TY - BOOK AU - Liu,Jianwei AU - Bai,Lin AU - Jiang,Chunxiao AU - Zhang,Wei ED - SpringerLink (Online service) TI - Space-Air-Ground Integrated Network Security SN - 9789819911257 AV - TK5105.59 U1 - 005.8 23 PY - 2023/// CY - Singapore PB - Springer Nature Singapore, Imprint: Springer KW - Computer networks KW - Security measures KW - Data protection KW - Security systems KW - Mobile and Network Security KW - Data and Information Security KW - Security Science and Technology N1 - Acceso multiusuario; Chapter 1 Introduction to SAGIN Security -- Chapter 2 Theory Foundation of SAGIN Security -- Chapter 3 Ground Network Security -- Chapter 4 Airborne Network Security -- Chapter 5 Space Network Security -- Chapter 6 Future Trend of Network Security N2 - This book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs). SAGIN are expected to play an increasingly important role in providing real-time, flexible, and integrated communication and data transmission services in an efficient manner. Today, SAGINs have been widely developed for a range of applications in navigation, environmental monitoring, traffic management, counter-terrorism, etc. However, security becomes a major concern, since the satellites, spacecrafts, and aircrafts are susceptible to a variety of traditional/specific network-based attacks, including eavesdropping, session hijacking, and illegal access. In this book, we review the theoretical foundations of SAGIN security. We also address a range of related security threats and provide cutting-edge solutions in the aspect of ground network security, airborne network security, space network security, and provide future trends in SAGIN security. The book goes from an introduction to the topic's background, to a description of the basic theory, and then to cutting-edge technologies, making it suitable for readers at all levels including professional researchers and beginners. To gain the most from the book, readers should have taken prior courses in information theory, cryptography, network security, etc UR - http://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-981-99-1125-7 ER -