The Internet of things [[electronic resource] ] : connecting objects to the web / / edited by Hakima Chaouchi
| The Internet of things [[electronic resource] ] : connecting objects to the web / / edited by Hakima Chaouchi |
| Autore | Chaouchi Hakima |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | London, : ISTE |
| Descrizione fisica | 1 online resource (283 p.) |
| Disciplina |
004
621.382 |
| Altri autori (Persone) | ChaouchiHakima |
| Collana | ISTE |
| Soggetto topico |
Ubiquitous computing
Computer networks Radio frequency identification systems |
| ISBN |
1-118-60014-2
1-118-60017-7 1-118-60001-0 1-299-18737-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; The Internet of Things; Title Page; Copyright Page; Table of Contents; Preface; Chapter 1. Introduction to the Internet of Things; 1.1. Introduction; 1.2. History of IoT; 1.3. About objects/things in the IoT; 1.4. The identifier in the IoT; 1.5. Enabling technologies of IoT; 1.5.1. Identification technology; 1.5.2. Sensing and actuating technology; 1.5.3. Other technologies; 1.5.4. Connected objects' communication; 1.6. About the Internet in IoT; 1.7. Bibliography; Chapter 2. Radio Frequency Identification Technology Overview; 2.1. Introduction; 2.2. Principle of RFID
2.3. Components of an RFID system2.3.1. Reader; 2.3.2. RFID tag; 2.3.3. RFID middleware; 2.4. Issues; 2.5. Bibliography; Chapter 3. Wireless Sensor Networks: Technology Overview; 3.1. History and context; 3.1.1. From smart dust to smart plants; 3.1.2. Application requirements in modern WSNs; 3.2. The node; 3.2.1. Communication; 3.2.2. Computation; 3.2.3. Sensing; 3.2.4. Energy; 3.3. Connecting nodes; 3.3.1. Radio basics; 3.3.2. Common misconceptions; 3.3.3. Reliable communication in practice: channel hopping; 3.4. Networking nodes; 3.4.1. Medium access control; 3.4.2. Multi-hop routing 3.5. Securing communication3.6. Standards and Fora; 3.7. Conclusion; 3.8. Bibliography; Chapter 4. Power Line Communication Technology Overview; 4.1. Introduction; 4.2. Overview of existing PLC technologies and standards; 4.2.1. History of PLC technologies; 4.2.2. Different types of in-home PLC technologies; 4.2.3. Security; 4.2.4. Performances of PLC technologies; 4.2.5. Standards and normalization; 4.3. Architectures for home network applications; 4.3.1. Architecture for a high bit-rate home network application; 4.3.2. Architecture for low bit-rate home network application 4.4. Internet of things using PLC technology4.4.1. Connecting objects in the indoor environment; 4.4.2. Interoperability of connecting objects in the home environment; 4.5. Conclusion; 4.6. Bibliography; Chapter 5. RFID Applications and Related Research Issues; 5.1. Introduction; 5.2. Concepts and terminology; 5.2.1. Radio-frequency identification; 5.2.2. Transponder (tag) classes; 5.2.3. Standards; 5.2.4. RFID system architecture; 5.2.5. Other related technologies; 5.3. RFID applications; 5.3.1. Logistics and supply chain; 5.3.2. Production, monitoring and maintenance 5.3.3. Product safety, quality and information5.3.4. Access control and tracking and tracing of individuals; 5.3.5. Loyalty, membership and payment; 5.3.6. Household; 5.3.7. Other applications; 5.4. Ongoing research projects; 5.4.1. Hardware issues; 5.4.2. Protocols; 5.5. Summary and conclusions; 5.6. Bibliography; Chapter 6. RFID Deployment for Location and Mobility Management on the Internet; 6.1. Introduction; 6.2. Background and related work; 6.2.1. Localization; 6.2.2. Mobility management; 6.3. Localization and handover management relying on RFID; 6.3.1. A technology overview of RFID 6.3.2. How RFID can help localization and mobility management |
| Record Nr. | UNINA-9910138855603321 |
Chaouchi Hakima
|
||
| London, : ISTE | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Internet of things [[electronic resource] ] : connecting objects to the web / / edited by Hakima Chaouchi
