. UNINA-9911019752403321
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Internet of Things. IoT Infrastructures : Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I / / edited by Benny Mandler, Johann Marquez-Barja, Miguel Elias Mitre Campista, Dagmar Cagáňová, Hakima Chaouchi, Sherali Zeadally, Mohamad Badra, Stefano Giordano, Maria Fazio, Andrey Somov, Radu-Laurentiu Vieriu
Internet of Things. IoT Infrastructures : Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I / / edited by Benny Mandler, Johann Marquez-Barja, Miguel Elias Mitre Campista, Dagmar Cagáňová, Hakima Chaouchi, Sherali Zeadally, Mohamad Badra, Stefano Giordano, Maria Fazio, Andrey Somov, Radu-Laurentiu Vieriu
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (LVIII, 547 p. 203 illus.)
Disciplina 004.678
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Computers, Special purpose
User interfaces (Computer systems)
Human-computer interaction
Application software
Software engineering
Computer Communication Networks
Special Purpose and Application-Based Systems
User Interfaces and Human Computer Interaction
Computer and Information Systems Applications
Software Engineering
ISBN 3-319-47063-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto SaSeIoT -- CN4IoT -- IoTaaS -- S-CUBE -- InterIoT -- Interoperability Considerations -- SDWNCT.
Record Nr. UNINA-9910255003603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Internet of Things. IoT Infrastructures : Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015, Revised Selected Papers, Part II / / edited by Benny Mandler, Johann Marquez-Barja, Miguel Elias Mitre Campista, Dagmar Cagáňová, Hakima Chaouchi, Sherali Zeadally, Mohamad Badra, Stefano Giordano, Maria Fazio, Andrey Somov, Radu-Laurentiu Vieriu
Internet of Things. IoT Infrastructures : Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015, Revised Selected Papers, Part II / / edited by Benny Mandler, Johann Marquez-Barja, Miguel Elias Mitre Campista, Dagmar Cagáňová, Hakima Chaouchi, Sherali Zeadally, Mohamad Badra, Stefano Giordano, Maria Fazio, Andrey Somov, Radu-Laurentiu Vieriu
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (LVIII, 555 p. 236 illus.)
Disciplina 004
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Computers, Special purpose
User interfaces (Computer systems)
Human-computer interaction
Application software
Software engineering
Computer Communication Networks
Special Purpose and Application-Based Systems
User Interfaces and Human Computer Interaction
Computer and Information Systems Applications
Software Engineering
ISBN 3-319-47075-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto SaSeIoT -- CN4IoT -- IoTaaS -- S-CUBE -- InterIoT -- Interoperability Considerations -- SDWNCT.
Record Nr. UNINA-9910255003703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Interoperability, Safety and Security in IoT : Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings / / edited by Giancarlo Fortino, Carlos E. Palau, Antonio Guerrieri, Nora Cuppens, Frédéric Cuppens, Hakima Chaouchi, Alban Gabillon
Interoperability, Safety and Security in IoT : Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings / / edited by Giancarlo Fortino, Carlos E. Palau, Antonio Guerrieri, Nora Cuppens, Frédéric Cuppens, Hakima Chaouchi, Alban Gabillon
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIV, 165 p. 61 illus.)
Disciplina 004
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Application software
Data encryption (Computer science)
Computer security
Artificial intelligence
Computer Communication Networks
Information Systems Applications (incl. Internet)
Cryptology
Systems and Data Security
Artificial Intelligence
ISBN 3-319-93797-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Bayesian approach for an efficient data reduction in IoT -- Battery Friendly Internet of Medical Media Things Networks -- Semantically Enriched Hypermedia APIs for Next Generation IoT -- Smart Devices for Automated Emergency Calls -- A Standardizable Network Architecture Supporting -- AmI open source system for the intelligent control of residences for the elderly -- A Scalable Agent-based Smart Environment for Edge-based Urban IoT Systems -- Observing Interoperability of IoT Systems Through Model-Based Testing -- Towards high throughput semantic translation -- Assessing the Impact of Mobility on LoRa Communications -- A Reinforcement Protection Game in the Internet of Things -- Safety-Related Wireless Communication via RF Modules for Industrial IoT Applications -- Blockchain and IoT: Mind the Gap -- Lightweight X.509 Digital Certificates for the Internet of Things -- Privacy preserving and resilient cloudified IoT architecture to support eHealth systems -- Using Physical Unclonable Functions for Internet-of-Thing Security Cameras -- Smart Wearable System for Safety-related Industrial IoT Applications.
Record Nr. UNINA-9910299353903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Interoperability, Safety and Security in IoT : Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers / / edited by Nathalie Mitton, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, Patrick Capolsini
Interoperability, Safety and Security in IoT : Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers / / edited by Nathalie Mitton, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, Patrick Capolsini
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (X, 139 p. 46 illus.)
