000 | 02045cam a2200337 i 4500 | ||
---|---|---|---|
001 | 42838 | ||
003 | 0000000000 | ||
005 | 20240411193058.0 | ||
008 | 200729s2021 nyu s 000 0 eng | ||
010 | _a 2020943208 | ||
020 |
_a9781260460353 _q(hardcover) |
||
020 |
_z9781260460360 _q(ebook) |
||
035 | _a21633847 | ||
040 |
_aDLC _beng _erda _cDLC |
||
042 | _apcc | ||
050 | 0 | 0 |
_aTK5105.8857 _b.S54 2021 |
100 | 1 |
_aShajaiah, Haya, _eauthor. |
|
245 | 1 | 0 |
_aPerformance and security for the Internet of Things : _bemerging wireless technologies / _cHaya Shajaiah, Ph.D., Ahmed Abdelhadi, Ph.D., Charles Clancy, Ph.D. |
264 | 1 |
_aNew York : _bMcGraw-Hill, _c2021 |
|
300 |
_axv, 185 pages ; _c25 cm |
||
336 |
_atext _2rdacontent |
||
337 |
_acomputer _2rdamedia |
||
338 |
_aonline resource _2rdacarrier |
||
504 | _aIncludes bibliographical references (page 153-172) and index. | ||
520 | _aA hands-on guide and mathematical approach to tackling security challenges and overall performance issues in 5G-based IoT communications. The Internet of Things (IoT) provides connectivity and data exchange anytime and anywhere among a wide variety of physical objects such as sensors, vehicles, and mobile phones. This book is a concise guide to securing wireless IoT systems at the communications level, covering wireless spectrum sharing systems, smart grid communications, machine-to-machine communications, and uplink/downlink communications for IoT applications. The methods, optimization problems, mathematical solutions, algorithms, and programming codes in the book can be applied directly or extended as countermeasures for different IoT vulnerabilities | ||
650 | 0 | _aInternet of things. | |
700 | 1 |
_aAbdelhadi, Ahmed, _eauthor. |
|
700 | 1 |
_aClancy, Charles, _eauthor. |
|
856 | _uhttps://drive.google.com/drive/folders/1BLa88CpoRrObZIVmPFX5JKcizox1ukyW?usp=sharing | ||
999 |
_c12889 _d12889 |