Narrow your search

Library

KDG (41)

AP (40)

KU Leuven (23)

Odisee (23)

Thomas More Kempen (23)

Thomas More Mechelen (23)

ULiège (23)

VIVES (23)

ULB (22)

UCLL (20)

More...

Resource type

book (40)

digital (40)


Language

English (77)


Year
From To Submit

2024 (4)

2023 (7)

2022 (2)

2021 (2)

2020 (6)

More...
Listing 11 - 20 of 77 << page
of 8
>>
Sort by

Book
Blockchain-Based Data Security in Heterogeneous Communications Networks
Authors: ---
ISBN: 3031524772 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book investigates data security approaches in Heterogeneous Communications Networks (HCN). First, the book discusses the urgent need for a decentralized data management architecture in HCN. The book investigates preliminaries and related research to help readers obtain a comprehensive picture of the research topic. Second, the book presents three blockchain-based approaches for data management in HCN: data provenance, data query, and data marketing. Finally, based on the insights and experiences from the presented approaches, the book discusses future research directions. Discusses the need for decentralized data security approaches in heterogeneous communications networks (HCN); Presents solutions applicable and practical for real-world applications; Investigates HCN data security approaches such as reliable data provenance, transparent data query, and fair data marketing.


Book
Decentralized Privacy Preservation in Smart Cities
Authors: ---
ISBN: 3031540751 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book investigates decentralized trust-based privacy-preserving solutions in smart cities. The authors first present an overview of smart cities and privacy challenges and discuss the benefits of adopting decentralized trust models in achieving privacy preservation. The authors then give a comprehensive review of fundamental decentralized techniques and privacy-preserving cryptographic techniques. The next four chapters each detail a decentralized trust-based scheme, focusing respectively on privacy-preserving identity management, cross-domain authentication, data analytics, and data search, in specific use cases. Finally, the book explores open issues and outlines future research directions in the field of decentralized privacy preservation. Discusses benefits and challenges of applying decentralized trusts in smart cities Provides scheme designs and security analysis for use cases in smart cities, offering insights into applications Includes cryptographic knowledge accompanied by practical algorithm and protocol implementations.


Book
Mobile Electric Vehicles : Online Charging and Discharging
Authors: --- ---
ISBN: 3319251287 3319251309 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book examines recent research on designing online charging and discharging strategies for mobile electric vehicles (EVs) in smart grid. First, the architecture and applications are provided. Then, the authors review the existing works on charging and discharging strategy design for EVs. Critical challenges and research problems are identified. Promising solutions are proposed to accommodate the issues of high EV mobility, vehicle range anxiety, and power systems overload. The authors investigate innovating charging and discharging potentials for mobile EVS based on real-time information collections (via VANETS and/or cellular networks) and offer the power system adjustable load management methods.  Several innovative charging/discharging strategy designs to address the challenging issues in smart grid, i.e., overload avoidance and range anxiety for individual EVs, are presented. This book presents an alternative and promising way to release the pressure of the power grid caused by peak-time EV charging demand. Mobile Electric Vehicles: Online Charging and Discharging provides valuable insights on charging/ discharging strategy design for mobile EVs and the power system management in a smart grid. The authors’ findings indicate that the proposed strategies considerably outperform the traditional EV charging strategies without real-time collections on the metrics of the overall energy utilizat ion, the average EV travel cost and the number of successfully charged EVs. Research and graduate students who are working on smart grid and vehicular communication will find this book a valuable resource.  Customs and systems operators will also find this book useful. .

Keywords

Electrical Engineering --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Electric vehicles --- Electric automobiles --- Smart power grids. --- Power supply. --- Automobiles, Electric --- Electric cars --- EVs (Electric vehicles) --- Vehicles, Electric --- Smart grids (Electric power distribution) --- Grids, Smart power --- Power grids, Smart --- Electric power distribution --- Automobiles --- Motor vehicles --- Automation --- Telecommunication. --- Computer Communication Networks. --- Information systems. --- Communications Engineering, Networks. --- Information Systems and Communication Service. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Electrical engineering. --- Computer communication systems. --- Computers. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Electric engineering --- Engineering --- Distributed processing


