2018
DOI: 10.1109/access.2018.2848100
|View full text |Cite
|
Sign up to set email alerts
|

Stochastic and Information Theory Techniques to Reduce Large Datasets and Detect Cyberattacks in Ambient Intelligence Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 20 publications
(22 citation statements)
references
References 29 publications
0
22
0
Order By: Relevance
“…32 Besides, intelligent mechanisms to protect IoT and CPS deployments have also been studied. 33,34 Finally, PbD mechanisms have also been investigated in the context of well-being services, especially in scenarios combining health services, digital technologies, and hardware devices, such as IoT elements. 7 Discussions about legal issues related to this approach have also been published.…”
Section: Related Workmentioning
confidence: 99%
“…32 Besides, intelligent mechanisms to protect IoT and CPS deployments have also been studied. 33,34 Finally, PbD mechanisms have also been investigated in the context of well-being services, especially in scenarios combining health services, digital technologies, and hardware devices, such as IoT elements. 7 Discussions about legal issues related to this approach have also been published.…”
Section: Related Workmentioning
confidence: 99%
“…The mutual information between the encrypted and the original information flow ( ; ) represents the residual information that remains in the encrypted signal about the original one (7). Considering expressions (5) and (6), it is easy to obtain this amount is zero; i.e., the encrypted signal does not provide any information about the original…”
Section: Encryption Mechanismmentioning
confidence: 99%
“…This encryption scheme also enables us to easily calculate the synchronization signal through the proposed correlation algorithm. As key streams have a random behavior, their correlation with Then, because of the structure of the XOR truth table, a known value from the encrypted signal e[n] of all possible values in the range of the information signal m[n] have the same probability of having generated that encrypted sample (6).…”
Section: Encryption Mechanismmentioning
confidence: 99%
See 1 more Smart Citation
“…Block ciphers, asymmetric keys, secure sessions, and similar solutions based on, for example, elliptic curves are typical solutions presenting these problems [ 11 ]. However, lighter cryptographic approaches [ 12 ] have been proved to be unsecure against some of the most typical attacks; and (what is more worrying) against modern and future cyber-physical attacks [ 13 ]. Then, a totally new and innovative approach is required to communicate access points in the fronthaul and base stations in the backhaul (where large processing resources are available).…”
Section: Introductionmentioning
confidence: 99%