Technology is playing the most crucial role in the advancement of the way of life living for the individuals in the present time and it has been become the integral part of the life for every almost every individual. Wireless technology is one of the innovation that has been spreading in the world in rapid rate and almost every individual is connected to the internet via wireless network in manner to gain more and more advantage. The world is getting better through the application of such advanced technologies that is helpful in eliminating the human efforts and providing innovative applications and facilities that can introduce and connect the real and virtual world at the same platform.
Despite of these advantageous factors, there is always some bas cause of good application and hence, same is attached with the application of such technologies in the real world. There are certain security threats and challenges those might influence the overall influence of the wireless technology application in the real world. These threats could lead to the expose of the privacy and security and hence, could make it less acceptable for the individuals using technology for future application. However, many researchers have identified that the tech companies are spending lots of money in the enhancement of the security of technology make them ore secured.
The purpose of this report is to highlight on the aspects related to the current trending technologies and how these are contributing in the development of the present world. This report will be emphasizing on the emerging long range and short range communication technologies, their application, challenges, and security issues in the real world application. Threats and vulnerabilities are major concern on the application of this technology and it has been also expressed in this report.
Long Term Evolution or LTE has been the leading technology that offers next-generation mobile broadband services to the customers since the time of its inception. The evolution of this wireless broadband technology has been driven by the demand of the customers and consumers for increased speed, global access and bandwidth. With the evolution of time, the customers engaged more and more in mobile technology, demanding more and more access to the business and consumer applications, and even more access to the entertainment world; demanding every need to be fulfilled through their mobile devices and in tremendous speed (Han et al. 2014). Therefore, the wireless carrier networks required to function as the landline based IP networks to acquire this tremendous speed and equally pervasive connectedness. LTE makes mobile connectivity enter the world of fourth generation or 4G wireless networks, which possesses the features of a wireless broadband network (Jacobsson, Boldt and Carlsson 2016). It is based on TCP/IP or Transmission Control Protocol/Internet Protocol, which forms the core internet protocol.
There are several benefits of LTE networks that makes it reach to the highest demand amongst telecommunication networks. The LTE networks provide the connectivity on a global ecosystem along with the inherent mobility. It offers ease of access and usability offering an evolved technology providing greater privacy and data security. The latency and speed of the network is also tremendous compared to the other telecommunication networks providing a much higher quality of overall experience for the customers (Kumar 2014). As a result, mobile computing experience is much more increased in quality for the consumers. Since, the mobile communication technology provides low latency as an enhanced feature; it helps in providing support for handling high-performance real-time applications. LTE has a much improved spectral efficiency; as a result, it also has a reduced cost per bit.
If the long-range communication technologies are considered, LTE connections possess all the features that should ideally be present in a wireless broadband network providing long range communications. Ideally, a long range communication technology should have a much decreased operation expenses although providing much more capacity, global coverage and safer public usage capabilities. Analyzing the LTE connections and their features, the supportive bandwidths of LTE provides flexible carriers from 5MHz up to 20MHz (Labib et al. 2016). This provides a huge range of device support, enabling almost any kind of device to be connected via LTE telecommunications. Not only mobile phones, but computers and other consumer electronic devices, such as ultra-portable devices, gaming devices, notebooks and cameras are also capable to incorporate the embedded modules of LTE connectivity. Ubiquitous mobile connectivity is also supported by this connection as well. All this is achievable at a much lower range of costing, for both the service providers and the consumers (Lee and Lee 2015). Thus, this can be concluded easily that LTE is an emerging connectivity providing a long range of connectivity service to the consumers at a global range. It has been found that out of the consumers who have been using broadband connections, two-thirds of them have invested in mobile broadband connections with LTE services. Therefore, since the time of its inception, LTE has been successful in meeting the needs of the consumers at a large extend.
