5G and Beyond.

Saved in:
Bibliographic Details
Superior document:Springer Tracts in Electrical and Electronics Engineering Series
:
TeilnehmendeR:
Place / Publishing House:Singapore : : Springer,, 2023.
©2023.
Year of Publication:2023
Edition:1st ed.
Language:English
Series:Springer Tracts in Electrical and Electronics Engineering Series
Online Access:
Physical Description:1 online resource (311 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 11865nam a22004933i 4500
001 50030733633
003 MiAaPQ
005 20240229073851.0
006 m o d |
007 cr cnu||||||||
008 240229s2023 xx o ||||0 eng d
020 |a 9789819936687  |q (electronic bk.) 
020 |z 9789819936670 
035 |a (MiAaPQ)50030733633 
035 |a (Au-PeEL)EBL30733633 
035 |a (OCoLC)1396563397 
040 |a MiAaPQ  |b eng  |e rda  |e pn  |c MiAaPQ  |d MiAaPQ 
050 4 |a TK5101-5105.9 
100 1 |a Bhushan, Bharat. 
245 1 0 |a 5G and Beyond. 
250 |a 1st ed. 
264 1 |a Singapore :  |b Springer,  |c 2023. 
264 4 |c ©2023. 
300 |a 1 online resource (311 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Springer Tracts in Electrical and Electronics Engineering Series 
505 0 |a Intro -- Preface -- Contents -- Editors and Contributors -- 1 Evolution of Next-Generation Communication Technology -- Introduction -- Existing Cellular Network and Its Challenges -- First Generation -- Second Generation -- Third Generation -- Fourth Generation -- Fifth Generation -- Conventional Cellular Systems-Limitations -- Vision and Mission-5G -- Architecture-5G -- C-Ran -- SBA-Based Core Network -- Next-Generation Network-Applications -- Example of Next-Generation Network Applications -- Conclusion and Future Scope -- References -- 2 Third Industrial Revolution: 5G Wireless Systems, Internet of Things, and Beyond -- Introduction -- IoT and Its Devices -- A 5G and IoT -- 5G and Ubiquitous Computing -- The Internet of Things -- A 5G Network -- History and Present Researches on IoT as Well as 5G -- Requirements of IoT and Shortcomings of Wireless 4G Network -- Needs for IoT that is 5G Enabled -- The Vision of 5G IOT: Industrial and Research Context -- Unification of Technologies -- Enabling Technology Drivers in 5G IoT -- Challenges and Trends of Future of the Research -- Conclusion and Future Scope -- Appendix 1: Wireless Technology Features -- Appendix 2: Information Speed Increment -- Appendix 3: 5G Network Architecture -- Appendix 4: 5G Tower Signals -- References -- 3 Network Architectures and Protocols for Efficient Exploitation of Spectrum Resources in 5G -- Introduction -- Enabler Technologies -- Architecture of 5G -- Multiple-Input Multiple-Output Technology in 5G -- Antenna Array for MIMO in 5G -- Device-to-Device Communication in 5G -- Interference Management for 5G -- Multi-tier 5G Architecture -- Spectrum Sharing with Cognitive Radio in 5G -- Ultra-dense Networks in Multi-radio Access Technology Association in 5G -- UDN Moving Cells with 5G+ Network -- Cloud Technologies for 5G -- Methodology. 
