Design frameworks for wireless networks /

Saved in:
Bibliographic Details
Imprint:Singapore : Springer, 2020.
Description:1 online resource (439 pages)
Language:English
Series:Lecture Notes in Networks and Systems Ser. ; v. 82
Lecture notes in networks and systems ; v. 82.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/12601772
Hidden Bibliographic Details
Other authors / contributors:Das, Santosh Kumar.
Samanta, Sourav.
Dey, Nilanjan, 1984-
Kumar, Rajesh.
ISBN:9789811395741
9811395748
9789811395734
Notes:Deep Learning and Machine Learning Techniques for Intrusion Detection and Prevention in Wireless Sensor Networks: Comparative Study and Performance Analysis
Print version record.
Summary:This book provides an overview of the current state of the art in wireless networks around the globe, focusing on utilizing the latest artificial intelligence and soft computing techniques to provide design frameworks for wireless networks. These techniques play a vital role in developing a more robust algorithm suitable for the dynamic and heterogeneous environment, making the network self-managed, self-operational, and self-configurational, and efficiently reducing uncertainties and imprecise information.
Other form:Print version: Das, Santosh Kumar. Design Frameworks for Wireless Networks. Singapore : Springer, ©2019 9789811395734
Standard no.:10.1007/978-981-13-9