5G, the fifth generation of wireless networks is noticeably faster than that of the wireless network services provided by the fourth generation or 4G networks. Although the term 5G is nebulous enough, its first formal standard has been presented on December 2017 (Osseiran et al. 2014). It operates on a much higher level of spectrum providing wireless broadband connections between the ranges of 30 GHz to 300 GHz (Ransing and Rajput 2015). This spectrum range is known as the millimeter wave spectrum. The millimeter wave spectrum helps in transferring a pile load of data in tremendous speed. However, there is a limitation found in these waves. These millimeter waves do not propagate as far as the 4G networks, which is due to the lower frequency waves that the 4G networks use. Analyzing the 5G networking models, it was also found that the networking connectivity finds difficulty in propagating through built-around walls, large building and obstacles in general. In comparison to LTE/4G networks, this is a huge setback as even though 4G/LTE networks serve at a much lower frequency, these networks do not face difficulty in passing through and around obstacles like these (Sivaraman et al. 2015). In addition to that, in order to receive the same network coverage with 5G connections as with the current service providers, it requires a huge number of antennas in comparison with the contemporary network capabilities.
5G network connectivity is often found to be extensively fickle, given the millimeter wave signal frequency it uses. The 30 GHz to 300 GHz range is an excessively unstable range of network and thus, few service providers for 5G network connections have opted to utilize a sub-6GHz range, to establish a much more stabilized connectivity.
Therefore, it can be said that the 5G network connection is still in its nascent stages. It may possess much faster speed for connectivity, but long-range of broadband service can still be problematic given the range of frequency it uses for propagation of connections for consumers to use.
The futuristic evolution of 4G networks are on the verge of implementing a massive expansion in the world of Internet of Things or IoT. The feasible implementation of deploying dense networks over global ranges has helped in calculating a huge number of IoT data that have been helpful in making out the data alarms and health monitors. The entire range of broadband speed for mobile would expand exponentially, enabling the real-time casting and efficient broadcasting over various connective devices all at once (Vangelista, Zanella and Zorzi 2015). It is assumed that network slicing can form a paving way in the 4G roadmap. Network slicing is the way by which virtual instances for networks are created and that are able to be optimized for the delivery of each of these services. The Quality of Service, Network Function Virtualization and Software Defined Networks are also assumed to be a revolutionary futuristic application for LTE networks.
Since, 5G is focusing on a global launch by the year 2020; it has got an ambitious timeline based on the features that the network provides for long-range technologies. It is assumed that 5G networks have been focusing on services that are expandable beyond the use of mobile devices and Smartphone. It is aiming to replace the traditional wireless broadband services and enable DirectTV connections (Wilson, Hargreaves and Hauxwell-Baldwin 2015). However, these long-range and long term plans are still under tests before the networks are standardized.
NFC or Near Field Communication is defined as the short-ranged wireless technology that is used generally to pay for digital exchanges and retail transactions. The short-range technology enables the technology for Internet of Things or IoT in being utilized for increasing the safety, automation and efficiency of everyday tasks of a human being. A smart home, which forms a general inclusion of smart cities, uses IoT features like the NFC with different combinations. The combination is utilized to develop several special light fixtures, creating a much more programmable, automated and efficient smart homes. It is necessary that simplicity and convenience are heavily included in smart home applications. Technology developers are very keen on including these features in that of a smart home technology (Ghazal and Al-Khatib 2015). To take the case of NFC in particular, it has an open forum called the NFC Forum, that invests into utilize the NFC into ease of access for customers. It generates new ideas that would make NFC utilize its full prowess making IoT devices easier to use and controllable. NFC forms a really fast and intuitive technology that lets the use of a simple touch to generate secure interactions of a user with his or her world around. This short range of connectivity networks enables a user to manage simple house hold work with the utilization of a simple touch. The technology of NFC utilizes its features of connecting, commissioning, controlling and detailing to make the use of smart homes really easy for the people.
