Advertisement

Introduction

  • Ramjee PrasadEmail author
  • Vandana Rohokale
Chapter
Part of the Springer Series in Wireless Technology book series (SSWT)

Abstract

Digitization is becoming the basis of future development in our society and economy. In today’s world, People, devices and machines are networked through wired or wireless means. Now is the era of Internet and smart mobile devices. Internet has touched every human being and has changed the way we perform our everyday activities like working, playing, shopping, seeing movies and serials, talking on the phone, listening to our favorite music, ordering food, paying bills, making friends, and greeting our friends and relatives on their special occasions. Due to this every time and everywhere connectivity, track of every user and the objects is possible using the IP address. At this point, users can not stop using Internet but they expect it to be secure, privacy preserving and trustworthy.

References

  1. Dholakiya JH, Jain VK (2001) Technologies for 3G wireless communications. In: International conference on information technology, coding and computing, pp 162–166Google Scholar
  2. Farley T, Van Der Hoek M (2006) Cellular telephone basics. Article posted on PrivatelineGoogle Scholar
  3. Glisic S, Lorenzo B (2009) Advanced wireless networks: cognitive, cooperative and opportunistic 4G technology, 2nd edn. Wiley PublicationsGoogle Scholar
  4. Honan M (2012) Wired magazine, gear. How apple and amazon security flaws led to my epic hacking. 8th June 2012. https://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/
  5. ITU-T (2017) ITU-T: committed to connecting the world, study group 17. Cybersecurity. https://www.itu.int/en/ITU-T/studygroups/com17/Pages/cybersecurity.aspx
  6. Ivanov I (2019) Cyber security and cyber threats: eagle vs ‘new wars’? Academia PublishingGoogle Scholar
  7. Kim Y-K, Prasad R (2005) 4G roadmap and emerging communication technologies. Artech House PublishersGoogle Scholar
  8. Mshvidobadze T (2012) Evolution mobil wireless communication and LTE networks. In: 6th international conference on application of information and communication technologies (AICT), pp 1–7Google Scholar
  9. O’Brien D (2018) The A to Z of cyber security. Symantech. https://medium.com/threat-intel/the-a-to-z-of-cyber-security-93150c4f336c
  10. Prasad R (2008) Keynote speech—wireless innovative system dynamic mega communications (WISDOM). In: First IEEE international workshop on cognitive radio and advanced spectrum IEEE CogArt’08Google Scholar
  11. Prasad R (2012) Future networks and technologies supporting innovative communications. In: Keynote speech in proceedings of IC-NIDCGoogle Scholar
  12. Prasad R (2014) 5G: 2020 and beyond. River Publisher Series in CommunicationsGoogle Scholar
  13. Prasad R, Munoz L (2003) WLANs and WPANs towards 4G wireless. The Artech House Universal Personal Communications, Boston, LondonGoogle Scholar
  14. Prasad R, Mohr W, Konhauser W (2000) Third generation mobile communication systems. Artech House PublishersGoogle Scholar
  15. Prasad R, Pruthi P, Ramareddy K (2009) The top 10 list for terabit speed wireless personal services. J Wirel Pers Commun. (Special issue on GIMCV)Google Scholar
  16. Rohokale V, Prasad R (2017) On-going and future breakthroughs in smart city developments. In: Ligthart L, Prasad R (eds) Role and importance of the cyber security for developing smart cities in India. River Publishers, pp 117–136Google Scholar
  17. Shah A, Ravi S (2018) A to Z of cyber crime. Asian School of Cyber Laws, Lexcode Education and Assessment Platform (LEAP)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Business Development and Technology, CTIF Global CapsuleAarhus UniversityHerningDenmark
  2. 2.Department of Electronics and TelecommunicationSinhgad Institute of Technology and SciencePuneIndia

Personalised recommendations