505 8 |a The Methodology of the Proposed Scheme -- Spectrum Band -- 5G Base Station -- Energy Module -- Energy Controller -- Challenges and Future Research Directions -- Conclusion -- References -- 4 Wireless Backhaul Optimization Algorithm in 5G Communication -- Introduction -- Network Scenarios and System Assumptions -- Analysis of Delay Jitter Indicators -- Delay Analysis -- Delay Jitter Analysis -- Optimization Model Establishments -- Basic Backhaul Model -- Improved Model 1 -- Improved Model 2 -- Improved Model Solutions -- Improved Model 1 Solution -- Improved Model 2 Solution -- Simulation Analysis -- Conclusions -- References -- 5 Security Attacks and Vulnerability Analysis in Mobile Wireless Networking -- Introduction -- Types of Wireless Mobile Network -- Wireless PAN -- Wireless LAN -- Manet -- Wireless MAN -- Wireless WAN -- Mobile Network -- Gan -- Aerospace Network -- Challenges and Issues in Wireless Mobile Network -- Information Management -- Endless Communication -- Delay Tolerance -- Heterogeneity -- Contextual Awareness -- Buffer Management -- Power Features -- Privacy and Security -- Security Goals of Wireless Mobile Network -- Classification of Security Attacks -- Most Prevalent Attacks in Wireless Systems -- Denial of Service (DoS) Attack -- Flooding Attack -- Jamming -- Intervention -- Sleep Deprivation Attack -- Blackhole Attack -- Rushing Attack -- Sybil Attack -- Sinkhole Attack -- Gray Hole Attack -- Byzantine Attack -- Jellyfish Attack -- Wormhole Attack -- Eavesdropping -- Disclosure of Information Attack -- Man-In-The-Middle Attack -- Replay Attack -- ACK Attack -- Spoofing Attack -- Link Spoofing Attack -- Spear-Phishing Attack -- Repudiation Attack -- Infected Code Injection -- Colluding Mis-Relay Attack -- Selective-Forwarding Attack -- Database Hack Attack -- Conclusion -- References. 
505 8 |a 6 Utilities of 5G Communication Technologies for Promoting Advancement in Agriculture 4.0: Recent Trends, Research Issues and Review of Literature -- Introduction -- Challenges Faced by Existing Network Technologies -- Motivation of the Work -- Existing Problems and Contribution -- Scope of 5G-Enabled Networks in AgriIoT -- Energy Consumption Management Methods in 5G Networks -- Application Areas of 5G in Smart Farming -- Data Aggregation -- Predictive Analytics -- Drone Operations -- Animal Tracking and Real-Time Monitoring -- Autonomous Agriculture Vehicles -- Weather Stations -- 5G Enabled Components in Agriculture -- Drones and Unmanned Aerial Vehicles (UAVs) -- Virtual Consultation and Predictive Maintenance -- Augmented and Virtual Reality -- Agriculture Robots -- Cloud-Based Data Analytics -- Recent Development Scenarios in 5G-Based Agriculture -- Conclusion and Future Work -- References -- 7 Security Attacks and Countermeasures in 5G Enabled Internet of Things -- Introduction -- Overview of 5G -- Overview of IoT -- 5G Enabled IoT -- 5G Enabled IoT Architecture -- L1 Physical Device Layer -- L2 Communication Layer -- L3 Fog Computing Layer -- L4 Data Storage Layer -- L5 Management Service Layer -- L6 Application Layer -- L7 Process and Collaboration Layer -- L8 Security Layer -- Technologies in 5G Enabled IoT -- Threat Analysis in 5G IoT -- Eavesdropping -- Contaminating -- Spoofing -- Jamming -- Physical Layer Security -- Trust Mechanism in WSN -- Crowdsourcing Analysis -- Attacks at the Architecture Level -- Current Research for 5G and IoT -- Future Research Directions and Challenges -- Characteristics Synthesis -- Signal Revoking -- Location Awareness -- Technical Challenges -- Wireless Software Defined Network -- Security Assurance and Privacy Analysis -- Standardization Issues -- Conclusion -- References. 