MARC

LEADER 00000cam a2200000Ia 4500
001 12601772
006 m o d
007 cr un|---aucuu
008 190824s2020 si o 000 0 eng d
005 20240510212718.6
015 |a GBB9F5530  |2 bnb 
016 7 |a 019507584  |2 Uk 
019 |a 1117289884  |a 1117701319  |a 1119616378 
020 |a 9789811395741  |q (electronic bk.) 
020 |a 9811395748  |q (electronic bk.) 
020 |z 9789811395734 
024 8 |a 10.1007/978-981-13-9 
035 |a (OCoLC)1112425681  |z (OCoLC)1117289884  |z (OCoLC)1117701319  |z (OCoLC)1119616378 
035 9 |a (OCLCCM-CC)1112425681 
037 |a com.springer.onix.9789811395741  |b Springer Nature 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d GW5XE  |d UIU  |d LQU  |d OCLCF  |d UKMGB  |d OCLCQ  |d N$T  |d UPM  |d OCLCQ 
049 |a MAIN 
050 4 |a TK5103.2 
245 0 0 |a Design frameworks for wireless networks /  |c Santosh Kumar Das, Sourav Samanta, Nilanjan Dey, Rajesh Kumar, editors. 
260 |a Singapore :  |b Springer,  |c 2020. 
300 |a 1 online resource (439 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Networks and Systems Ser. ;  |v v. 82 
588 0 |a Print version record. 
505 0 |a Intro; Foreword; Preface; Objective of the Book; Organization of the Book; List of Reviewers; Contents; About the Editors; Design and Enhancement of Security and Privacy Technique; An Analysis and Comparison of Security Protocols on Wireless Sensor Networks (WSN); 1 Introduction; 2 Literature Survey; 3 Security in Wireless Sensor Networks (WSN); 3.1 Sanctuary Requirements in WSN; 3.2 Constraints in WSN; 3.3 Security Threat Models; 3.4 Security Solutions in WSN; 4 Key Management Systems; 4.1 Protocols and Methods Classification; 5 Analysis and Discussion; 5.1 Analysis Method; 5.2 Discussion 
505 8 |a 6 ConclusionsReferences; On the Security Weaknesses in Password-Based Anonymous Authentication Scheme for E-Health Care; 1 Introduction; 1.1 Threat Model; 1.2 Bio-hash Function; 1.3 Contribution; 1.4 Organization of This Article; 2 Literature Review; 3 Overview of Mishra et al. mishra:bar Protocol; 3.1 Registration Phase; 3.2 Login Phase; 3.3 Verification Phase; 3.4 Password Change Phase; 3.5 Smart Card Revocation Phase; 4 Cryptanalysis of Mishra et al. mishra:bar Scheme; 4.1 Designing Imperfection in Login Phase; 4.2 Designing Imperfection in Authentication Phase 
505 8 |a 4.3 Designing Imperfection in Password Change Phase4.4 Lack of Biometric Update or Change Phase; 4.5 Strong Replay Attack; 4.6 Clock Synchronization Problem; 5 Performance Comparison; 6 Future Scope; 7 Conclusion; References; Integrated Probabilistic Relevancy Classification (PRC) Scheme for Intrusion Detection in SCADA Network; 1 Introduction; 2 Related Work; 3 Proposed Method; 3.1 Preprocessing; 3.2 String Matching; 3.3 Clustering and Classification; 4 Performance Analysis; 4.1 Confusion Matrix; 4.2 Error Rate; 4.3 Recall; 4.4 False Detection Rate 
505 8 |a 4.5 Classification Result for Existing and Proposed Classifiers4.6 Sensitivity, Specificity, and Accuracy; 5 Conclusion; References; Intrusion Detection System in Internet of Things; 1 Introduction; 2 Motivation; 3 Internet of Thing; 3.1 IoT Architecture; 3.2 Life Cycle of IoT and Possible Attacks; 4 Comparison of Internet of Things and Traditional IP Network; 4.1 IoT Protocol Stack; 4.2 IPv6 Border Router (6BR); 5 Intrusion Detection System; 5.1 Intrusion Detection Approaches; 6 Cyberattacks in IoT Applications; 6.1 Wormhole Attack; 6.2 Sinkhole Attack; 6.3 Selective Forwarding Attack 
505 8 |a 6.4 Sybil Attack and Clone ID Attack6.5 Hello Flood Attack; 6.6 Denial of Service (DOS) Attack; 7 Security in IoT Applications; 7.1 IPSec Capabilities in IoT System; 7.2 Challenges and Design Criteria of IoT Security System; 7.3 Need of IDSs in IoT; 8 Intrusion Detection System in IoT Applications; 8.1 Intrusion Detection System for Dos Attack; 8.2 Intrusion Detection System for Wormhole Attack; 8.3 Intrusion Detection System for Sinkhole Attack; 8.4 Intrusion Detection System for Internet of Things; 8.5 Comparative Analysis of SVELTE and INTI IDSs; 9 Conclusion; References 
500 |a Deep Learning and Machine Learning Techniques for Intrusion Detection and Prevention in Wireless Sensor Networks: Comparative Study and Performance Analysis 
520 |a This book provides an overview of the current state of the art in wireless networks around the globe, focusing on utilizing the latest artificial intelligence and soft computing techniques to provide design frameworks for wireless networks. These techniques play a vital role in developing a more robust algorithm suitable for the dynamic and heterogeneous environment, making the network self-managed, self-operational, and self-configurational, and efficiently reducing uncertainties and imprecise information. 
650 0 |a Wireless communication systems.  |0 http://id.loc.gov/authorities/subjects/sh92006740 
650 7 |a Wireless communication systems.  |2 fast  |0 (OCoLC)fst01176209 
655 4 |a Electronic books. 
700 1 |a Das, Santosh Kumar. 
700 1 |a Samanta, Sourav. 
700 1 |a Dey, Nilanjan,  |d 1984-  |0 http://id.loc.gov/authorities/names/n2015186986 
700 1 |a Kumar, Rajesh. 
776 0 8 |i Print version:  |a Das, Santosh Kumar.  |t Design Frameworks for Wireless Networks.  |d Singapore : Springer, ©2019  |z 9789811395734 
830 0 |a Lecture notes in networks and systems ;  |v v. 82.  |0 http://id.loc.gov/authorities/names/no2018045655 
903 |a HeVa 
929 |a oclccm 
999 f f |i 7a2d38eb-1a53-5483-a17f-b0e6c9f56600  |s b4a433b3-ffea-52d8-9fcb-99bc98a8dda4 
928 |t Library of Congress classification  |a TK5103.2  |l Online  |c UC-FullText  |u https://link.springer.com/10.1007/978-981-13-9574-1  |z Springer Nature  |g ebooks  |i 12617379