Reprint

Security and Privacy for Modern Wireless Communication Systems

Edited by
July 2023
308 pages
  • ISBN978-3-0365-8228-3 (Hardback)
  • ISBN978-3-0365-8229-0 (PDF)

This is a Reprint of the Special Issue Security and Privacy for Modern Wireless Communication Systems that was published in

Computer Science & Mathematics
Engineering
Summary

The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power-constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks.

Format
  • Hardback
License and Copyright
© 2022 by the authors; CC BY-NC-ND license
Keywords
propagation trends; social networks; group features; dilated CNN; machine learning; physical layer security; Rice channels; wireless communications; 6G security; sycon; cube attack; state recovery; wireless body area networks; authentication; biometric; physical unclonable function; BAN logic; RoR model; AVISPA; 6G wireless communications; chi-square; cybersecurity; intrusion detection system; machine learning techniques; meta-model; stacking ensemble learning; voting techniques; fault attack; error detection; code abiding; overcost; bitslice cipher; physical layer security; multiple eavesdroppers; full-duplex; underground mine; amplify-and-forward relay; communication system security; physical layer; wireless communication; precoding; wire-tap channel; blockchain; wireless communication network; malicious node; security protocol; intrusion detection; in-vehicle communication; inter-vehicle communication; optical communication; security wireless; visible light communication; wireless optical communication; convolutional neural network; CNN; counterfeit detection; device fingerprinting; distinct native attribute (DNA); information and communications technology; multiple discriminant analysis; MDA; WirelessHART; wireless communications security; blockchain; digital twin; Internet of Things; healthcare; encryption; privacy; rural; LPWAN; secure localization; positioning; distance vector hop; DV-Hop; security attacks; wireless sensor network; security; steganalysis; covert channel; steganography; undetectability; aggregator-based grouping; wireless sensor networks; encryption and decryption operations