| The Internet of things [[electronic resource] ] : connecting objects to the web / / edited by Hakima Chaouchi |
| Autore | Chaouchi Hakima |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | London, : ISTE |
| Descrizione fisica | 1 online resource (283 p.) |
| Disciplina |
004
621.382 |
| Altri autori (Persone) | ChaouchiHakima |
| Collana | ISTE |
| Soggetto topico |
Ubiquitous computing
Computer networks Radio frequency identification systems |
| ISBN |
1-118-60014-2
1-118-60017-7 1-118-60001-0 1-299-18737-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; The Internet of Things; Title Page; Copyright Page; Table of Contents; Preface; Chapter 1. Introduction to the Internet of Things; 1.1. Introduction; 1.2. History of IoT; 1.3. About objects/things in the IoT; 1.4. The identifier in the IoT; 1.5. Enabling technologies of IoT; 1.5.1. Identification technology; 1.5.2. Sensing and actuating technology; 1.5.3. Other technologies; 1.5.4. Connected objects' communication; 1.6. About the Internet in IoT; 1.7. Bibliography; Chapter 2. Radio Frequency Identification Technology Overview; 2.1. Introduction; 2.2. Principle of RFID
2.3. Components of an RFID system2.3.1. Reader; 2.3.2. RFID tag; 2.3.3. RFID middleware; 2.4. Issues; 2.5. Bibliography; Chapter 3. Wireless Sensor Networks: Technology Overview; 3.1. History and context; 3.1.1. From smart dust to smart plants; 3.1.2. Application requirements in modern WSNs; 3.2. The node; 3.2.1. Communication; 3.2.2. Computation; 3.2.3. Sensing; 3.2.4. Energy; 3.3. Connecting nodes; 3.3.1. Radio basics; 3.3.2. Common misconceptions; 3.3.3. Reliable communication in practice: channel hopping; 3.4. Networking nodes; 3.4.1. Medium access control; 3.4.2. Multi-hop routing 3.5. Securing communication3.6. Standards and Fora; 3.7. Conclusion; 3.8. Bibliography; Chapter 4. Power Line Communication Technology Overview; 4.1. Introduction; 4.2. Overview of existing PLC technologies and standards; 4.2.1. History of PLC technologies; 4.2.2. Different types of in-home PLC technologies; 4.2.3. Security; 4.2.4. Performances of PLC technologies; 4.2.5. Standards and normalization; 4.3. Architectures for home network applications; 4.3.1. Architecture for a high bit-rate home network application; 4.3.2. Architecture for low bit-rate home network application 4.4. Internet of things using PLC technology4.4.1. Connecting objects in the indoor environment; 4.4.2. Interoperability of connecting objects in the home environment; 4.5. Conclusion; 4.6. Bibliography; Chapter 5. RFID Applications and Related Research Issues; 5.1. Introduction; 5.2. Concepts and terminology; 5.2.1. Radio-frequency identification; 5.2.2. Transponder (tag) classes; 5.2.3. Standards; 5.2.4. RFID system architecture; 5.2.5. Other related technologies; 5.3. RFID applications; 5.3.1. Logistics and supply chain; 5.3.2. Production, monitoring and maintenance 5.3.3. Product safety, quality and information5.3.4. Access control and tracking and tracing of individuals; 5.3.5. Loyalty, membership and payment; 5.3.6. Household; 5.3.7. Other applications; 5.4. Ongoing research projects; 5.4.1. Hardware issues; 5.4.2. Protocols; 5.5. Summary and conclusions; 5.6. Bibliography; Chapter 6. RFID Deployment for Location and Mobility Management on the Internet; 6.1. Introduction; 6.2. Background and related work; 6.2.1. Localization; 6.2.2. Mobility management; 6.3. Localization and handover management relying on RFID; 6.3.1. A technology overview of RFID 6.3.2. How RFID can help localization and mobility management |
| Record Nr. | UNINA-9910830539503321 |
Chaouchi Hakima
|
||
| London, : ISTE | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Internet of things : connecting objects to the web / / edited by Hakima Chaouchi
| The Internet of things : connecting objects to the web / / edited by Hakima Chaouchi |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | London, : ISTE |