Zigbee is another short-ranged technology used for smart homes. It was first utilized when energy costs for the daily activities inside a home spiraled up. The only utility of smart homes was introduced to lower the utility bills of household appliances. The smartest possible way to apply the cost cutting is to manage all the home appliances and HVAC devices or Heating, Ventilating and Air-Conditioned units by installing remote-operated technology. It would not only save time and effort, but also consume a less amount of energy and would be able to manage multiple devices with a single unit.
The desired level of efficiency is not seen nowadays with the utilization of the regular switches, therefore, it is justified that Ethernet protocols be used instead. The use of power efficient methodologies are assumed to be more practical, and that is why, the use of Smartphone apps or any web tool are perceived as feasible enough (Furht and Ahson 2016). ZigBee is one of these home automation systems that has specific advantages since it utilizes high communication protocols. The protocols use low-power, low data rated and digital radios based on IEEE 802.15.4 standards for wireless personal area networks (Darby 2018).
For example, the wireless headphones that are connected with cell phones through short-range radios are based on ZigBee technologies. ZigBee runs on technologies much cheaper than that of the WPANs, like Bluetooth. It uses radio-frequency applications or RF applications having low data rates, secure networking and longer battery lives. Therefore, it can be said that ZigBee technology is one of the most feasible technologies that are utilized for applying into Smart Homes.
Smart Homes are the latest innovations in the world of technology, enabling control over electronic household devices via a remote-controlled system. The only utility of smart homes was introduced to lower the utility bills of household appliances. The smartest possible way to apply the cost cutting is to manage all the home appliances and HVAC devices or Heating, Ventilating and Air-Conditioned units by installing remote-operated technology. It would not only save time and effort, but also consume a less amount of energy and would be able to manage multiple devices with a single unit (Chang et al. 2015). For this purpose, there have been regular innovations and inventions introduced in the world of technology from time to time.
Amongst these technologies, all of them serve the sole purpose of saving the consumed energy in the utilization of these appliances. The latest innovations that are introduced in the contemporary times are based generally on Ethernet protocols. These are:
All these latest technologies are able to bring down the utilization of home appliances to their desired levels of power efficiency integrating Smartphone apps and web tools to access them.
Although there are many advantages in implementing Smart Home technologies for the utilization of household appliances, there are also many possible challenges that come along with the introduction of this latest technology. Some of these are discussed in details as below:
The Smart Home appliances that are being used currently and that are being innovated with the passing times, often interact with other devices, such as other mobile devices and data collectors. These operators often collect data and contribute to the processing capabilities of security and privacy threats (Centenaro et al. 2016). Since IoT has their own security and privacy threats over data protection, this gets enlarged into the implementation of IoT devices as well. Thus, the interaction of Smart Home devices with that of their connecting counterparts adds to the data privacy threats and vulnerability issues.
Technological advancements often have their vices along with them. The Smart Home technology with their latest implementations help in reducing the energy consumption and costs incurred along with it. It even makes the daily chores of the house simpler than they are (Bogale and Le 2016). Home automation is however, has a tendency to go the wrong way as well. There are various ways by which home automation can go the wrong way. These are as follows:
Despite of the benefits and so many advantageous factors, this topic needs extra attention while utilizing the services and technologies in the real world. Every problem and threat finally lead to the privacy and security issues of the individuals utilizing the technology for the personal use.
Following are the security issues associated with the LTE network based on their layers:
Physical layer issues:
Interference: The intruders can be able to produce disruption in the network through creating high noise signals through inserting the manmade interference onto the communication system’s medium that alternatively results in influencing it towards completely being of no use.
Scrambling: It can be described as the interference developed for a short period that can be executed for targeting the specified frame od frames’ parts including the information related to controls or management in manner to lock the service or created disruption in the services. However; this specific attack is very difficult to be executed in successful and efficient manner.
DoS attacks: the attackers can send continuous requests to the network until or unless it provides them with a hole that can provide access to the network and related information. this attack is generally carried out targeting specified user appliance, where the user can be made to access the malicious signals for sending the signal uplink at the scheduled time that can alternatively be used for causing the conflicts in the network and thus, injecting malicious code through creating a security breach.
