This open-access book aims to highlight the coming surge of 5G network-based applications and predicts that the centralized networks and their current capacity will be incapable of meeting the demands. The book emphasizes the benefits and challenges associated with the integration of 5G networks with varied applications. Further, the book gathers and investigates the most recent 5G-based research solutions that handle security and privacy threats while considering resource-constrained wireless devices. The information, applications, and recent advances discussed in this book will serve to be of immense help to practitioners, database professionals, and researchers.
Les mer
This open-access book aims to highlight the coming surge of 5G network-based applications and predicts that the centralized networks and their current capacity will be incapable of meeting the demands.
Les mer
5G network architecture, management technologies, and services.- Network architectures and protocols for efficient exploitation of spectrum resources in 5G.- Smart radio resource allocation mechanisms for 5G.- Energy management in 5G networks.- Physical layer developments in 5G.- Smart cross-layer access node allocation mechanisms in 5G networks.
Les mer
This open-access book aims to highlight the coming surge of 5G network-based applications and predicts that the centralized networks and their current capacity will be incapable of meeting the demands. The book emphasizes the benefits and challenges associated with the integration of 5G networks with varied applications. Further, the book gathers and investigates the most recent 5G-based research solutions that handle security and privacy threats while considering resource-constrained wireless devices. The information, applications, and recent advances discussed in this book will serve to be of immense help to practitioners, database professionals, and researchers.
Les mer
Addresses the biggest challenges and solutions for 5G networks services Explores the security and privacy concerns in 5G wireless communications Implements effective security architecture for IoT and 5G This book is open access, which means that you have free and unlimited access
Les mer
Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. The images or other third party material in this book are included in the book's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the book's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Les mer

Produktdetaljer

ISBN
9789819936670
Publisert
2023-08-30
Utgiver
Vendor
Springer Verlag, Singapore
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Research, P, 06
Språk
Product language
Engelsk
Format
Product format
Innbundet

Biographical note

Bharat Bhushan is an Assistant Professor of the Department of Computer Science and Engineering (CSE) at the School of Engineering and Technology, Sharda University, Greater Noida, India. He is an alumnus of Birla Institute of Technology, Mesra, Ranchi, India. He received his B. Tech. in Computer Science and Engineering in 2012, an M. Tech. in Information Security in 2015, and a Ph.D. in Computer Science and Engineering in 2021 from Birla Institute of Technology, Mesra, India. He has published over 80 research papers in various renowned International conferences and Journals. He has also contributed over 25 book chapters and has edited 11 books. He is a member of numerous renowned bodies such as IEEE, IAENG, CSTA, SCIEI, IAE, and UACEE.

 

Sudhir Kumar Sharma is currently a Professor and Head of the Department of Computer Science, Institute of Information Technology & Management affiliated with GGSIPU, New Delhi, India. He has extensiveexperience of over 21 years in the field of Computer Science and Engineering. He obtained his Ph.D. degree in Information Technology in 2013 from USICT, Guru Gobind Singh Indraprastha University, New Delhi, India. Dr. Sharma received his M. Tech degree in Computer Science & Engineering in 1999 from the Guru Jambheshwar University, Hisar, India, and an M.Sc. degree in Physics from the University of Roorkee (now IIT Roorkee), Roorkee, in 1997. His research interests are machine learning, data mining, and security. Dr. Sharma has published over 60 research papers in various prestigious International Journals and Conferences. He authored and edited 7 books in the fields of IoT, WSN, blockchain, and cyber-physical systems. 

 

Raghvendra Kumar is an Associate Professor in Computer Science and Engineering Department at GIET University, India. He received B. Tech, M.Tech, and Ph.D. in Computer Science and Engineering, India, and Postdoc Fellow from theInstitute of Information Technology, Virtual Reality, and Multimedia, Vietnam. He has published a number of research papers in international journals and conferences. He also published 13 chapters in edited books published by renowned publishers. His research areas are computer networks, data mining, cloud computing and secure multiparty computations, theory of computer science, and design of algorithms. He authored and edited 23 computer science books on IoT, data mining, biomedical engineering, big data, and robotics.

 

Ishaani Priyadarshini is a lecturer at the School of Information, UC Berkeley, USA, Ph.D., and Master's Degree in Cybersecurity from the University of Delaware, USA. Prior to that, she completed her Bachelor's degree in Computer Science Engineering and a Master’s degree in Information Security from Kalinga Institute of Industrial Technology, India. She has authored several book chapters for reputed publishers and is also anauthor of several publications for SCIE-indexed journals. As a certified reviewer, she conducts peer reviews of research papers for prestigious publishers and is a part of the Editorial Board for the International Journal of Information Security and Privacy (IJISP). Her areas of research include cybersecurity, artificial intelligence, and HCI.