| Descrizione fisica | 1 online resource (283 p.) |
| Disciplina | 004 |
| Altri autori (Persone) | ChaouchiHakima |
| Collana | ISTE |
| Soggetto topico |
Ubiquitous computing
Computer networks Radio frequency identification systems |
| ISBN |
9781118600146
1118600142 9781118600177 1118600177 9781118600016 1118600010 9781299187375 1299187374 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; The Internet of Things; Title Page; Copyright Page; Table of Contents; Preface; Chapter 1. Introduction to the Internet of Things; 1.1. Introduction; 1.2. History of IoT; 1.3. About objects/things in the IoT; 1.4. The identifier in the IoT; 1.5. Enabling technologies of IoT; 1.5.1. Identification technology; 1.5.2. Sensing and actuating technology; 1.5.3. Other technologies; 1.5.4. Connected objects' communication; 1.6. About the Internet in IoT; 1.7. Bibliography; Chapter 2. Radio Frequency Identification Technology Overview; 2.1. Introduction; 2.2. Principle of RFID
2.3. Components of an RFID system2.3.1. Reader; 2.3.2. RFID tag; 2.3.3. RFID middleware; 2.4. Issues; 2.5. Bibliography; Chapter 3. Wireless Sensor Networks: Technology Overview; 3.1. History and context; 3.1.1. From smart dust to smart plants; 3.1.2. Application requirements in modern WSNs; 3.2. The node; 3.2.1. Communication; 3.2.2. Computation; 3.2.3. Sensing; 3.2.4. Energy; 3.3. Connecting nodes; 3.3.1. Radio basics; 3.3.2. Common misconceptions; 3.3.3. Reliable communication in practice: channel hopping; 3.4. Networking nodes; 3.4.1. Medium access control; 3.4.2. Multi-hop routing 3.5. Securing communication3.6. Standards and Fora; 3.7. Conclusion; 3.8. Bibliography; Chapter 4. Power Line Communication Technology Overview; 4.1. Introduction; 4.2. Overview of existing PLC technologies and standards; 4.2.1. History of PLC technologies; 4.2.2. Different types of in-home PLC technologies; 4.2.3. Security; 4.2.4. Performances of PLC technologies; 4.2.5. Standards and normalization; 4.3. Architectures for home network applications; 4.3.1. Architecture for a high bit-rate home network application; 4.3.2. Architecture for low bit-rate home network application 4.4. Internet of things using PLC technology4.4.1. Connecting objects in the indoor environment; 4.4.2. Interoperability of connecting objects in the home environment; 4.5. Conclusion; 4.6. Bibliography; Chapter 5. RFID Applications and Related Research Issues; 5.1. Introduction; 5.2. Concepts and terminology; 5.2.1. Radio-frequency identification; 5.2.2. Transponder (tag) classes; 5.2.3. Standards; 5.2.4. RFID system architecture; 5.2.5. Other related technologies; 5.3. RFID applications; 5.3.1. Logistics and supply chain; 5.3.2. Production, monitoring and maintenance 5.3.3. Product safety, quality and information5.3.4. Access control and tracking and tracing of individuals; 5.3.5. Loyalty, membership and payment; 5.3.6. Household; 5.3.7. Other applications; 5.4. Ongoing research projects; 5.4.1. Hardware issues; 5.4.2. Protocols; 5.5. Summary and conclusions; 5.6. Bibliography; Chapter 6. RFID Deployment for Location and Mobility Management on the Internet; 6.1. Introduction; 6.2. Background and related work; 6.2.1. Localization; 6.2.2. Mobility management; 6.3. Localization and handover management relying on RFID; 6.3.1. A technology overview of RFID 6.3.2. How RFID can help localization and mobility management |
| Altri titoli varianti | Internet of things : connecting objects |
| Record Nr. | UNINA-9911019752403321 |
| London, : ISTE | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Internet of Things. IoT Infrastructures : Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I / / edited by Benny Mandler, Johann Marquez-Barja, Miguel Elias Mitre Campista, Dagmar Cagáňová, Hakima Chaouchi, Sherali Zeadally, Mohamad Badra, Stefano Giordano, Maria Fazio, Andrey Somov, Radu-Laurentiu Vieriu
