Performance and Security for the Internet of Things: Emerging Wireless Technologies

1st Edition
1260460363 · 9781260460360
A hands-on guide and mathematical approach to tackling security challenges and overall performance issues in 5G-based IoT communicationsThe Internet of Things (IoT) provides connectivity and data exchange anytime and anywhere among a wide variety of … Read More
US$62.10
Request Review Copy
Download file to PC or Mac desktops or laptops

Step 1. Download Adobe Digital Editions Both PC and Mac users will need to download Adobe Digital Editions to access their eBook. You can download Adobe Digital Editions at Adobe's website here.


Step 2. Register an Adobe ID if you do not already have one. (This step is optional, but allows you to open the file on multiple devices) Visit account.Adobe.com to register your Adobe account.


Step 3: Authorize Adobe Digital Editions using your Adobe ID. In Adobe Digital Editions, go to the Help menu. Choose “Authorize Computer.”


Step 4: Open your file with Adobe Digital Editions. Once you’ve linked your Adobe Digital Editions with your Adobe ID, you should be able to access your eBook on any device which supports Adobe Digital Editions and is authorized with your ID. If your eBook does not open in Adobe Digital Editions upon download, please contact customer service

A hands-on guide and mathematical approach to tackling security challenges and overall performance issues in 5G-based IoT communications

The Internet of Things (IoT) provides connectivity and data exchange anytime and anywhere among a wide variety of physical objects such as sensors, vehicles, and mobile phones. This book is a concise guide to securing wireless Internet of Things (IoT) systems at the communications level, covering wireless spectrum sharing systems, smart grid communications, machine-to-machine communications, and uplink/downlink communications for IoT applications. The methods, optimization problems, mathematical solutions, algorithms, and programming codes in the book can be applied directly or extended as countermeasures for different IoT vulnerabilities.

Coverage includes:

    • • Detailed solutions for tackling communications security threats
    • • Secure spectrum auction design 
    • • Spectrum trading architecture
    • • Distributed optimization algorithm
    • • Latency-centric IoT uplink framework
    • • MATLAB code for IoT spectrum sharing and IoT smart grid
    • • Joint carrier aggregation for IoT spectrum sharing systems
    • • Anomaly detection and classification

  •