5G and Beyond.
Saved in:
Superior document: | Springer Tracts in Electrical and Electronics Engineering Series |
---|---|
: | |
TeilnehmendeR: | |
Place / Publishing House: | Singapore : : Springer,, 2023. ©2023. |
Year of Publication: | 2023 |
Edition: | 1st ed. |
Language: | English |
Series: | Springer Tracts in Electrical and Electronics Engineering Series
|
Online Access: | |
Physical Description: | 1 online resource (311 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 11865nam a22004933i 4500 | ||
---|---|---|---|
001 | 50030733633 | ||
003 | MiAaPQ | ||
005 | 20240229073851.0 | ||
006 | m o d | | ||
007 | cr cnu|||||||| | ||
008 | 240229s2023 xx o ||||0 eng d | ||
020 | |a 9789819936687 |q (electronic bk.) | ||
020 | |z 9789819936670 | ||
035 | |a (MiAaPQ)50030733633 | ||
035 | |a (Au-PeEL)EBL30733633 | ||
035 | |a (OCoLC)1396563397 | ||
040 | |a MiAaPQ |b eng |e rda |e pn |c MiAaPQ |d MiAaPQ | ||
050 | 4 | |a TK5101-5105.9 | |
100 | 1 | |a Bhushan, Bharat. | |
245 | 1 | 0 | |a 5G and Beyond. |
250 | |a 1st ed. | ||
264 | 1 | |a Singapore : |b Springer, |c 2023. | |
264 | 4 | |c ©2023. | |
300 | |a 1 online resource (311 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Springer Tracts in Electrical and Electronics Engineering Series | |
505 | 0 | |a Intro -- Preface -- Contents -- Editors and Contributors -- 1 Evolution of Next-Generation Communication Technology -- Introduction -- Existing Cellular Network and Its Challenges -- First Generation -- Second Generation -- Third Generation -- Fourth Generation -- Fifth Generation -- Conventional Cellular Systems-Limitations -- Vision and Mission-5G -- Architecture-5G -- C-Ran -- SBA-Based Core Network -- Next-Generation Network-Applications -- Example of Next-Generation Network Applications -- Conclusion and Future Scope -- References -- 2 Third Industrial Revolution: 5G Wireless Systems, Internet of Things, and Beyond -- Introduction -- IoT and Its Devices -- A 5G and IoT -- 5G and Ubiquitous Computing -- The Internet of Things -- A 5G Network -- History and Present Researches on IoT as Well as 5G -- Requirements of IoT and Shortcomings of Wireless 4G Network -- Needs for IoT that is 5G Enabled -- The Vision of 5G IOT: Industrial and Research Context -- Unification of Technologies -- Enabling Technology Drivers in 5G IoT -- Challenges and Trends of Future of the Research -- Conclusion and Future Scope -- Appendix 1: Wireless Technology Features -- Appendix 2: Information Speed Increment -- Appendix 3: 5G Network Architecture -- Appendix 4: 5G Tower Signals -- References -- 3 Network Architectures and Protocols for Efficient Exploitation of Spectrum Resources in 5G -- Introduction -- Enabler Technologies -- Architecture of 5G -- Multiple-Input Multiple-Output Technology in 5G -- Antenna Array for MIMO in 5G -- Device-to-Device Communication in 5G -- Interference Management for 5G -- Multi-tier 5G Architecture -- Spectrum Sharing with Cognitive Radio in 5G -- Ultra-dense Networks in Multi-radio Access Technology Association in 5G -- UDN Moving Cells with 5G+ Network -- Cloud Technologies for 5G -- Methodology. | |
505 | 8 | |a The Methodology of the Proposed Scheme -- Spectrum Band -- 5G Base Station -- Energy Module -- Energy Controller -- Challenges and Future Research Directions -- Conclusion -- References -- 4 Wireless Backhaul Optimization Algorithm in 5G Communication -- Introduction -- Network Scenarios and System Assumptions -- Analysis of Delay Jitter Indicators -- Delay Analysis -- Delay Jitter Analysis -- Optimization Model Establishments -- Basic Backhaul Model -- Improved Model 1 -- Improved Model 2 -- Improved Model Solutions -- Improved Model 1 Solution -- Improved Model 2 Solution -- Simulation Analysis -- Conclusions -- References -- 5 Security Attacks and Vulnerability Analysis in Mobile Wireless Networking -- Introduction -- Types of Wireless Mobile Network -- Wireless PAN -- Wireless LAN -- Manet -- Wireless MAN -- Wireless WAN -- Mobile Network -- Gan -- Aerospace Network -- Challenges and Issues in Wireless Mobile Network -- Information Management -- Endless Communication -- Delay Tolerance -- Heterogeneity -- Contextual Awareness -- Buffer Management -- Power Features -- Privacy and Security -- Security Goals of Wireless Mobile Network -- Classification of Security Attacks -- Most Prevalent Attacks in Wireless Systems -- Denial of Service (DoS) Attack -- Flooding Attack -- Jamming -- Intervention -- Sleep Deprivation Attack -- Blackhole Attack -- Rushing Attack -- Sybil Attack -- Sinkhole Attack -- Gray Hole Attack -- Byzantine Attack -- Jellyfish Attack -- Wormhole Attack -- Eavesdropping -- Disclosure of Information Attack -- Man-In-The-Middle Attack -- Replay Attack -- ACK Attack -- Spoofing Attack -- Link Spoofing Attack -- Spear-Phishing Attack -- Repudiation Attack -- Infected Code Injection -- Colluding Mis-Relay Attack -- Selective-Forwarding Attack -- Database Hack Attack -- Conclusion -- References. | |
505 | 8 | |a 6 Utilities of 5G Communication Technologies for Promoting Advancement in Agriculture 4.0: Recent Trends, Research Issues and Review of Literature -- Introduction -- Challenges Faced by Existing Network Technologies -- Motivation of the Work -- Existing Problems and Contribution -- Scope of 5G-Enabled Networks in AgriIoT -- Energy Consumption Management Methods in 5G Networks -- Application Areas of 5G in Smart Farming -- Data Aggregation -- Predictive Analytics -- Drone Operations -- Animal Tracking and Real-Time Monitoring -- Autonomous Agriculture Vehicles -- Weather Stations -- 5G Enabled Components in Agriculture -- Drones and Unmanned Aerial Vehicles (UAVs) -- Virtual Consultation and Predictive Maintenance -- Augmented and Virtual Reality -- Agriculture Robots -- Cloud-Based Data Analytics -- Recent Development Scenarios in 5G-Based Agriculture -- Conclusion and Future Work -- References -- 7 Security Attacks and Countermeasures in 5G Enabled Internet of Things -- Introduction -- Overview of 5G -- Overview of IoT -- 5G Enabled IoT -- 5G Enabled IoT Architecture -- L1 Physical Device Layer -- L2 Communication Layer -- L3 Fog Computing Layer -- L4 Data Storage Layer -- L5 Management Service Layer -- L6 Application Layer -- L7 Process and Collaboration Layer -- L8 Security Layer -- Technologies in 5G Enabled IoT -- Threat Analysis in 5G IoT -- Eavesdropping -- Contaminating -- Spoofing -- Jamming -- Physical Layer Security -- Trust Mechanism in WSN -- Crowdsourcing Analysis -- Attacks at the Architecture Level -- Current Research for 5G and IoT -- Future Research Directions and Challenges -- Characteristics Synthesis -- Signal Revoking -- Location Awareness -- Technical Challenges -- Wireless Software Defined Network -- Security Assurance and Privacy Analysis -- Standardization Issues -- Conclusion -- References. | |
505 | 8 | |a 8 Energy Efficiency and Scalability of 5G Networks for IoT in Mobile Wireless Sensor Networks -- Introduction -- Energy Efficiency in Mobile Wireless Sensor Networks -- Basic Concept of 5G Technology -- Evolution of 5G -- Frequency Band of 5G System -- 5G Innovative Technologies -- IoT Services Based on 5G -- IoT Industry Supported by 5G Technology -- Industry 4.0 -- Palpable Internet -- Security of IoT in 5G System -- Conclusion -- References -- 9 Security Services for Wireless 5G Internet of Things (IoT) Systems -- Introduction -- Inspiration and Ideas for 5G Based on IoT -- Structure of IoT in Cooperation with 5G -- Sensor Layer -- Network Layer -- Communication Layer -- Architecture Layer -- Application Layer -- Current Resolutions for Communication for IoT in 5G -- Bluetooth Low Energy (BLE) -- SigFox -- IEEE 802.15.4 -- LoRa -- Wi-Fi -- ZigBee -- NarrowBand IoT -- Challenges and Security Vulnerabilities -- Confidentiality and Safety -- Energy Efficacy -- Future Research Directions -- Structure of Network Based on Big Data -- 5G New Radio (NR): A New Wave-Form Design Consideration -- Energy Efficacy -- Interchange Between Communication, Gathering, and Computing -- Design of Synchronized Multi-Band, and High-Power Effective Amplifier -- Conclusion -- References -- 10 Securing the IoT-Based Wireless Sensor Networks in 5G and Beyond -- Introduction -- Literature Survey -- IoT-Based Wireless Networks -- Different Types of Attacks -- Perception Layer -- Abstraction Layer -- Network Layer -- Computing Layer -- Operation Layer -- Application Layer -- Importance of 5G -- Background -- Mathematical Explanation for Euclidean Distance -- Proposed Work -- Assumptions -- Creating Trial Data Sets -- Transmitting the Messages -- Analysis of the Proposal -- Security -- Conclusion -- References. | |
505 | 8 | |a 11 5G and Internet of Things-Integration Trends, Opportunities, and Future Research Avenues -- Introduction -- Overview of 5G -- Evolution of 5G -- Characteristics and Requirements of 5G Ecosystem -- 5G Architecture -- An Insight into IoT -- Characteristics of IoT -- Layered Architecture of IoT -- Requirements for 5G Integrated IoT Architecture -- Edge Layer of 5G IoT -- Network Layer of 5G IoT -- Application Layer of 5G IoT -- Blockchain-Based 5G IoT -- 5G IoT with Artificial Intelligence -- Opportunities of 5G Integrated IoT -- Technological Advancement -- Smart Cities -- Business -- Aerial and Satellite Research -- Mitigating Pandemic Situation -- Industrial Usage with Other Technologies -- Video Surveillance -- Challenges of 5G Integrated IoT -- General Challenges -- Heterogeneity of 5G and IoT Data -- Blockchain Integrating 5G IoT Issues -- 5G mm-Wave Issues -- Threat Protection of 5G IoT -- Conclusion -- References -- 12 Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks -- Introduction -- Emerging Cellular Networks -- 5G Overview -- Evolution of 6G/B5G Overview -- State-Of-The-Art -- Taxonomy of 6G/B5G Wireless Systems -- Security Services in 6G/B5G Wireless Networks -- Data Security Techniques for 5G Heterogeneous Networks -- Visual Secret Sharing -- Steganography -- Cryptographic Algorithms -- Key Management -- Overview and Fundamentals of Quantum Computing -- Architecture of Classical Computing Versus Quantum Computing -- Mathematical Representation for Quantum Computing -- The Impact of Quantum Computing on Modern Cryptography -- Quantum Algorithms Affecting Cryptosystems -- Post-Quantum Cryptography -- Mathematical View -- Post-Quantum Analysis -- Conclusion -- References -- 13 Enhanced Energy Efficiency and Scalability in Cellular Networks for Massive IoT -- Introduction. | |
505 | 8 | |a Literature Review. | |
588 | |a Description based on publisher supplied metadata and other sources. | ||
590 | |a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. | ||
655 | 4 | |a Electronic books. | |
700 | 1 | |a Sharma, Sudhir Kumar. | |
700 | 1 | |a Kumar, Raghvendra. | |
700 | 1 | |a Priyadarshini, Ishaani. | |
776 | 0 | 8 | |i Print version: |a Bhushan, Bharat |t 5G and Beyond |d Singapore : Springer,c2023 |z 9789819936670 |
797 | 2 | |a ProQuest (Firm) | |
830 | 0 | |a Springer Tracts in Electrical and Electronics Engineering Series | |
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=30733633 |z Click to View |