| Internet of Things. IoT Infrastructures : Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015. Revised Selected Papers, Part I / / edited by Benny Mandler, Johann Marquez-Barja, Miguel Elias Mitre Campista, Dagmar Cagáňová, Hakima Chaouchi, Sherali Zeadally, Mohamad Badra, Stefano Giordano, Maria Fazio, Andrey Somov, Radu-Laurentiu Vieriu |
| Edizione | [1st ed. 2016.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
| Descrizione fisica | 1 online resource (LVIII, 547 p. 203 illus.) |
| Disciplina | 004.678 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computer networks
Computers, Special purpose User interfaces (Computer systems) Human-computer interaction Application software Software engineering Computer Communication Networks Special Purpose and Application-Based Systems User Interfaces and Human Computer Interaction Computer and Information Systems Applications Software Engineering |
| ISBN | 3-319-47063-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | SaSeIoT -- CN4IoT -- IoTaaS -- S-CUBE -- InterIoT -- Interoperability Considerations -- SDWNCT. |
| Record Nr. | UNINA-9910255003603321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Internet of Things. IoT Infrastructures : Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015, Revised Selected Papers, Part II / / edited by Benny Mandler, Johann Marquez-Barja, Miguel Elias Mitre Campista, Dagmar Cagáňová, Hakima Chaouchi, Sherali Zeadally, Mohamad Badra, Stefano Giordano, Maria Fazio, Andrey Somov, Radu-Laurentiu Vieriu
| Internet of Things. IoT Infrastructures : Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015, Revised Selected Papers, Part II / / edited by Benny Mandler, Johann Marquez-Barja, Miguel Elias Mitre Campista, Dagmar Cagáňová, Hakima Chaouchi, Sherali Zeadally, Mohamad Badra, Stefano Giordano, Maria Fazio, Andrey Somov, Radu-Laurentiu Vieriu |
| Edizione | [1st ed. 2016.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
| Descrizione fisica | 1 online resource (LVIII, 555 p. 236 illus.) |
| Disciplina | 004 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computer networks
Computers, Special purpose User interfaces (Computer systems) Human-computer interaction Application software Software engineering Computer Communication Networks Special Purpose and Application-Based Systems User Interfaces and Human Computer Interaction Computer and Information Systems Applications Software Engineering |
| ISBN | 3-319-47075-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | SaSeIoT -- CN4IoT -- IoTaaS -- S-CUBE -- InterIoT -- Interoperability Considerations -- SDWNCT. |
| Record Nr. | UNINA-9910255003703321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Interoperability, Safety and Security in IoT : Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings / / edited by Giancarlo Fortino, Carlos E. Palau, Antonio Guerrieri, Nora Cuppens, Frédéric Cuppens, Hakima Chaouchi, Alban Gabillon
| Interoperability, Safety and Security in IoT : Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings / / edited by Giancarlo Fortino, Carlos E. Palau, Antonio Guerrieri, Nora Cuppens, Frédéric Cuppens, Hakima Chaouchi, Alban Gabillon |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (XIV, 165 p. 61 illus.) |
| Disciplina | 004 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computer networks
Application software Data encryption (Computer science) Computer security Artificial intelligence Computer Communication Networks Information Systems Applications (incl. Internet) Cryptology Systems and Data Security Artificial Intelligence |
| ISBN | 3-319-93797-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | A Bayesian approach for an efficient data reduction in IoT -- Battery Friendly Internet of Medical Media Things Networks -- Semantically Enriched Hypermedia APIs for Next Generation IoT -- Smart Devices for Automated Emergency Calls -- A Standardizable Network Architecture Supporting -- AmI open source system for the intelligent control of residences for the elderly -- A Scalable Agent-based Smart Environment for Edge-based Urban IoT Systems -- Observing Interoperability of IoT Systems Through Model-Based Testing -- Towards high throughput semantic translation -- Assessing the Impact of Mobility on LoRa Communications -- A Reinforcement Protection Game in the Internet of Things -- Safety-Related Wireless Communication via RF Modules for Industrial IoT Applications -- Blockchain and IoT: Mind the Gap -- Lightweight X.509 Digital Certificates for the Internet of Things -- Privacy preserving and resilient cloudified IoT architecture to support eHealth systems -- Using Physical Unclonable Functions for Internet-of-Thing Security Cameras -- Smart Wearable System for Safety-related Industrial IoT Applications. |
| Record Nr. | UNINA-9910299353903321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Interoperability, Safety and Security in IoT : Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers / / edited by Nathalie Mitton, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, Patrick Capolsini
| Interoperability, Safety and Security in IoT : Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers / / edited by Nathalie Mitton, Hakima Chaouchi, Thomas Noel, Thomas Watteyne, Alban Gabillon, Patrick Capolsini |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (X, 139 p. 46 illus.) |
| Disciplina | 004 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computer networks
Application software Data protection Software engineering Computers, Special purpose Computer security Computer Communication Networks Information Systems Applications (incl. Internet) Security Software Engineering Special Purpose and Application-Based Systems Systems and Data Security |
| ISBN | 3-319-52727-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Comparative Analysis of Opportunistic Communication Technologies -- Technical Overview of F-Interop -- BMFA: Bi-Directional Multicast Forwarding Algorithm for RPL-based 6LoWPANs -- Synchronization Abstractions and Separation of Concerns as Key Aspects to the Interoperability in IoT -- Providing Interoperability for Autonomic Control of Connected Devices -- A framework to support interoperability in IoT and facilitate the development and deployment of highly distributed cloud applications -- F-Interop - Online Platform of Interoperability and Performance Tests for the Internet of Things -- Guard Time Optimisation for Energy Efficiency in IEEE 802.15.4-2015 TSCH Links SaSeIoT -- On the Performance of Key Pre-distribution for RPL-based IoT Networks -- Formulating a Global Identifier Based on Actor Relationship for the Internet of Things -- Framework of Cyber Attack Attribution Based on Threat Intelligence -- UML Modeling of Cross-layer Attack in Wireless Sensor Networks -- Adoption of Miniaturized Safety-Related Systems for Industrial Internet-of-Things Applications -- Identifying DOS and DDOS Attack Origin: IP Traceback Methods Comparison and Evaluation for IoT -- Framework of Cyber Attack Attribution Based on Threat Intelligence. |
| Record Nr. | UNINA-9910254839503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Next-generation wireless technologies : 4G and beyond / / [edited by] Naveen Chilamkurti, Sherali Zeadally, Hakima Chaouchi
| Next-generation wireless technologies : 4G and beyond / / [edited by] Naveen Chilamkurti, Sherali Zeadally, Hakima Chaouchi |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | New York, : Springer, 2013 |
| Descrizione fisica | 1 online resource (x, 285 pages) : illustrations (some color) |
| Disciplina | 004.6 |
| Altri autori (Persone) |
ChilamkurtiNaveen <1974->
ZeadallySherali ChaouchiHakima |
| Collana | Computer communications and networks |
| Soggetto topico |
Wireless communication systems
Wireless internet |
