2018 IEEE International Conference on Communications (ICC) 2018
DOI: 10.1109/icc.2018.8422401
|View full text |Cite
|
Sign up to set email alerts
|

Adaptively Supervised and Intrusion-Aware Data Aggregation for Wireless Sensor Clusters in Critical Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(41 citation statements)
references
References 17 publications
0
41
0
Order By: Relevance
“…Another important challenge is privacy issues that can have a fatal impact on the user. Some interesting approaches to solving such issues are adopting deep learning and machine learning techniques [39,40]. Such techniques can be used to secure user data and detect intruders that violate the user's privacy.…”
Section: Open Issues and Challengesmentioning
confidence: 99%
“…Another important challenge is privacy issues that can have a fatal impact on the user. Some interesting approaches to solving such issues are adopting deep learning and machine learning techniques [39,40]. Such techniques can be used to secure user data and detect intruders that violate the user's privacy.…”
Section: Open Issues and Challengesmentioning
confidence: 99%
“…In [22,23], Otoum et al gave a black-hole detection scheme which help in monitoring the different aspect of systems such as pressure and temperature. Very recently, Otoum et al [24] introduced an adaptively supervised and intrusion-aware data aggregation for wireless sensor clusters in critical infrastructures. This proposed scheme used an adaptive strategy to dynamically detect known and unknown intrusions, thus solving the intrusion problem.…”
Section: Related Workmentioning
confidence: 99%
“…There are many research articles [4][5][6][7][8][9] focusing on solving the security issues in IoT, such as intrusion detection in sensor networks and trust models in networks. Even machine learning has been applied to help defeat security threats [10]. In addition, the human factor is also an important subject which attracts the attention of researchers [11].…”
Section: Relative Workmentioning
confidence: 99%
“…In this section, we select some typical protocols [10][11][12]15,16,18,19] to compare with ours. Table 3 shows the comparison results intuitively, where " √ " means that the corresponding attribute is satisfied and "×" means that the corresponding attribute is not satisfied.…”
Section: Security Comparisonmentioning
confidence: 99%