Open architecture issues: LTE is an IP network and it can be connected among many devices at once in manner to provide many applications at the same instance and thus, resulting in the enhancement of the security threats.
Bandwidth Stealing: During the instance of the DRX (Discontinuous Reception) period, the attackers can be able to insert the message that can allow the intruders to enter the network and manipulate the report status.
Location tracking: the presence of the device can be detected by the intruder if he or she is using the LTE network that could be used by the intruder for getting access to the users’ data and information and hence could possibly allow them to access the data and information saved in the database of the system.
Following are the security issues with this network:
5G drivers: there are many factors associated with the 5G driver that could lead to the security threat in the application of the 5G network.
Confidentiality and user identity: it has somewhat same security level as that of the 4G and so the confidentiality and the user identity has been not so considered while utilizing this wireless communication technology for the exchange of information.
Security: the radio network security of the 5G is not of high strength and so the information being exchanged has not been given high importance and thus, it could influence the overall effectiveness and efficiency of the application of 5G networks.
Evolved threat landscape: with the enhancement in the number of devices linking with the same network the threat will be continuously evolving with the landscape. The mass surveillance can also lead to the privacy issues with the individuals.
5G radio network security: the low cost of the network leading to more application in the present world and so becoming more vulnerable to the intrusion and threats.
Virtualization and cloud security: the cloud security is one of the concerning sector for the application of the wireless technology as most of the services in the wireless communication technology is being handled and managed from the cloud.
The smart devices are always connected to the wireless network or wired network and that is not only allowing the intruders to monitor but enter the network and use the device remotely without the permission of the individuals. Data weaponisation is one of the threat vector that can allow the intruders including government and big corporate companies to invade the privacy of the individuals and collect their behavior from online activities and record them for further benefits of their own. The Big Data and Data mining are the technologies those are capable of invading the privacy for the future use and if the collected data fall in wrong hands, it could possibly lead to the privacy and security issues to the individuals. Thus, the application of these technologies is influencing the privacy and security of the individuals.
Proper legal agreements and policies are the possible effective measures those could be considered as the best approach for the management of the level of expose or sharing of information among the users and the organization and support the transparency and security of the information and data being collected. Encryption is another effective measure for assuring that the data being exchanged between the users and the organization and restricting others from accessing the data and information. The individual with cryptographic key is the only way through which the individuals can access the saved data and information. Securing the network through hiding the location can be an effective measure for assuring that the intruders are not capable of identifying the physical location of the device and thus, get access to the network through certain coding and executing the vulnerabilities those have been mentioned above.
AR or Augmented Reality can be considered to an interactive experience of the real-environment which generally includes an augmented elements. This elements are generally augmented by making use of perceptual information which are generated by the computer and it has also been seen that it is sometimes across the various sensor modalities and this includes the visual, auditory, haptic, somatosensory and the olfactory (Barfield 2015). Besides this the information in the overlaid sensor is capable of constructing or destructing along with interweaving this with the physical world in such a way that it is perceived as an immersive aspect from the real environment. By this way the augmented reality is also capable of altering one on going perception of the real world environment but despite of this the virtual reality is capable of replacing the user’s real world environment completely by using a simulated one. Augmented reality can also be related to the largely synonymous terms and this includes the mixed reality and the computer-mediated reality.
The primary value of the AR or augmented reality includes the bringing of the components of the digital world into a perception of a person belonging to the real world. This is associated with transforming the whole world of education and in this the contents can be accessed by scanning and viewing of the images by making use of the mobile devices. Augmented reality is also used in the construction helmets so as to display the useful information about the construction sites. AR is generally used for the purpose of enhancing the natural environment or natural situations and is associated with providing a perceptual enriched experience (Wu et al. 2013). Along with this by taking help from the advanced AR technologies the information about the surrounding real world of the users can be manipulated digitally and interactively. On the real world overlying of the information related to the environment and the objective is done. All this information can be virtual as well as real. This type of techniques are generally associated with performing in a real time and also in a schematic context along with the environmental elements. Besides this the immersive perceptual information is also combined with the supplemental information which might include the scores over a live video feed of any sporting event.
