Wireless Communications Security: Solutions for the Internet of Things Front Cover

Wireless Communications Security: Solutions for the Internet of Things

  • Length: 336 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2016-11-14
  • ISBN-10: 1119084393
  • ISBN-13: 9781119084396
  • Sales Rank: #3610964 (See Top 100 Books)
Description

The development of the wireless communications environment, especially as related to security, has been relatively stable compared to the issues of fixed Internet. Nevertheless, along with the enhanced functionalities of smart devices, networks and applications, the level of malicious attacks has increased considerably. It can be estimated that security attacks, distribution of viruses and other malicious activities increase in the wireless environment along with the higher number of users. Not only are payment activities, person-to-person communications and social media utilization under constant threat, but furthermore, one of the strongly increasing security risks is related to M2M (Machine-to-Machine) communications. This book describes the current and most probable future wireless security solutions. The focus is on the technical discussion of existing systems and new trends like Internet of Things (IoT). It also discusses existing and potential security threats, presents methods for protecting systems, operators and end-users, describes security systems attack types and the new dangers in the ever-evolving Internet. The book functions as a practical guide describing the evolvement of the wireless environment, and how to ensure the fluent continuum of the new functionalities, whilst minimizing the potential risks in network security.

Table of Contents

Chapter 1 Introduction
Chapter 2 Security of Wireless Systems
Chapter 3 Internet of Things
Chapter 4 Smartcards and Secure Elements
Chapter 5 Wireless Payment and Access Systems
Chapter 6 Wireless Security Platforms and Functionality
Chapter 7 Mobile Subscription Management
Chapter 8 Security Risks in the Wireless Environment
Chapter 9 Monitoring and Protection Techniques
Chapter 10 Future of Wireless Solutions and Security

To access the link, solve the captcha.