2014 International Conference on Science Engineering and Management Research (ICSEMR) 2014
DOI: 10.1109/icsemr.2014.7043675
|View full text |Cite
|
Sign up to set email alerts
|

HBSIDS: Human body sensor based intrusion detection system in a cooperative network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Thus, security in the B5G network focuses on supreme-built-in encryption (security as software); versatile security systems (AI-based security and applying AI in cybersecurity); and various manufactured based-automation (security automation) [88]. This has resulted in the development of various AI-based intrusion detection systems for wearable devices [89]- [92]. It also ensures data confidentiality and privacy is maintained in wearable devices resulting in increase in the trustworthiness and reliability of the end-users in the system.…”
Section: B Smartnessmentioning
confidence: 99%
“…Thus, security in the B5G network focuses on supreme-built-in encryption (security as software); versatile security systems (AI-based security and applying AI in cybersecurity); and various manufactured based-automation (security automation) [88]. This has resulted in the development of various AI-based intrusion detection systems for wearable devices [89]- [92]. It also ensures data confidentiality and privacy is maintained in wearable devices resulting in increase in the trustworthiness and reliability of the end-users in the system.…”
Section: B Smartnessmentioning
confidence: 99%
“…Some of the current monitoring systems have low measurement accuracy. Accurate data recording is one of the essential parameters of monitoring [14]. The systems may occasionally incur errors in data recording.…”
Section: Introductionmentioning
confidence: 99%
“…In [9] the detection of malicious nodes is done using the algebraic watch dog by watching the receiver side transmission. In [10] the energy consumption is decreased and the intruders among the military are detected using a human body sensor.…”
Section: Introductionmentioning
confidence: 99%