Wireless Communication in Cyber Security

  • 4h 20m
  • Geetanjali Rathee, M. Akila, R. Maheswar, S. Sountharrajan
  • John Wiley & Sons (US)
  • 2024

Presenting the concepts and advances of wireless communication in cybersecurity, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, and other industry professionals.

Rapid advancement in wireless communications and related technologies has led to the use of newer technologies like 6G, Internet of Things (IoT), Radar, and others. Not only are the technologies expanding, but the impact of wireless communication is also changing, becoming an inevitable part of daily life. With increased use comes great responsibilities and challenges for any newer technology. The growing risks in the direction of security, authentication, and encryption are some major areas of concern, together with user privacy and security. We have seen significant development in blockchain technology along with development in a wireless network that has proved extremely useful in solving various security issues. Quite efficient secure cyber-physical systems can be constructed using these technologies.

This comprehensive new volume covers the many methods and technologies used in intrusion detection in wireless networks. This book allows readers to reach their solutions using various predictive algorithm-based approaches and some curated real-time protective examples that are defined herein. Artificial intelligence (AI) concepts are devised and proposed for helping readers understand the core concepts of efficiencies of threats, and the parallel solutions are covered. The chapters also state the challenges in privacy and security levels for various algorithms and various techniques and tools are proposed for each challenge. It focuses on providing exposure to readers about data security and privacy for wider domains.

The editorial and author team aims to address all possible solutions to the various problems faced in the newer techniques of wireless communications, improving the accuracies and reliability over the possible vulnerabilities and security threats to wireless communications. It is a must have for any engineer, scientist, or other industry professional working in this area.

About the Author

S. Sountharrajan, PhD, is an associate professor in the School of Computing Science and Engineering at VIT Bhopal University. He is also the Division Head specializing in artificial intelligence and machine learning. He has published numerous papers in scientific journals and conferences and has delivered 32 guest lectures in reputed universities and institutions.

R. Maheswar, PhD, is an associate professor at the School of Electrical & Electronics Engineering, VIT Bhopal University. He has over 18 years of teaching experience at various levels and has published 60 papers at scientific journals and conferences.

Geetanjali Rathee, PhD, is an assistant professor in the Department of Computer Science and Engineering at Netaji Subhas University of Technology, New Delhi. She has six patents to her credit and has published over 40 papers in scientific journals and 15 papers at scholarly conferences. She has published book chapters, as well, and one book. She is a regular reviewer of various reputed journals.

M. Akila is a professor in computer science. He has delivered 32 lectures at various universities, seminars, and conferences, and he has three patents to his credit. He is deeply involved in industrial and entrepreneurial activities.

In this Book

  • BBUCAF: A Biometric-Based User Clustering Authentication Framework in Wireless Sensor Network
  • DeepNet: Dynamic Detection of Malwares Using Deep Learning Techniques
  • State of Art of Security and Risk in Wireless Environment Along with Healthcare Case Study
  • Machine Learning-Based Malicious Threat Detection and Security Analysis on Software-Defined Networking for Industry 4.0
  • Privacy Enhancement for Wireless Sensor Networks and the Internet of Things Based on Cryptological Techniques
  • Security and Confidentiality Concerns in Blockchain Technology: A Review
  • Explainable Artificial Intelligence for Cybersecurity
  • AI-Enabled Threat Detection and Security Analysis
  • Security Risks and Its Preservation Mechanism Using Dynamic Trusted Scheme
  • 6G Systems in Secure Data Transmission
  • A Trust-Based Information Forwarding Mechanism for IoT Systems
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 4.6 of 215 users Rating 4.6 of 215 users (215)