Disciplina 004
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Computer networks
Application software
Data protection
Software engineering
Computers, Special purpose
Computer security
Computer Communication Networks
Information Systems Applications (incl. Internet)
Security
Software Engineering
Special Purpose and Application-Based Systems
Systems and Data Security
ISBN 3-319-52727-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Comparative Analysis of Opportunistic Communication Technologies -- Technical Overview of F-Interop -- BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs -- Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT -- Providing Interoperability for Autonomic Control of Connected Devices -- A framework to support interoperability in IoT and facilitate the development and deployment of highly distributed cloud applications -- F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things -- Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links SaSeIoT -- On the Performance of Key Pre-distribution for RPL-based IoT Networks -- Formulating a Global Identifier Based on Actor Relationship for the Internet of Things -- Framework of Cyber Attack Attribution Based on Threat Intelligence -- UML Modeling of Cross-layer Attack in Wireless Sensor Networks -- Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications -- Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT -- Framework of Cyber Attack Attribution Based on Threat Intelligence.
Record Nr. UNINA-9910254839503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Next-generation wireless technologies : 4G and beyond / / [edited by] Naveen Chilamkurti, Sherali Zeadally, Hakima Chaouchi
Next-generation wireless technologies : 4G and beyond / / [edited by] Naveen Chilamkurti, Sherali Zeadally, Hakima Chaouchi
Edizione [1st ed.]
Pubbl/distr/stampa New York, : Springer, 2013
Descrizione fisica 1 online resource (x, 285 pages) : illustrations (some color)
Disciplina 004.6
Altri autori (Persone) ChilamkurtiNaveen <1974->
ZeadallySherali
ChaouchiHakima
Collana Computer communications and networks
Soggetto topico Wireless communication systems
Wireless internet
ISBN 1-4471-5164-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I: Trends and Challenges of Emerging Wireless Networks -- Trends and Challenges of Emerging Wireless Networks -- Cooperative Mesh Networks -- Cooperation in Delay Tolerant Networks -- Wireless Multimedia -- Part II: Wireless Communications and Applications -- Vehicular Ad-Hoc Networks -- Broadband Wireless Technologies -- RFID -- Energy-Efficient Routing in Wireless Sensor Networks -- Part III: Future Internet Systems -- Internet of Things -- Communication Issues in the Internet of Things -- Machine to Machine Communications -- Security in Emerging 4G Networks -- Electronic Health Records.
Record Nr. UNINA-9910741145603321
New York, : Springer, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius
Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (689 p.)
Disciplina 005.8
Altri autori (Persone) ChaouchiHakima
Laurent-MaknaviciusMaryline
Collana ISTE
Soggetto topico Wireless communication systems - Security measures
Mobile communication systems - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-282-69149-X
9786612691492
0-470-61188-X
0-470-61028-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies; Table of Contents; Introduction; Part 1. Basic Concepts; Chapter 1. Introduction to Mobile and Wireless Networks; 1.1. Introduction; 1.2. Mobile cellular networks; 1.2.1. Introduction; 1.2.2. Cellular network basic concepts; 1.2.3. First generation (1G) mobile; 1.2.4. Second generation (2G) mobile; 1.2.5. Third generation (3G) mobile; 1.3. IEEE wireless networks; 1.3.1. Introduction; 1.3.2. WLAN: IEEE 802.11; 1.3.3. WPAN: IEEE 802.15; 1.3.4. WMAN: IEEE 802.16
1.3.5. WMAN mobile: IEEE 802.201.3.6. MIH: IEEE 802.21; 1.3.7. WRAN: IEEE 802.22; 1.4. Mobile Internet networks; 1.4.1. Introduction; 1.4.2. Macro mobility; 1.4.3. Micro mobility; 1.4.4. Personal mobility and SIP; 1.4.5. Identity based mobility; 1.4.6. NEMO and MANET networks; 1.5. Current trends; 1.5.1. All-IP, IMS and FMC; 1.5.2. B3G and 4G; 1.5.3. Applications; 1.6. Conclusions; 1.7. Bibliography; Chapter 2. Vulnerabilities of Wired and Wireless Networks; 2.1. Introduction; 2.2. Security in the digital age; 2.2.1. Private property: from vulnerabilities to risks
2.2.2. Definition of security2.2.3. Trust and subjectivity in security; 2.2.4. Services and security; 2.3. Threats and risks to telecommunications systems; 2.3.1. Role of telecommunications systems; 2.3.2. Threat models in telecommunications systems; 2.3.3. Homogenity vs. heterogenity; 2.3.4. The Internet and security; 2.3.5. The role of the medium; 2.3.6. Risks to the infrastructure; 2.3.7. Personal risks; 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications; 2.4.1. Changing the medium; 2.4.2. Wireless terminals; 2.4.3. New services; 2.5. Conclusions
2.6. BibliographyChapter 3. Fundamental Security Mechanisms; 3.1. Introduction; 3.2. Basics on security; 3.2.1. Security services; 3.2.2. Symmetric and asymmetric cryptography; 3.2.3. Hash functions; 3.2.4. Electronic signatures and MAC; 3.2.5. Public Key Infrastructure (PKI) and electronic certificates; 3.2.6. Management of cryptographic keys; 3.2.7. Cryptographic protocols; 3.3. Secure communication protocols and VPN implementation; 3.3.1. Secure Socket Layer (SSL) and Transport Layer Security (TLS); 3.3.2. IPsec protocol suite; 3.3.3. Comparison between SSL and IPsec security protocols
3.3.4. IPsec VPN and SSL VPN3.4. Authentication; 3.4.1. Authentication mechanisms.; 3.4.2. AAA protocols to control access to a private network or an operator's network; 3.5. Access control; 3.5.1. Firewalls; 3.5.2. Intrusion detection; 3.6. Conclusions; 3.7. Bibliography; Chapter 4. Wi-Fi Security Dedicated Architectures; 4.1. Introduction; 4.2. Hot spot architecture: captive portals; 4.2.1. Overview; 4.2.2. Captive portal overview; 4.2.3. Security analysis; 4.2.4. Conclusions; 4.3. Wireless intrusion detection systems (WIDS); 4.3.1. Introduction
4.3.2. Wireless intrusion detection systems architectures
Record Nr. UNINA-9910139512903321
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius
Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius
Pubbl/distr/stampa London, : ISTE
Descrizione fisica 1 online resource (689 p.)