Augmented reality has been applied in various fields and some of the applications have been described in the following section of the report.
Augmented reality has been adopted by the archeological field as well. This has been used in order to provide support to the various archeological research. Usage of the augmented archeological features into the modern landscape has been associated with allowing the archeologists to formulate the various possible configuration of the sites from the extant structures. Besides this the models generated by the computer of the ruins, buildings and the landscapes along with the ancient people have been recycled by making us of the AR applications (Graham, Zook and Boulton 2013). The collaborated AR systems have been associated with supplying a multi model interactions which are associated with combining the real world with the other virtual images of both the environment.
Visual Art: Augmented reality has also been applied in the visual arts as well which are associated with allowing the objects or places for the purpose of triggering the various kind of artistic multidimensional experiences and also the interpretations of the reality. Besides this the augmented reality has been associated with aiding the development of the eye tracking technology as well for the purpose of translating the eye movements of the disabled person for the purpose of drawing on the screen (Dunleavy and Dede 2014).
Augmented reality is also applied in the gaming industry. Embracing of the Augmented reality has been done by the gaming industry for the purpose of developing various kind of games which were prepared for the indoor environments and the games includes the AR air hockey, titans of space and many more (Billinghurst and Duenser 2012). Besides this AR is also associated with enhancing the pool table games as well. By making use of the augmented reality the gamers are capable of experiencing the digital game play in a real world environment. There exists various companies which have emerged out as a major creator of augmented reality games.
Augmented reality has also been used for the purpose of making designs in the industry. The industrial designers have been allowed by the AR to experience the design of the product and operations before completion of the design (Di Serio, Ibáñez and Kloos 2013). One such example is the use of AR by Volkswagen for the purpose of comparing the test imagery between the calculated one and the actual crash. This technology is also used for eth purpose of visualizing and modifying the body structure of a car and also the layout of the engine as well. This has also been used for the purpose of comparing the digital mock-ups and the physical mock-ups for the purpose of finding the discrepancies that exists between them (Lee 2012).
Along with the various kind of advantages there exists various kind of challenges which are faced by augmented reality and all this have been discussed in the following section of the report. There exists two small LCD monitors in the VR or virtual reality headsets and each of them are projected over one eye which are associated with creating a stereoscopic effect that in turn provides the user with an illusion about the artificial environment all around the user (Ong and Nee 2013). So long time focusing upon the screen is associated with the creation of feeling of nausea and distortion which is also known as virtual reality sickness.
Augmented reality games can be considered to be a major component of the breach of security. One such example is the recently launched game PokemonGo where one stranger can just barge into another person’s garden for the purpose of chasing the augmented characters and ultimately leading to the breach of personal security. The AR is also applied in the web browsing and also for browsing in real-time and this ultimately leads to the fact that in the future, just for getting any information about a person the only thing that needs to be done is just pointing the camera towards the users and all the information would be revealed (Kesim and Ozarslan 2012).
Another major drawback of AR is that with its application in various fields all the works would be becoming automated so this would be ultimately be major reason lying behind the laziness and addictiveness of the peoples towards this technology.
Conclusion
Based on the above report it can be concluded that emerging technologies have led human beings to live better and enhanced livelihood with more facilities and comfort than ever. The above report explained how the long range and short range communication technologies have allowed the individuals to be connected with the world without any boundaries. The ICT was one of the biggest revolution in the field of technology that led to revolution in every sector that we could think of. Every sector in the present time is connected with each other through the application of the ICT that facilitates exchange of information and data without any distance limit. LTE and 5G are one of the long range technologies those are bringing completion between the broadband and the mobile connectivity as telecommunication providers are providing same speed and benefits those are being provided by the internet service provider. Smartphones, cloud computing, LAN, WAN, hardware development, high qualified computer systems and many technologies have been paving the better world. Latest launch by Asus (ROG) introduced a smartphone with similar specifications that a highly specified computer systems have. Moreover, current smartphones consist of various Internet of Things and sensors those are allowing in providing better and effective services to the present world. Cyber security and threats are the only issue related with the application of these technologies those are capable of influencing the influence of the technology on the entire world. A small paragraph has also been introduced in this report describing the connectivity that can be achieved through the application of VR in between the real world and virtual world. The above report has also explained how emerging technology can be utilized for the protective measures on the utilization of the technologies. It can be recommended to read all the terms and condition before agreeing on the application of any technology and providing personal and sensitive information to the product or service providers.
