000 03867nam a22005895i 4500
001 978-3-031-45605-3
003 DE-He213
005 20240423130228.0
007 cr nn 008mamaa
008 231120s2024 sz | s |||| 0|eng d
020 _a9783031456053
_9978-3-031-45605-3
024 7 _a10.1007/978-3-031-45605-3
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
100 1 _aDuo, Bin.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aSecuring Unmanned Aerial Vehicle Networks
_h[electronic resource] :
_bModels and Algorithms /
_cby Bin Duo, Xiaojun Yuan, Yifan Liu.
250 _a1st ed. 2024.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2024.
300 _aXIV, 123 p. 34 illus., 31 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Computer Science,
_x2191-5776
505 0 _a1 Overview -- 2 Air-to-Ground Channel Modeling and Generalized Algorithms -- 3 Securing UAV Networks for Rural Areas -- 4 Securing UAV Networks for Urban Areas -- 5 Securing UAV Networks for Dense Urban Areas -- 6 Conclusions and Open Issues.
520 _aThis book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view. The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book. .
650 0 _aComputer networks .
650 0 _aWireless communication systems.
650 0 _aMobile communication systems.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aTelecommunication.
650 1 4 _aComputer Communication Networks.
650 2 4 _aWireless and Mobile Communication.
650 2 4 _aMobile and Network Security.
650 2 4 _aCommunications Engineering, Networks.
700 1 _aYuan, Xiaojun.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aLiu, Yifan.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031456046
776 0 8 _iPrinted edition:
_z9783031456060
830 0 _aSpringerBriefs in Computer Science,
_x2191-5776
856 4 0 _uhttps://doi.org/10.1007/978-3-031-45605-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c186412
_d186412