Disciplina 005.8
Altri autori (Persone) ChaouchiHakima
Laurent-MaknaviciusMaryline
Collana ISTE
Soggetto topico Wireless communication systems - Security measures
Mobile communication systems - Security measures
ISBN 1-282-69149-X
9786612691492
0-470-61188-X
0-470-61028-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies; Table of Contents; Introduction; Part 1. Basic Concepts; Chapter 1. Introduction to Mobile and Wireless Networks; 1.1. Introduction; 1.2. Mobile cellular networks; 1.2.1. Introduction; 1.2.2. Cellular network basic concepts; 1.2.3. First generation (1G) mobile; 1.2.4. Second generation (2G) mobile; 1.2.5. Third generation (3G) mobile; 1.3. IEEE wireless networks; 1.3.1. Introduction; 1.3.2. WLAN: IEEE 802.11; 1.3.3. WPAN: IEEE 802.15; 1.3.4. WMAN: IEEE 802.16
1.3.5. WMAN mobile: IEEE 802.201.3.6. MIH: IEEE 802.21; 1.3.7. WRAN: IEEE 802.22; 1.4. Mobile Internet networks; 1.4.1. Introduction; 1.4.2. Macro mobility; 1.4.3. Micro mobility; 1.4.4. Personal mobility and SIP; 1.4.5. Identity based mobility; 1.4.6. NEMO and MANET networks; 1.5. Current trends; 1.5.1. All-IP, IMS and FMC; 1.5.2. B3G and 4G; 1.5.3. Applications; 1.6. Conclusions; 1.7. Bibliography; Chapter 2. Vulnerabilities of Wired and Wireless Networks; 2.1. Introduction; 2.2. Security in the digital age; 2.2.1. Private property: from vulnerabilities to risks
2.2.2. Definition of security2.2.3. Trust and subjectivity in security; 2.2.4. Services and security; 2.3. Threats and risks to telecommunications systems; 2.3.1. Role of telecommunications systems; 2.3.2. Threat models in telecommunications systems; 2.3.3. Homogenity vs. heterogenity; 2.3.4. The Internet and security; 2.3.5. The role of the medium; 2.3.6. Risks to the infrastructure; 2.3.7. Personal risks; 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications; 2.4.1. Changing the medium; 2.4.2. Wireless terminals; 2.4.3. New services; 2.5. Conclusions
2.6. BibliographyChapter 3. Fundamental Security Mechanisms; 3.1. Introduction; 3.2. Basics on security; 3.2.1. Security services; 3.2.2. Symmetric and asymmetric cryptography; 3.2.3. Hash functions; 3.2.4. Electronic signatures and MAC; 3.2.5. Public Key Infrastructure (PKI) and electronic certificates; 3.2.6. Management of cryptographic keys; 3.2.7. Cryptographic protocols; 3.3. Secure communication protocols and VPN implementation; 3.3.1. Secure Socket Layer (SSL) and Transport Layer Security (TLS); 3.3.2. IPsec protocol suite; 3.3.3. Comparison between SSL and IPsec security protocols
3.3.4. IPsec VPN and SSL VPN3.4. Authentication; 3.4.1. Authentication mechanisms.; 3.4.2. AAA protocols to control access to a private network or an operator's network; 3.5. Access control; 3.5.1. Firewalls; 3.5.2. Intrusion detection; 3.6. Conclusions; 3.7. Bibliography; Chapter 4. Wi-Fi Security Dedicated Architectures; 4.1. Introduction; 4.2. Hot spot architecture: captive portals; 4.2.1. Overview; 4.2.2. Captive portal overview; 4.2.3. Security analysis; 4.2.4. Conclusions; 4.3. Wireless intrusion detection systems (WIDS); 4.3.1. Introduction
4.3.2. Wireless intrusion detection systems architectures
Record Nr. UNINA-9910830184103321
London, : ISTE
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui