Edge-based Federated Learning to Enhance the Security of IoT
Main Article Content
Abstract
The integration of Artificial Intelligence (AI) and Internet of Things (IoT) has enabled network components to make independent decisions, but this capability also poses a risk of malicious attacks in unsupervised and trustless environments. To overcome this issue, the article proposes a distributed collaborative detection approach that utilizes edge nodes as voters to monitor the training process, tackle PA, and improve the accuracy of the global model. The proposed approach isevaluated using the UNSW-NB15 dataset in both IID and non- IID scenarios, and the results demonstrate the effectiveness of the approach in improving the accuracy of FL even in the presence of PA.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.
- Creative Commons Copyright License
The journal allows readers to download and share all published articles as long as they properly cite such articles; however, they cannot change them or use them commercially. This is classified as CC BY-NC-ND for the creative commons license.
- Retention of Copyright and Publishing Rights
The journal allows the authors of the published articles to hold copyrights and publishing rights without restrictions.
References
Y. Jin et al., ”Edge-Based Collaborative Training System for Artificial Intelligence-of-Things,” IEEE Transactions on Ind ustrial Informatics, vol. 18, no. 10, pp. 7162-7173, Oct. 2022.
M. Antonakakis et al., ”Understanding the mirai botnet,” in 26th USENIX security symposium (USENIX Security 17), pp. 1093-1110, 2017.
M. Baich, T. Hamim, N. Sael, and Y. Chemlal, “Machine Learning for IoT based networks intrusion detection: a comparative study,” Procedia Computer Science, vol. 215, pp. 742–751, 2022.
Y. Guo, T. Ji, Q. Wang, L. Yu, G. Min, and P. Li, “Unsupervised Anomaly Detection in IoT Systems for Smart Cities,” IEEE Transactions on Network Science and Engineering, vol. 7, no. 4, pp. 2231– 2242, Oct. 01, 2020.
J.-H. Moon, J.-H. Yu, and K.-A. Sohn, “An ensemble approach to anomaly detection using high- and low-variance principal components,” Computers and Electrical Engineering, vol. 99, p. 107773, Apr. 2022.
S. M. Nagarajan, G. G. Deverajan, A. K. Bashir, R. P. Mahapatra, and M. S. Al-Numay, “IADFCPS: Intelligent Anomaly Detection Framework towards Cyber Physical Systems,” Computer Communications, vol. 188, pp. 81–89, Apr. 2022.
J. Li, Z. Zhao, R. Li, and H. Zhang, “AI-Based TwoStage Intrusion Detection for Software Defined IoT Networks,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 2093–2102, Apr. 2019.
C. Luo, Z. Tan, G. Min, J. Gan, W. Shi, and Z. Tian, “A Novel Web Attack Detection System for Internet of Things via Ensemble Classification,” IEEE Transactions on Industrial Informatics, vol. 17, no. 8, pp. 5810–5818, Aug. 2021.
T. D. Nguyen, S. Marchal, M. Miettinen, H. Fereidooni, N. Asokan, and A.-R. Sadeghi, “DÏoT: A Federated Self-learning Anomaly Detection System for IoT,” 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Jul. 2019.
Y. Chen, J. Zhang, and C. K. Yeo, “Network Anomaly Detection Using Federated Deep Autoencoding Gaussian Mixture Model,” Machine Learning for Networking. Springer International Publishing, pp. 1–14, 2020.
B. Li, Y. Wu, J. Song, R. Lu, T. Li, and L. Zhao, “DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber–Physical Systems,” IEEE Transactions on Industrial Informatics, vol. 17, no. 8, pp. 5615–5624, Aug. 2021.
T. Huong, T. Bac, D. Long, T. Luong, N. Dan, L. Quang, L. Cong, B. Thang, and K. Tran, “detecting cyberattacks using anomaly detection in industrial control systems: A federated learning approach,” Comput. Ind. 132, 2021.
L. Zhao, J. Li, Q. Li, and F. Li, “A Federated Learning Framework for Detecting False Data Injection Attacks in Solar Farms,” IEEE Transactions on Power Electronics, vol. 37, no. 3, pp. 2496–2501, Mar. 2022.
V. Rey, P. M. Sánchez Sánchez, A. Huertas Celdrán, and G. Bovet, “Federated learning for malware detection in IoT devices,” Computer Networks, vol. 204, p. 108693, Feb. 2022.