Book
Resource Management for Heterogeneous Wireless Networks
Authors: ---
ISBN: 3319642685 3319642677 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides an in-depth discussion on how to efficiently manage resources of heterogeneous wireless networks and how to design resource allocation algorithms to suit real world conditions. Efficiently managing resources of the networks is more crucial now, than ever before, to meet users’ rapidly increasing demand for higher data rates, better quality-of-service (QoS) and seamless coverage. Some of the techniques that can be incorporated within heterogeneous wireless networks to achieve this objective are interworking of the networks, user multi-homing and device-to-device (D2D) communication.  Designing resource allocation algorithms to suit real world conditions is also important, as the algorithms should be deployable and perform well in real networks. For example, two of the conditions considered in this book are resource allocation intervals of different networks are different and small cell base stations have limited computational capacity. To address the first condition, resource allocation algorithms for interworking systems are designed to allocate resources of different networks at different time-scales. To address the second condition, resource allocation algorithms are designed to be able to run at cloud computing servers. More of such conditions, algorithms designed to suit these conditions, modeling techniques for various networks and performance analysis of the algorithms are discussed in the book.   This book concludes with a discussion on the future research directions on the related fields of study. Advanced-level students focused on communication and networking will use this book as a study guide. Researchers and experts in the fields of networking, converged networks, small-cell networks, resource management, and interference management, as well as consultants working in network planning and optimization and managers, executives and network architects working in the networking industry will also find this book useful as a reference.

Keywords

Radio resource management (Wireless communications) --- Heterogeneous distributed computing systems. --- Distributed computational systems, Heterogeneous --- Distributed computer systems, Heterogeneous --- Distributed computing systems, Heterogeneous --- Distributed heterogeneous computer systems --- Distributed heterogeneous computing systems --- HeDCSs (Heterogeneous distributed computing systems) --- Heterogeneous computer systems, Distributed --- Heterogeneous computing systems, Distributed --- Heterogeneous distributed computational systems --- Heterogeneous distributed computer systems --- Wireless communications resource management --- Engineering. --- Computer communication systems. --- Electrical engineering. --- Communications Engineering, Networks. --- Computer Communication Networks. --- Computer systems --- Electronic data processing --- Resource allocation --- Wireless communication systems --- Distributed processing --- Management --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Electric engineering --- Engineering


Book
Privacy-Enhancing Fog Computing and Its Applications
Authors: --- ---
ISBN: 3030021130 3030021122 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief. .


Book
Secure automatic dependent surveillance-broadcast systems
Authors: --- ---
ISBN: 3031070216 3031070208 Year: 2023 Publisher: Cham, Switzerland : Springer,


Book
Security in Smart Home Networks
Authors: --- ---
ISBN: 3031241851 3031241843 Year: 2023 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network. Discusses securing IoT-driven smart home networks on the mobile device, user interface, and application platform. Provides thorough security analysis, existing countermeasures, and proposed novel solutions for each component. Includes a comprehensive full-stack sight view of smart home’s security and privacy issues.


Digital
Mobile Electric Vehicles : Online Charging and Discharging
Authors: --- ---
ISBN: 9783319251301 Year: 2016 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book examines recent research on designing online charging and discharging strategies for mobile electric vehicles (EVs) in smart grid. First, the architecture and applications are provided. Then, the authors review the existing works on charging and discharging strategy design for EVs. Critical challenges and research problems are identified. Promising solutions are proposed to accommodate the issues of high EV mobility, vehicle range anxiety, and power systems overload. The authors investigate innovating charging and discharging potentials for mobile EVS based on real-time information collections (via VANETS and/or cellular networks) and offer the power system adjustable load management methods.  Several innovative charging/discharging strategy designs to address the challenging issues in smart grid, i.e., overload avoidance and range anxiety for individual EVs, are presented. This book presents an alternative and promising way to release the pressure of the power grid caused by peak-time EV charging demand. Mobile Electric Vehicles: Online Charging and Discharging provides valuable insights on charging/ discharging strategy design for mobile EVs and the power system management in a smart grid. The authors’ findings indicate that the proposed strategies considerably outperform the traditional EV charging strategies without real-time collections on the metrics of the overall energy utilizat ion, the average EV travel cost and the number of successfully charged EVs. Research and graduate students who are working on smart grid and vehicular communication will find this book a valuable resource.  Customs and systems operators will also find this book useful. .


Digital
Privacy-Enhancing Fog Computing and Its Applications
Authors: --- ---
ISBN: 9783030021139 Year: 2018 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief. .

Listing 11 - 20 of 77 << page
of 8
>>
Sort by