2022 International Conference on Business Analytics for Technology and Security (ICBATS) 2022
DOI: 10.1109/icbats54253.2022.9759069
|View full text |Cite
|
Sign up to set email alerts
|

A Proposed Architecture for Traffic Monitoring & Control System via LiFi Technology in Smart Homes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…The system employs LiFi technology to transmit vital signs data from patients in the ICU to a cloud IoT platform at any time [8]. Through this platform, doctors and nurses can view patientspecific vital sign data online anytime to monitor and assess the patient's status.…”
Section: Smart Healthcare Monitoringmentioning
confidence: 99%
“…The system employs LiFi technology to transmit vital signs data from patients in the ICU to a cloud IoT platform at any time [8]. Through this platform, doctors and nurses can view patientspecific vital sign data online anytime to monitor and assess the patient's status.…”
Section: Smart Healthcare Monitoringmentioning
confidence: 99%
“…Due to the relatively small scale of smart home device traffic data compared to network traffic and the high accuracy and real-time nature of packet-level features [28], most of the related research utilizes classification algorithms based on packet-level features for traffic classification by attackers. Therefore, this study designs attack models that infer user privacy information based on packet-level traffic fingerprints of smart home devices to demonstrate the feasibility and potential harm of smart home traffic classification attacks.…”
Section: Goals and Challengesmentioning
confidence: 99%
“…Overall, by leveraging AI technologies, Koçtaş is able to provide a better customer experience and improve sales across all shopping channels [10]. To enhance security and risk mitigation in home improvement applications, control systems and convolutional neural networks can be used for threat detection and prevention [32][33][34]. Secure communication [35], mobile agent protocol [36], machine learning [37], artificial neural networks [38], blockchain technology [39,57], electronic health records [40], novel secret key generation techniques [41], secret sharing schemes [42], and secure information management [43] can be applied in home improvement to enhance security and privacy of personal and financial data [44].…”
Section: Introductionmentioning
confidence: 99%