Cited 9 time in
AI based energy harvesting security methods: A survey
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Mohammadi, Masoumeh | - |
| dc.contributor.author | Sohn, Insoo | - |
| dc.date.accessioned | 2024-08-08T09:32:02Z | - |
| dc.date.available | 2024-08-08T09:32:02Z | - |
| dc.date.issued | 2023-12 | - |
| dc.identifier.issn | 2405-9595 | - |
| dc.identifier.issn | 2405-9595 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/20980 | - |
| dc.description.abstract | Energy Harvesting (EH) as a power source plays a critical role in the advent of new technologies such as the Internet of Things (IoT). But, by providing power within the networks, it may be susceptible to attacks such as eavesdropping, data manipulation, or denial of service, leading to issues like leakage of confidential, sensitive information, and energy scarcity. Therefore, it is important to implement appropriate security measures to protect the data and devices that use energy harvested from ambient sources. In this paper, we present a comprehensive overview of the current and future developments of security for EH systems that used artificial intelligence(AI) approaches. Furthermore, we highlight the application of AI approaches such as machine learning (ML) and federated learning (FL) in the security of EH systems. Then, we discuss the security techniques that are used in the EH literature, including cryptography techniques, physical-layer security schemes, blockchain, and FL. Finally, we outline research challenges and prospects for developing and applying AI algorithms in the security of EH. © 2023 The Author(s) | - |
| dc.format.extent | 11 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | 한국통신학회 | - |
| dc.title | AI based energy harvesting security methods: A survey | - |
| dc.type | Article | - |
| dc.publisher.location | 대한민국 | - |
| dc.identifier.doi | 10.1016/j.icte.2023.06.002 | - |
| dc.identifier.scopusid | 2-s2.0-85162217945 | - |
| dc.identifier.wosid | 001138970600001 | - |
| dc.identifier.bibliographicCitation | ICT Express, v.9, no.6, pp 1198 - 1208 | - |
| dc.citation.title | ICT Express | - |
| dc.citation.volume | 9 | - |
| dc.citation.number | 6 | - |
| dc.citation.startPage | 1198 | - |
| dc.citation.endPage | 1208 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.description.journalRegisteredClass | kci | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Telecommunications | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.relation.journalWebOfScienceCategory | Telecommunications | - |
| dc.subject.keywordPlus | PHYSICAL-LAYER SECURITY | - |
| dc.subject.keywordPlus | WIRELESS POWER | - |
| dc.subject.keywordPlus | ARTIFICIAL-INTELLIGENCE | - |
| dc.subject.keywordPlus | PRIVACY | - |
| dc.subject.keywordPlus | RELAY | - |
| dc.subject.keywordPlus | TECHNOLOGY | - |
| dc.subject.keywordPlus | NETWORKS | - |
| dc.subject.keywordPlus | TRENDS | - |
| dc.subject.keywordAuthor | Artificial Intelligence(AI) | - |
| dc.subject.keywordAuthor | Deep learning | - |
| dc.subject.keywordAuthor | Energy harvesting | - |
| dc.subject.keywordAuthor | Privacy | - |
| dc.subject.keywordAuthor | Security | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