505 8 |a 8 Energy Efficiency and Scalability of 5G Networks for IoT in Mobile Wireless Sensor Networks -- Introduction -- Energy Efficiency in Mobile Wireless Sensor Networks -- Basic Concept of 5G Technology -- Evolution of 5G -- Frequency Band of 5G System -- 5G Innovative Technologies -- IoT Services Based on 5G -- IoT Industry Supported by 5G Technology -- Industry 4.0 -- Palpable Internet -- Security of IoT in 5G System -- Conclusion -- References -- 9 Security Services for Wireless 5G Internet of Things (IoT) Systems -- Introduction -- Inspiration and Ideas for 5G Based on IoT -- Structure of IoT in Cooperation with 5G -- Sensor Layer -- Network Layer -- Communication Layer -- Architecture Layer -- Application Layer -- Current Resolutions for Communication for IoT in 5G -- Bluetooth Low Energy (BLE) -- SigFox -- IEEE 802.15.4 -- LoRa -- Wi-Fi -- ZigBee -- NarrowBand IoT -- Challenges and Security Vulnerabilities -- Confidentiality and Safety -- Energy Efficacy -- Future Research Directions -- Structure of Network Based on Big Data -- 5G New Radio (NR): A New Wave-Form Design Consideration -- Energy Efficacy -- Interchange Between Communication, Gathering, and Computing -- Design of Synchronized Multi-Band, and High-Power Effective Amplifier -- Conclusion -- References -- 10 Securing the IoT-Based Wireless Sensor Networks in 5G and Beyond -- Introduction -- Literature Survey -- IoT-Based Wireless Networks -- Different Types of Attacks -- Perception Layer -- Abstraction Layer -- Network Layer -- Computing Layer -- Operation Layer -- Application Layer -- Importance of 5G -- Background -- Mathematical Explanation for Euclidean Distance -- Proposed Work -- Assumptions -- Creating Trial Data Sets -- Transmitting the Messages -- Analysis of the Proposal -- Security -- Conclusion -- References. 
505 8 |a 11 5G and Internet of Things-Integration Trends, Opportunities, and Future Research Avenues -- Introduction -- Overview of 5G -- Evolution of 5G -- Characteristics and Requirements of 5G Ecosystem -- 5G Architecture -- An Insight into IoT -- Characteristics of IoT -- Layered Architecture of IoT -- Requirements for 5G Integrated IoT Architecture -- Edge Layer of 5G IoT -- Network Layer of 5G IoT -- Application Layer of 5G IoT -- Blockchain-Based 5G IoT -- 5G IoT with Artificial Intelligence -- Opportunities of 5G Integrated IoT -- Technological Advancement -- Smart Cities -- Business -- Aerial and Satellite Research -- Mitigating Pandemic Situation -- Industrial Usage with Other Technologies -- Video Surveillance -- Challenges of 5G Integrated IoT -- General Challenges -- Heterogeneity of 5G and IoT Data -- Blockchain Integrating 5G IoT Issues -- 5G mm-Wave Issues -- Threat Protection of 5G IoT -- Conclusion -- References -- 12 Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks -- Introduction -- Emerging Cellular Networks -- 5G Overview -- Evolution of 6G/B5G Overview -- State-Of-The-Art -- Taxonomy of 6G/B5G Wireless Systems -- Security Services in 6G/B5G Wireless Networks -- Data Security Techniques for 5G Heterogeneous Networks -- Visual Secret Sharing -- Steganography -- Cryptographic Algorithms -- Key Management -- Overview and Fundamentals of Quantum Computing -- Architecture of Classical Computing Versus Quantum Computing -- Mathematical Representation for Quantum Computing -- The Impact of Quantum Computing on Modern Cryptography -- Quantum Algorithms Affecting Cryptosystems -- Post-Quantum Cryptography -- Mathematical View -- Post-Quantum Analysis -- Conclusion -- References -- 13 Enhanced Energy Efficiency and Scalability in Cellular Networks for Massive IoT -- Introduction. 
505 8 |a Literature Review. 
588 |a Description based on publisher supplied metadata and other sources. 
590 |a Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.  
655 4 |a Electronic books. 
700 1 |a Sharma, Sudhir Kumar. 
700 1 |a Kumar, Raghvendra. 
700 1 |a Priyadarshini, Ishaani. 
776 0 8 |i Print version:  |a Bhushan, Bharat  |t 5G and Beyond  |d Singapore : Springer,c2023  |z 9789819936670 
797 2 |a ProQuest (Firm) 
830 0 |a Springer Tracts in Electrical and Electronics Engineering Series 
856 4 0 |u https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=30733633  |z Click to View