Автор: Kanta Prasad Sharma, Shaurya Gupta, Ashish Sharma
Издательство: Wiley-Scrivener
Год: 2023
Страниц: 269
Язык: английский
Формат: pdf (true)
Размер: 16.2 MB
This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today.
In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change.
The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, Computer Science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography.
The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points:
Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies.
Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network.
Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today’s vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time.
This book discusses some of the critical security challenges facing the ever-evolving networking technologies of today. Chapter 1, 5G Technologies, Architecture and Protocols, presents the main elements in 5G core networks, security in 5G mobile networks, 5G radio access technology, frame structure, network virtualization, and slicing in 5G, which are the key areas of study in 5G technology. Chapter 2, Scope and Challenges of IoT and Blockchain Integration, focuses on the pros and cons of the integration of both the technology and existing platforms that are based on the alliance of IoT and blockchain platforms like Ethereum, Hyperledger, Lisk, and Slock.it, which are also explained along with their full functionality. Chapter 3, Data Communication and Information Exchange in Distributed IoT Environment based on IoT as a paradigm based totally on the internet that contains many interconnected technologies like radio frequency identity and Wi-Fi sensor and actor networks, to exchange data. Chapter 4, Contribution of Cloud-Based Services in Post-Pandemic Technology Sustainability and Challenges, focuses on the contribution of cloud technologies in agriculture, weather forecasting, medical image analysis, security, ICT, and entertainment, along with future application and utilities. This chapter also covers the various applications and tools used by different industrial areas supported by cloud computing. Chapter 5, Network Security in Evolving Networking Technologies: Developments and Future Directions, specifically relates to the network system’s security, privacy, integrity and availability of data information in the system. The challenge of network protection persists across all levels of the data network, and the purpose of network security is to protect the secrecy, transparency, integrity, stability, usability and auditability of the network. Chapter 6, The State of CDNs Today and What AI-Assisted CDN Means for the Future, points out the drawbacks of CDN, such as distributed denial of services attacks (DDoS), which are a serious concern for CDN.
Chapter 7, Challenges and Opportunities on the problem of the concept of smart cities, which is the need for better technologies to improve the system’s data transfer, the research gap there is a problem of trust as massive amounts of the private data of users are at stake, with hackers trying to gain access to it. Chapter 8, Role of IoT in Smart Homes and Offices, discusses the concept of smart offices and homes, which are a part of the smart building environment structure. The role of IoT and cloud computing in establishing communication amongst smart devices is also discussed. It further discusses the components of each technology and the areas of application along with covering future aspects and limitations. Chapter 9, Role of IoT in the Prevention of COVID-19, discusses the challenge currently facing the world, which is how to stop the expansion of the COVID-19 virus as the world is now facing the third wave of the disease, against which the WHO is regularly updating all of us to take precautions against. Chapter 10, Role of Satellites in Agriculture, provides critical reviews of the role of satellites in agriculture and how big data analysis can give amazing results; hence, contributing to the national economy. Further, the advantages and disadvantages along with the challenges that lie ahead are discussed and how the future of these technologies will help the agricultural sector. Chapter 11, Search Engine Evaluation Methodology, discusses how the evaluation concept is a key technology which is used to make continuous and smooth progress in the direction of constructing a better search engine. In the search engine evaluation process, the search engine’s performance is measured in respect to its efficiency and effectiveness. Chapter 12, Synthesis and Analysis of Digital IIR Filters for Denoising ECG Signal on FPGA, focuses on the conversion of MATLAB code of different designed IIR digital filters for demising ECG signal into Verilog code using HDL com- mand line interface. Spartan-6 FPGA (XC6SLX75T with 3FGG676 package) is used as a target device. Chapter 13, Neural Networks and Their Applications, discusses how our brain has ten billion cells, which are correspondingly called neurons, that process information as electric signals.
Audience:
This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management.
Contents:
Скачать Evolving Networking Technologies: Developments and Future Directions