000
|
|
nam5i |
001
|
|
2210080933424 |
003
|
|
DE-He213 |
005
|
|
20250321102053 |
007
|
|
cr nn 008mamaa |
008
|
|
231120s2024 sz | s |||| 0|eng d |
020
|
|
▼a9783031456053▼9978-3-031-45605-3 |
024
|
|
▼a10.1007/978-3-031-45605-3▼2doi |
040
|
|
▼a221008 |
050
|
|
▼aTK5105.5-5105.9 |
072
|
|
▼aUKN▼2bicssc |
072
|
|
▼aCOM043000▼2bisacsh |
072
|
|
▼aUKN▼2thema |
082
|
|
▼a004.6▼223 |
100
|
|
▼aDuo, Bin.▼eauthor.▼4aut▼4http://id.loc.gov/vocabulary/relators/aut |
245
|
00 |
▼aSecuring Unmanned Aerial Vehicle Networks▼h[electronic resource] :▼bModels and Algorithms /▼cby Bin Duo, Xiaojun Yuan, Yifan Liu. |
250
|
|
▼a1st ed. 2024. |
264
|
|
▼aCham :▼bSpringer Nature Switzerland :▼bImprint: Springer,▼c2024. |
300
|
|
▼aXIV, 123 p. 34 illus., 31 illus. in color.▼bonline resource. |
336
|
|
▼atext▼btxt▼2rdacontent |
337
|
|
▼acomputer▼bc▼2rdamedia |
338
|
|
▼aonline resource▼bcr▼2rdacarrier |
347
|
|
▼atext file▼bPDF▼2rda |
490
|
|
▼aSpringerBriefs in Computer Science,▼x2191-5776 |
505
|
|
▼a1 Overview -- 2 Air-to-Ground Channel Modeling and Generalized Algorithms -- 3 Securing UAV Networks for Rural Areas -- 4 Securing UAV Networks for Urban Areas -- 5 Securing UAV Networks for Dense Urban Areas -- 6 Conclusions and Open Issues. |
520
|
|
▼aThis book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view. The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book. . |
650
|
|
▼aComputer networks . |
650
|
|
▼aWireless communication systems. |
650
|
|
▼aMobile communication systems. |
650
|
|
▼aComputer networks▼xSecurity measures. |
650
|
|
▼aTelecommunication. |
650
|
|
▼aComputer Communication Networks. |
650
|
|
▼aWireless and Mobile Communication. |
650
|
|
▼aMobile and Network Security. |
650
|
|
▼aCommunications Engineering, Networks. |
700
|
|
▼aYuan, Xiaojun.▼eauthor.▼4aut▼4http://id.loc.gov/vocabulary/relators/aut |
700
|
|
▼aLiu, Yifan.▼eauthor.▼4aut▼4http://id.loc.gov/vocabulary/relators/aut |
710
|
|
▼aSpringerLink (Online service) |
773
|
|
▼tSpringer Nature eBook |
776
|
|
▼iPrinted edition:▼z9783031456046 |
776
|
|
▼iPrinted edition:▼z9783031456060 |
830
|
|
▼aSpringerBriefs in Computer Science,▼x2191-5776 |
856
|
|
▼uhttps://doi.org/10.1007/978-3-031-45605-3 |
912
|
|
▼aZDB-2-SCS |
912
|
|
▼aZDB-2-SXCS |
950
|
|
▼aComputer Science (SpringerNature-11645) |
950
|
|
▼aComputer Science (R0) (SpringerNature-43710) |