| ISBN | 1-4471-5164-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Part I: Trends and Challenges of Emerging Wireless Networks -- Trends and Challenges of Emerging Wireless Networks -- Cooperative Mesh Networks -- Cooperation in Delay Tolerant Networks -- Wireless Multimedia -- Part II: Wireless Communications and Applications -- Vehicular Ad-Hoc Networks -- Broadband Wireless Technologies -- RFID -- Energy-Efficient Routing in Wireless Sensor Networks -- Part III: Future Internet Systems -- Internet of Things -- Communication Issues in the Internet of Things -- Machine to Machine Communications -- Security in Emerging 4G Networks -- Electronic Health Records. |
| Record Nr. | UNINA-9910741145603321 |
| New York, : Springer, 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius
| Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius |
| Pubbl/distr/stampa | London, : ISTE |
| Descrizione fisica | 1 online resource (689 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
ChaouchiHakima
Laurent-MaknaviciusMaryline |
| Collana | ISTE |
| Soggetto topico |
Wireless communication systems - Security measures
Mobile communication systems - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-282-69149-X
9786612691492 0-470-61188-X 0-470-61028-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies; Table of Contents; Introduction; Part 1. Basic Concepts; Chapter 1. Introduction to Mobile and Wireless Networks; 1.1. Introduction; 1.2. Mobile cellular networks; 1.2.1. Introduction; 1.2.2. Cellular network basic concepts; 1.2.3. First generation (1G) mobile; 1.2.4. Second generation (2G) mobile; 1.2.5. Third generation (3G) mobile; 1.3. IEEE wireless networks; 1.3.1. Introduction; 1.3.2. WLAN: IEEE 802.11; 1.3.3. WPAN: IEEE 802.15; 1.3.4. WMAN: IEEE 802.16
1.3.5. WMAN mobile: IEEE 802.201.3.6. MIH: IEEE 802.21; 1.3.7. WRAN: IEEE 802.22; 1.4. Mobile Internet networks; 1.4.1. Introduction; 1.4.2. Macro mobility; 1.4.3. Micro mobility; 1.4.4. Personal mobility and SIP; 1.4.5. Identity based mobility; 1.4.6. NEMO and MANET networks; 1.5. Current trends; 1.5.1. All-IP, IMS and FMC; 1.5.2. B3G and 4G; 1.5.3. Applications; 1.6. Conclusions; 1.7. Bibliography; Chapter 2. Vulnerabilities of Wired and Wireless Networks; 2.1. Introduction; 2.2. Security in the digital age; 2.2.1. Private property: from vulnerabilities to risks 2.2.2. Definition of security2.2.3. Trust and subjectivity in security; 2.2.4. Services and security; 2.3. Threats and risks to telecommunications systems; 2.3.1. Role of telecommunications systems; 2.3.2. Threat models in telecommunications systems; 2.3.3. Homogenity vs. heterogenity; 2.3.4. The Internet and security; 2.3.5. The role of the medium; 2.3.6. Risks to the infrastructure; 2.3.7. Personal risks; 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications; 2.4.1. Changing the medium; 2.4.2. Wireless terminals; 2.4.3. New services; 2.5. Conclusions 2.6. BibliographyChapter 3. Fundamental Security Mechanisms; 3.1. Introduction; 3.2. Basics on security; 3.2.1. Security services; 3.2.2. Symmetric and asymmetric cryptography; 3.2.3. Hash functions; 3.2.4. Electronic signatures and MAC; 3.2.5. Public Key Infrastructure (PKI) and electronic certificates; 3.2.6. Management of cryptographic keys; 3.2.7. Cryptographic protocols; 3.3. Secure communication protocols and VPN implementation; 3.3.1. Secure Socket Layer (SSL) and Transport Layer Security (TLS); 3.3.2. IPsec protocol suite; 3.3.3. Comparison between SSL and IPsec security protocols 3.3.4. IPsec VPN and SSL VPN3.4. Authentication; 3.4.1. Authentication mechanisms.; 3.4.2. AAA protocols to control access to a private network or an operator's network; 3.5. Access control; 3.5.1. Firewalls; 3.5.2. Intrusion detection; 3.6. Conclusions; 3.7. Bibliography; Chapter 4. Wi-Fi Security Dedicated Architectures; 4.1. Introduction; 4.2. Hot spot architecture: captive portals; 4.2.1. Overview; 4.2.2. Captive portal overview; 4.2.3. Security analysis; 4.2.4. Conclusions; 4.3. Wireless intrusion detection systems (WIDS); 4.3.1. Introduction 4.3.2. Wireless intrusion detection systems architectures |
