Professional Documents
Culture Documents
Performance and Security for the Internet of Things: Emerging Wireless Technologies Haya Shajaiah full chapter instant download
Performance and Security for the Internet of Things: Emerging Wireless Technologies Haya Shajaiah full chapter instant download
https://ebookmass.com/product/cellular-internet-of-
things-2e-technologies-standards-and-performance-2nd-ed-edition-
bergman/
https://ebookmass.com/product/the-internet-of-things-john-davies/
https://ebookmass.com/product/micropython-for-the-internet-of-
things-2nd-edition-charles-bell/
5G Wireless Network Security and Privacy Dongfeng Fang
https://ebookmass.com/product/5g-wireless-network-security-and-
privacy-dongfeng-fang/
https://ebookmass.com/product/chemical-gas-and-biosensors-for-
internet-of-things-and-related-applications-kohji-mitsubayashi/
https://ebookmass.com/product/internet-of-things-1st-edition-raj-
kamal/
https://ebookmass.com/product/internet-of-multimedia-things-iomt-
techniques-and-applications-shailendra-shukla/
https://ebookmass.com/product/connecting-the-internet-of-things-
iot-connectivity-standards-and-solutions-anil-kumar/
Copyright © 2021 by McGraw Hill. All rights reserved. Except as
permitted under the United States Copyright Act of 1976, no part of
this publication may be reproduced or distributed in any form or by
any means, or stored in a database or retrieval system, without the
prior written permission of the publisher.
ISBN: 978-1-26-046036-0
MHID: 1-26-046036-3
The material in this eBook also appears in the print version of this
title: ISBN: 978-1-26-046035-3, MHID: 1-26-046035-5.
TERMS OF USE
1 Introduction
1.1 Motivation and Background
1.2 Security and Performance Challenges in IoT
Communications
1.2.1 IoT Spectrum Sharing Systems
1.2.2 Smart Grid Communications
1.2.3 Uplink and Downlink Communications for IoT
Applications
1.2.4 M2M Communications
1.3 Previous Studies in Performance and Security of IoT
Communications
1.4 Overview
1.5 Book Organization
I
would like to thank my Ph.D. advisor Prof. T. Charles Clancy and
Dr. Ahmed Abdelhadi, my Ph.D. mentor and currently assistant
professor at the University of Houston, for co-authoring this book
with me and for all their support, advice, help, and guidance. I
would not have accomplished this work without their vision and
support. I also thank my colleagues Dr. Avik Sengupta and Dr.
Akshay Kumar for contributing to some chapters of this book.
I thank all my family members for their support and
encouragement. I would like to express my gratitude to my beloved
husband, Dr. Islam Younis, for his constant love, support, and
encouragement. I have to admit that this work would not have been
possible without Islam's support and love. I would also like to
express my gratitude to my parents, Dr. Jamal Nouh Shajaiah and
Amal Okab, for their encouragement, support, unconditional love,
and care. I thank my beloved son Rasem and my beloved daughters
Tayma and Yara for the love and happiness they bring to me every
day.
Haya Shajaiah, Ph.D.
Acronyms
AS Application server
BS Base station
CA Carrier aggregation
CCs Component carriers
CSL Conventional spectrum leasing
DDoS Distributed denial-of-service
eNodeB Evolve node B
EPUs Electric power units
FCC Federal Communications Commission
4G Fourth generation
IDS Intrusion detection scheme
IoT Internet of Things
LAP Local access point
LTE Long-Term Evolution
M2M Machine-to-machine
MAs Multiple M2M aggregators
MCD Modified Canberra distance
MDS Maximum distance separable
MTSSA-
MTSSA with fixed limit
FL
NBP National Broadband Plan
President's Council of Advisors on Science and
PCAST
Technology
SAP Small cell access point
SM Smart meter
UE User equipment
VCG Vickrey-Clarke-Groves
WSPs Wireless system providers
CHAPTER 1
Introduction
Haya Shajaiah and Ahmed
AbdeIhadi
T
he Internet of Things (IoT) is a network of dedicated physical
objects that involves embedded technology used to interact with
internal or external environments. IoT is expected to provide
connectivity and information exchange anytime and anywhere
among a wide variety of physical objects such as sensors, vehicles,
and mobile phones [1-4]. IoT is provisioned as a fully connected
network paradigm, which is envisioned to create a bridge between
machine-type communications (MTCs) and wireless data networks
[5]. IoT is a system that includes things, communication, data
analysis, and applications. It involves a massive number of objects
connected to the Internet [6, 7]. These objects communicate with
each other while there are heterogeneous architectures, which
challenge the ability to secure IoT communications. Other challenges
include reducing the power consumption and minimizing the
utilization of resources. IoT applications are found in many fields
such as medicine, for example, monitoring patients' pulse rates to
keep track of the data and send it to the doctor, industrial plants; for
example, quality control, smart cities; for example, bus on the way
signals, fitness equipment; for example, keep track of calories to be
burnt, and home automation; for example, control of home or room
temperature. In IoT, wireless sensor networks are used to sense the
objects and send the data through communication channels, which
may lead to security issues [8,9]. Security challenges in IoT
communications need to be taken into consideration for the design
of IoT architectures and protocols [10,11].