This book introduces two basic big data processing paradigms for batch data and streaming data. Representative programming frameworks are also presented, as well as software defined networking (SDN) and network function virtualization (NFV) technologies as key cloud networking technologies.
The authors illustrate that SDN and NFV can be applied to benefit the big data processing by proposing a cloud networking framework. Based on the framework, two case studies examine how to improve the cost efficiency of big data processing.
Cloud Networking for Big Data
targets...
This book introduces two basic big data processing paradigms for batch data and streaming data. Representative programming frameworks are also pres...
This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile Healthcare Network (MHN) architecture and its diverse applications, and reviews the existing works on security and privacy for MHNs. Critical future challenges and research problems are also identified.
Using a Quality-of-Protection perspective, the authors provide valuable insights on security and privacy preservation for MHNs. Some promising solutions are proposed to accommodate the issues of secure health data transmission,...
This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobi...
This book examines recent research on designing online charging and discharging strategies for mobile electric vehicles (EVs) in smart grid. First, the architecture and applications are provided. Then, the authors review the existing works on charging and discharging strategy design for EVs. Critical challenges and research problems are identified. Promising solutions are proposed to accommodate the issues of high EV mobility, vehicle range anxiety, and power systems overload.
The authors investigate innovating charging and discharging potentials for mobile EVS based on real-time...
This book examines recent research on designing online charging and discharging strategies for mobile electric vehicles (EVs) in smart grid. First,...
This book covers a series of security and privacy issues in network coding, and introduces three concrete mechanisms to address them. These mechanisms leverage traditional cryptographic primitives and anonymous protocols, and are redesigned to fit into the new framework of network coding. These three mechanisms are MacSig, a new message authentication method for network-coded systems; P-Coding, a new encryption scheme to secure network-coding-based transmissions; and ANOC, a new anonymous routing protocol that seamlessly integrates anonymous routing with network coding. Along with these...
This book covers a series of security and privacy issues in network coding, and introduces three concrete mechanisms to address them. These mechanisms...
This book provides an overview of Moving Target Defense (MTD) and the importance of developing novel MTD schemes to protect distributed systems. It presents MTD-based research efforts to protect cloud data centers, along with network and security risk-aware approaches to place Virtual Machines (VM) in cloud data centers. These approaches include MTD-based network diversity models that enable an evaluation of the robustness of cloud data centers against potential zero-day attacks. Since these models can be used as a security metric the authors include different network configurations and...
This book provides an overview of Moving Target Defense (MTD) and the importance of developing novel MTD schemes to protect distributed systems. It pr...
This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters...
This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It ...
Following underwater acoustic channel modeling, this book investigates the relationship between coherence time and transmission distances. It considers the power allocation issues of two typical transmission scenarios, namely short-range transmission and medium-long range transmission. For the former scenario, an adaptive system is developed based on instantaneous channel state information. The primary focus is on cooperative dual-hop orthogonal frequency division multiplexing (OFDM).This book includes the decomposed fountain codes designed to enable reliable communications with higher energy...
Following underwater acoustic channel modeling, this book investigates the relationship between coherence time and transmission distances. It consider...
This book provides an overview of security and privacy issues in smart grid communications, as well as the challenges in addressing these issues. It also introduces several privacy enhancing aggregation techniques including multidimensional data aggregation, subset data aggregation, multifunctional data aggregation, data aggregation with fault tolerance, data aggregation with differential privacy, and data aggregation with integrity protection. Offering a comprehensive exploration of various privacy preserving data aggregation techniques, this book is an exceptional resource for the...
This book provides an overview of security and privacy issues in smart grid communications, as well as the challenges in addressing these issues. It a...
This book examines the interaction between the technical and economic issues in database-assisted dynamic spectrum networks. It explains various business models for different network settings, analyzing the user behaviors and system equilibrium under each model. With the explosive growth of mobile devices and bandwidth-hungry applications, radio spectrum is becoming increasingly congested and scarce. Database-assisted dynamic spectrum sharing is a promising technology for solving the problem of spectrum scarcity and congestion by allowing unlicensed mobile devices to dynamically access...
This book examines the interaction between the technical and economic issues in database-assisted dynamic spectrum networks. It explains various busin...
This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast.
This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for ...