References
Ahson, S.A. and Ilyas, M., 2017. RFID handbook: applications, technology, security, and privacy. CRC press.
Barfield, W. ed., 2015. Fundamentals of wearable computers and augmented reality. CRC Press.
Billinghurst, M. and Duenser, A., 2012. Augmented reality in the classroom. Computer, 45(7), pp.56-63.
Bogale, T.E. and Le, L.B., 2016. Massive MIMO and mmWave for 5G wireless HetNet: Potential benefits and challenges. IEEE Vehicular Technology Magazine, 11(1), pp.64-75.
Centenaro, M., Vangelista, L., Zanella, A. and Zorzi, M., 2016. Long-range communications in unlicensed bands: The rising stars in the IoT and smart city scenarios. IEEE Wireless Communications, 23(5), pp.60-67.
Chang, S.F., Chen, C.F., Wen, J.H., Liu, J.H., Weng, J.H. and Dong, J.L., 2015. Application and Development of Zigbee Technology for Smart Grid Environment. Journal of Power and Energy Engineering, 3(04), p.356.
Chelli, K., 2015, July. Security issues in wireless sensor networks: attacks and countermeasures. In Proceedings of the World Congress on Engineering (Vol. 1, pp. 1-3).
Chen, M., Qian, Y., Mao, S., Tang, W. and Yang, X., 2016. Software-defined mobile networks security. Mobile Networks and Applications, 21(5), pp.729-743.
Darby, S.J., 2018. Smart technology in the home: time for more clarity. Building Research & Information, 46(1), pp.140-147.
Di Serio, Á., Ibáñez, M.B. and Kloos, C.D., 2013. Impact of an augmented reality system on students’ motivation for a visual art course. Computers & Education, 68, pp.586-596.
Dunleavy, M. and Dede, C., 2014. Augmented reality teaching and learning. In Handbook of research on educational communications and technology (pp. 735-745). Springer, New York, NY.
Furht, B. and Ahson, S.A. eds., 2016. Long Term Evolution: 3GPP LTE radio and cellular technology. Crc Press..
Gai, K., Qiu, M., Tao, L. and Zhu, Y., 2016. Intrusion detection techniques for mobile cloud computing in heterogeneous 5G. Security and Communication Networks, 9(16), pp.3049-3058.
Ghazal, B. and Al-Khatib, K., 2015. Smart home automation system for elderly, and handicapped people using xbee. International Journal of Smart Home, 9(4), pp.203-210.
Graham, M., Zook, M. and Boulton, A., 2013. Augmented reality in urban places: contested content and the duplicity of code. Transactions of the Institute of British Geographers, 38(3), pp.464-479.
Han, J., Choi, C.S., Park, W.K., Lee, I. and Kim, S.H., 2014. Smart home energy management system including renewable energy based on ZigBee and PLC. IEEE Transactions on Consumer Electronics, 60(2), pp.198-202.
Jacobsson, A., Boldt, M. and Carlsson, B., 2016. A risk analysis of a smart home automation system. Future Generation Computer Systems, 56, pp.719-733.
Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., 2014. Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), pp.2481-2501.
Kesim, M. and Ozarslan, Y., 2012. Augmented reality in education: current technologies and the potential for education. Procedia-Social and Behavioral Sciences, 47, pp.297-302.
