Muutke küpsiste eelistusi

E-raamat: Security-Aware Device-to-Device Communications Underlaying Cellular Networks

  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user"s throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book. This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as

the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency.  This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks. 

Introduction.- Secure Data Transmission Protocol.- Joint Physical-application Layer Security.- Cooperation Stimulation.- Summary.
1 Introduction
1(14)
1.1 Overview of D2D Communications
1(7)
1.1.1 D2D Communications
1(1)
1.1.2 Application Scenario
2(1)
1.1.3 State-of-the-Art
3(5)
1.2 Security Issues
8(3)
1.2.1 Security Architecture
8(1)
1.2.2 Security Threats
9(1)
1.2.3 Security Requirements
10(1)
1.3 Organization
References
11(4)
2 Secure Data Transmission Protocol
15(16)
2.1 System Model
15(3)
2.1.1 Network Architecture
15(2)
2.1.2 Preliminaries
17(1)
2.2 Secure Data Transmission Protocol
18(5)
2.2.1 System Initialization
18(2)
2.2.2 Secure Data Transmission Protocol
20(3)
2.3 Performance Analysis
23(3)
2.3.1 Security Properties
23(1)
2.3.2 Overhead
24(2)
2.4 Discussions
26(2)
2.4.1 Certificateless Signature
26(1)
2.4.2 CLS-Based Data Transmission Protocol
27(1)
2.5 Conclusions
28(3)
References
3 Joint Physical-Application Layer Security
31(20)
3.1 Overview of Physical-Layer Security
31(9)
3.1.1 Secrecy Capacity
32(2)
3.1.2 Channel-Based Key Agreement
34(3)
3.1.3 Physical-Layer Authentication
37(3)
3.2 Physical-Layer Security for Wireless Multimedia Delivery
40(1)
3.2.1 Security Capacity
40(1)
3.2.2 Information Processing Approach
40(1)
3.3 Application-Layer Security for Wireless Multimedia Delivery
41(2)
3.3.1 Authentication
41(1)
3.3.2 Watermarking
42(1)
3.4 Joint Physical-Application Layer Security Scheme
43(3)
3.4.1 Framework Description
43(1)
3.4.2 Security-Aware Packetization
44(1)
3.4.3 Joint Scheme
45(1)
3.5 Conclusions and Outlook
46(1)
References
46(5)
4 Cooperation Stimulation
51(20)
4.1 System Model
52(2)
4.1.1 Network Architecture
52(1)
4.1.2 QoE Model
52(2)
4.2 Graph Models
54(4)
4.2.1 Basis of Graph Theory
54(2)
4.2.2 Candidate Graph Model
56(1)
4.2.3 Feasible Graph Model
56(2)
4.3 QoE-Driven Cooperation Stimulation
58(4)
4.3.1 Graph-Based Content Dissemination
58(4)
4.3.2 The Cooperative Content Dissemination Scheme
62(1)
4.4 Discussions
62(2)
4.5 Numerical Results
64(5)
4.5.1 Simulation Settings
65(1)
4.5.2 Simulation Results
65(4)
4.6 Conclusions
69(1)
References
69(2)
5 Summary
71
5.1 Summary of the Book
71(1)
5.2 Future Research Directions
72(1)
References
73