Please use this identifier to cite or link to this item:
https://dspace.upt.ro/xmlui/handle/123456789/6484
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Muthukumar, B. | - |
dc.contributor.author | Sathiyamurthy, K. | - |
dc.contributor.author | Jagan, A. | - |
dc.date.accessioned | 2024-09-09T06:15:36Z | - |
dc.date.available | 2024-09-09T06:15:36Z | - |
dc.date.issued | 2021 | - |
dc.identifier.citation | Muthukumar, B.; Sathiyamurthy, K.; Jagan, A.: Semantic based security for health data over sensor network. Timişoara: Editura Politehnica, 2021. | en_US |
dc.identifier.issn | 1582-4594 | - |
dc.identifier.uri | https://dspace.upt.ro/xmlui/handle/123456789/6484 | - |
dc.description.abstract | An acquiescent juxtaposition of wireless technologies, micro-electromechanical systems (MEMS), micro-services and the internet paved an ecosystem named Internet of Things (IoT), which ascertains link between physical objects that are reachable through the internet. The embedded technology in those objects succors them to interact with internal states or the external milieu, which in turn influences on decisions. This new connectivity, bridges the gap between physical objects and digital world to improve the quality and productivity of life, has become common and going beyond laptops and smartphones, in applications like cars, smart homes, smart cities, healthcare, retails, energy management agriculture, wearables etc. IoT connects smart objects together (through internet and intelligent sensors) using internet protocol, and make them to be read, controlled, and managed at any time at anywhere. Since this communication is in the public environment, these devices are vulnerable to attacks, and hence the security and privacy are vitiated. Detection of abnormality in propositional information must be followed by recovery action to ensure the correct semantics of the frame network. This paper focuses on building a semantic based security platform to analyze the data received from sensors using Hidden Markov Model (HMM), semantic sensor network ontology, and temporal ontology to detect the malicious attack data. The HMM is used for reasoning purpose and the label for visible states are created. The Stream Annotation Ontology is used to represent the quality of the data over the Semantic Sensor Network Ontology. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Timișoara : Editura Politehnica | en_US |
dc.relation.ispartofseries | Journal of Electrical Engineering;Vol 21 No 1 | - |
dc.subject | Abnormal data | en_US |
dc.subject | Hidden Markov Model | en_US |
dc.subject | Internet of Things | en_US |
dc.subject | IoT | en_US |
dc.subject | k- means clustering algorithm | en_US |
dc.subject | Security breaches | en_US |
dc.subject | Semantic | en_US |
dc.subject | Stream Annotation Ontology | en_US |
dc.subject | Semantic Sensor Network (SSN) | en_US |
dc.subject | Quality Ontology | en_US |
dc.title | Semantic based security for health data over sensor network [articol] | en_US |
dc.type | Article | en_US |
Appears in Collections: | Articole științifice/Scientific articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
BUPT_ART_Muthukumar_f.pdf | 576.61 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.