Kizza, J.M., 2017. Guide to computer network security. Springer.
Kumar, S., 2014. Ubiquitous smart home system using android application. arXiv preprint arXiv:1402.2114.
Labib, M., Reed, J.H., Martone, A.F. and Zaghloul, A.I., 2016, January. Coexistence between radar and LTE-U systems: Survey on the 5 GHz band. In Radio Science Meeting (USNC-URSI NRSM), 2016 United States National Committee of URSI National (pp. 1-2). IEEE.
Lee, I. and Lee, K., 2015. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), pp.431-440.
Lee, K., 2012. Augmented reality in education and training. TechTrends, 56(2), pp.13-21.
Mainanwal, V., Gupta, M. and Upadhayay, S.K., 2015, March. A survey on wireless body area network: Security technology and its design methodology issue. In Innovations in information, embedded and communication systems (ICIIECS), 2015 international conference on (pp. 1-5). IEEE.
Mohapatra, S.K., Swain, B.R. and Das, P., 2015. Comprehensive survey of possible security issues on 4G networks. International Journal of Network Security & Its Applications, 7(2), p.61.
Ong, S.K. and Nee, A.Y.C., 2013. Virtual and augmented reality applications in manufacturing. Springer Science & Business Media.
Osseiran, A., Boccardi, F., Braun, V., Kusume, K., Marsch, P., Maternia, M., Queseth, O., Schellmann, M., Schotten, H., Taoka, H. and Tullberg, H., 2014. Scenarios for 5G mobile and wireless communications: the vision of the METIS project. IEEE Communications Magazine, 52(5), pp.26-35.
Pathan, A.S.K. ed., 2016. Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press.
Ransing, R.S. and Rajput, M., 2015, January. Smart home for elderly care, based on wireless sensor network. In Nascent Technologies in the Engineering Field (ICNTE), 2015 International Conference on (pp. 1-5). IEEE.
Rushanan, M., Rubin, A.D., Kune, D.F. and Swanson, C.M., 2014, May. SoK: Security and privacy in implantable medical devices and body area networks. In Security and Privacy (SP), 2014 IEEE Symposium on (pp. 524-539). IEEE.
Sarkar, S.K., Basavaraju, T.G. and Puttamadappa, C., 2016. Ad hoc mobile wireless networks: principles, protocols, and applications. CRC Press.
Sharma, R.K. and Rawat, D.B., 2015. Advances on security threats and countermeasures for cognitive radio networks: A survey. IEEE Communications Surveys & Tutorials, 17(2), pp.1023-1043.
Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R. and Mehani, O., 2015, October. Network-level security and privacy control for smart-home IoT devices. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference on (pp. 163-167). IEEE.
Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014. Digital crime and digital terrorism. Prentice Hall Press.
Vangelista, L., Zanella, A. and Zorzi, M., 2015, September. Long-range IoT technologies: The dawn of LoRa™. In Future Access Enablers of Ubiquitous and Intelligent Infrastructures(pp. 51-58). Springer, Cham.
Wilson, C., Hargreaves, T. and Hauxwell-Baldwin, R., 2015. Smart homes and their users: a systematic analysis and key challenges. Personal and Ubiquitous Computing, 19(2), pp.463-476.
Wright, J. and Cache, J., 2015. Hacking exposed wireless: wireless security secrets & solutions. McGraw-Hill Education Group.
Wu, H.K., Lee, S.W.Y., Chang, H.Y. and Liang, J.C., 2013. Current status, opportunities and challenges of augmented reality in education. Computers & education, 62, pp.41-49.
Yang, N., Wang, L., Geraci, G., Elkashlan, M., Yuan, J. and Di Renzo, M., 2015. Safeguarding 5G wireless communication networks using physical layer security. IEEE Communications Magazine, 53(4), pp.20-27.
Zhang, Z.K., Cho, M.C.Y. and Shieh, S., 2015, April. Emerging security threats and countermeasures in IoT. In Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (pp. 1-6). ACM.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download