2020 IEEE International Conference on Electro Information Technology (EIT) 2020
DOI: 10.1109/eit48999.2020.9208296
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Intrusion Detection System for Smart Home Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 29 publications
0
8
0
Order By: Relevance
“…On the other hand, there are proposals where the control follows a non-reactive design, its main application is to predict solutions taking into account the inhabitants behavior to make the environment cozy and comfortable [ 20 ] and based on the user interaction with the system, so can it react when an intrusion to the home has occurred [ 21 ] or learning from the specific energy source load shifting characteristics as can be home renewable energy (wind turbines, solar panels, batteries) [ 22 , 23 ] or automatically deal with the random demand of consumers [ 24 ].…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, there are proposals where the control follows a non-reactive design, its main application is to predict solutions taking into account the inhabitants behavior to make the environment cozy and comfortable [ 20 ] and based on the user interaction with the system, so can it react when an intrusion to the home has occurred [ 21 ] or learning from the specific energy source load shifting characteristics as can be home renewable energy (wind turbines, solar panels, batteries) [ 22 , 23 ] or automatically deal with the random demand of consumers [ 24 ].…”
Section: Related Workmentioning
confidence: 99%
“…The decision layer is structured to determine the type of behavior obtained or stored in the information layer. As such, all four layers work closely together in the sense that the activities associated with one layer support the others [13]…”
Section: Smart Home Technologymentioning
confidence: 99%
“…In a smart home environment, modern wireless networks, computers, and sensors face various security threats, and machine learning is seen as an ideal solution to this problem. Using different learning algorithms train sensors, and computers without any explicit programming, machine learning technology takes advantage of artificial intelligence using various learning algorithms train sensors, and devices without any explicit programming [13] (HID) with a two-tiered intrusion detection system as shown in Figure 1. The first tier contains the machine learning technique.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Blockchains have the advantage of being capable of enhancing security through verification between nodes, which makes forgery difficult. Consequently, research using blockchain techniques to develop robust security algorithms is actively underway [9][10][11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%