Reference Hub4
Indices1
Evolution of Software-Defined Networking Foundations for IoT and 5G Mobile Networks

Evolution of Software-Defined Networking Foundations for IoT and 5G Mobile Networks

Copyright: © 2021 |Pages: 235
ISBN13: 9781799846857|ISBN10: 1799846857|EISBN13: 9781799846864|ISBN13 Softcover: 9781799854395
DOI: 10.4018/978-1-7998-4685-7
Cite Book Cite Book

MLA

Kumar, Sunil, et al., editors. Evolution of Software-Defined Networking Foundations for IoT and 5G Mobile Networks. IGI Global, 2021. https://doi.org/10.4018/978-1-7998-4685-7

APA

Kumar, S., Trivedi, M. C., Ranjan, P., & Punhani, A. (Eds.). (2021). Evolution of Software-Defined Networking Foundations for IoT and 5G Mobile Networks. IGI Global. https://doi.org/10.4018/978-1-7998-4685-7

Chicago

Kumar, Sunil, et al., eds. Evolution of Software-Defined Networking Foundations for IoT and 5G Mobile Networks. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-4685-7

Export Reference

Mendeley
Favorite Full-Book Download

5G is the upcoming generation of the wireless network that will be the advanced version of 4G LTE+ providing all the features of a 4G LTE network and connectivity for IoT devices with faster speed and lower latency. The 5G network is going to be a service-oriented network, connecting billions of IoT devices and mobile phones through the wireless network, and hence, it needs a special emphasis on security. Security is the necessary enabler for the continuity of the wireless network business, and in 5G, network security for IoT devices is the most important aspect. As IoT is gaining momentum, people can remotely operate or instruct their network devices. Therefore, there is a need for robust security mechanisms to prevent unauthorized access to the devices.

Evolution of Software-Defined Networking Foundations for IoT and 5G Mobile Networks is a collection of innovative research on the security challenges and prevention mechanisms in high-speed mobile networks. The book explores the threats to 5G and IoT and how to implement effective security architecture for them. While highlighting topics including artificial intelligence, mobile technology, and ubiquitous computing, this book is ideally designed for cybersecurity experts, network providers, computer scientists, communication technologies experts, academicians, students, and researchers.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Wireless Technologies and Telecommunication (AWTT) Book Series
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
Related References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.