2022
DOI: 10.3390/s22197201
|View full text |Cite
|
Sign up to set email alerts
|

Data Analytics, Self-Organization, and Security Provisioning for Smart Monitoring Systems

Abstract: Internet availability and its integration with smart technologies have favored everyday objects and things and offered new areas, such as the Internet of Things (IoT). IoT refers to a concept where smart devices or things are connected and create a network. This new area has suffered from big data handling and security issues. There is a need to design a data analytics model by using new 5G technologies, architecture, and a security model. Reliable data communication in the presence of legitimate nodes is alwa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…However, the Random forest was used for categorizing the attack types which generate the large number of tree while training the attack detection model which leads to high complexity. In work [18], the author proposed a security model for smart monitoring and attack detection. Initially, every device in IoT network are registered with an edge device then based on the query, time and location the authentication mechanism was proceeded.…”
Section: A Intrusion Detection System Using Machine Learningmentioning
confidence: 99%
“…However, the Random forest was used for categorizing the attack types which generate the large number of tree while training the attack detection model which leads to high complexity. In work [18], the author proposed a security model for smart monitoring and attack detection. Initially, every device in IoT network are registered with an edge device then based on the query, time and location the authentication mechanism was proceeded.…”
Section: A Intrusion Detection System Using Machine Learningmentioning
confidence: 99%
“…The process of storing data after data collection is called data preprocessing, and data storage is one of the complex tasks with properties, after storing data, it generates useful information for analyzing and optimizing it using various machine learning methods. This process is used to provide data efficiency and conform to the requirements ( 2 ). In comparison to Organization for Economic Cooperation and Development (OECD) countries, the rate of population aging in Korea is accelerating significantly.…”
Section: Introductionmentioning
confidence: 99%