| Record Nr. | UNINA-9910139512903321 |
| London, : ISTE | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius
| Wireless and mobile networks security [[electronic resource] ] : security basics, security in on-the-shelf and emerging technologies / / edited by Hakima Chaouchi, Maryline Laurent-Maknavicius |
| Pubbl/distr/stampa | London, : ISTE |
| Descrizione fisica | 1 online resource (689 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
ChaouchiHakima
Laurent-MaknaviciusMaryline |
| Collana | ISTE |
| Soggetto topico |
Wireless communication systems - Security measures
Mobile communication systems - Security measures |
| ISBN |
1-282-69149-X
9786612691492 0-470-61188-X 0-470-61028-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies; Table of Contents; Introduction; Part 1. Basic Concepts; Chapter 1. Introduction to Mobile and Wireless Networks; 1.1. Introduction; 1.2. Mobile cellular networks; 1.2.1. Introduction; 1.2.2. Cellular network basic concepts; 1.2.3. First generation (1G) mobile; 1.2.4. Second generation (2G) mobile; 1.2.5. Third generation (3G) mobile; 1.3. IEEE wireless networks; 1.3.1. Introduction; 1.3.2. WLAN: IEEE 802.11; 1.3.3. WPAN: IEEE 802.15; 1.3.4. WMAN: IEEE 802.16
1.3.5. WMAN mobile: IEEE 802.201.3.6. MIH: IEEE 802.21; 1.3.7. WRAN: IEEE 802.22; 1.4. Mobile Internet networks; 1.4.1. Introduction; 1.4.2. Macro mobility; 1.4.3. Micro mobility; 1.4.4. Personal mobility and SIP; 1.4.5. Identity based mobility; 1.4.6. NEMO and MANET networks; 1.5. Current trends; 1.5.1. All-IP, IMS and FMC; 1.5.2. B3G and 4G; 1.5.3. Applications; 1.6. Conclusions; 1.7. Bibliography; Chapter 2. Vulnerabilities of Wired and Wireless Networks; 2.1. Introduction; 2.2. Security in the digital age; 2.2.1. Private property: from vulnerabilities to risks 2.2.2. Definition of security2.2.3. Trust and subjectivity in security; 2.2.4. Services and security; 2.3. Threats and risks to telecommunications systems; 2.3.1. Role of telecommunications systems; 2.3.2. Threat models in telecommunications systems; 2.3.3. Homogenity vs. heterogenity; 2.3.4. The Internet and security; 2.3.5. The role of the medium; 2.3.6. Risks to the infrastructure; 2.3.7. Personal risks; 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications; 2.4.1. Changing the medium; 2.4.2. Wireless terminals; 2.4.3. New services; 2.5. Conclusions 2.6. BibliographyChapter 3. Fundamental Security Mechanisms; 3.1. Introduction; 3.2. Basics on security; 3.2.1. Security services; 3.2.2. Symmetric and asymmetric cryptography; 3.2.3. Hash functions; 3.2.4. Electronic signatures and MAC; 3.2.5. Public Key Infrastructure (PKI) and electronic certificates; 3.2.6. Management of cryptographic keys; 3.2.7. Cryptographic protocols; 3.3. Secure communication protocols and VPN implementation; 3.3.1. Secure Socket Layer (SSL) and Transport Layer Security (TLS); 3.3.2. IPsec protocol suite; 3.3.3. Comparison between SSL and IPsec security protocols 3.3.4. IPsec VPN and SSL VPN3.4. Authentication; 3.4.1. Authentication mechanisms.; 3.4.2. AAA protocols to control access to a private network or an operator's network; 3.5. Access control; 3.5.1. Firewalls; 3.5.2. Intrusion detection; 3.6. Conclusions; 3.7. Bibliography; Chapter 4. Wi-Fi Security Dedicated Architectures; 4.1. Introduction; 4.2. Hot spot architecture: captive portals; 4.2.1. Overview; 4.2.2. Captive portal overview; 4.2.3. Security analysis; 4.2.4. Conclusions; 4.3. Wireless intrusion detection systems (WIDS); 4.3.1. Introduction 4.3.2. Wireless intrusion detection systems architectures |
| Record Nr. | UNINA-9910830184103321 |
| London, : ISTE | ||
| Lo trovi qui: Univ. Federico II | ||
| ||