L. Cui et al., “Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures,” IEEE Transactions on Industrial Informatics, vol. 18, no. 5, pp. 3492–3500, May 2022.
Z. A. E. Houda, B. Brik, A. Ksentini, L. Khoukhi, and M. Guizani, “When Federated Learning Meets Game Theory: A Cooperative Framework to Secure IIoT Applications on Edge Computing,” IEEE Transactions on Industrial Informatics, vol. 18, no. 11, pp. 7988–7997, Nov. 2022.
T. Li, A. K. Sahu, A. Talwalkar, and V. Smith, “Federated Learning: Challenges, Methods, and Future Directions,” IEEE Signal Processing Magazine, vol. 37, no. 3, pp. 50–60, May 2020.
O. Suciu, R. Marginean, Y. Kaya, and H. Daume, “When does machine learning fail? Generalized transferability for evasion and poisoning attacks,” in Proc. USENIX Conference on Security Symposium (USENIX Security’18), pp. 1299–1316, 2018.
N. Baracaldo, B. Chen, H. Ludwig, and J. A. Safavi, “Mitigating Poisoning Attacks on Machine Learning Models,” Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security. ACM, Nov. 03, 2017.
Y. Zhao, J. Chen, J. Zhang, D. Wu, M. Blumenstein, and S. Yu, “Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks,” Concurrency and Computation: Practice and Experience, vol. 34, no. 7, Jun. 29, 2020.
D. Yin, Y. Chen, K. Ramchandran, and P. Bartlett, “Byzantine-Robust Distributed Learning: Towards Optimal Statistical Rates.” arXiv, 2018.
J. Zhang, C. Ge, F. Hu, and B. Chen, “RobustFL: Robust Federated Learning Against Poisoning Attacks in Industrial IoT Systems,” IEEE Transactions on Industrial Informatics, vol. 18, no. 9, pp. 6388– 6397, Sep. 2022.
M. Du, H. Zheng, X. Feng, Y. Chen, and T. Zhao, “Decentralized Federated Learning with Markov Chain Based Consensus for Industrial IoT Networks,” IEEE Transactions on Industrial Informatics, vol. 19, no. 4, pp. 6006–6015, Apr. 2023.
C. Hu, J. Jiang, and Z. Wang, “Decentralized Federated Learning: A Segmented Gossip Approach”, 1st International Workshop on Federated Machine Learning for User Privacy and Data Confidentiality, 2019.
M. Blot, D. Picard, M. Cord, and N. Thome, “Gossip training for deep learning.” arXiv, 2016.
J. Daily, A. Vishnu, C. Siegel, T. Warfel, and V.Amatya, “GossipGraD: Scalable Deep Learning using Gossip Communication based Asynchronous Gradient Descent.” arXiv, 2018.
A. G. Roy, S. Siddiqui, S. Pölsterl, N. Navab, and C. Wachinger, “BrainTorrent: A Peer-to-Peer Environment for Decentralized Federated Learning.” arXiv, 2019.
A. Lalitha, S. Shekhar, T. Javidi, and F. Koushanfar, “Fully decentralized federated learning”, 3rd Workshop on Bayesian Deep, NIPS Workshop, 2018.
A. Lalitha, O. C. Kilinc, T. Javidi, and F. Koushanfar, “Peer-to-peer Federated Learning on Graphs.” arXiv, 2019.
L. Barbieri, S. Savazzi, M. Brambilla, and M. Nicoli, “Decentralized federated learning for extended sensing in 6G connected vehicles,” Vehicular Communications, vol. 33, p. 100396, Jan. 2022.
S. Savazzi, M. Nicoli, and V. Rampa, “Federated Learning with Cooperating Devices: A Consensus Approach for Massive IoT Networks,” IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4641–4654, May 2020.
H. Jin, X. Dai, J. Xiao, B. Li, H. Li, and Y. Zhang, “Cross-Cluster Federated Learning and Blockchain for Internet of Medical Things,” IEEE Internet of Things Journal, vol. 8, no. 21, pp. 15776–15784, Nov. 01, 2021.
Y. Qu et al., “Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing,” IEEE Internet of Things Journal, vol. 7, no. 6, pp. 5171–5183, Jun. 2020.
S. Andreina, G. A. Marson, H. Mollering, and G. Karame, “BaFFLe: Backdoor Detection via Feedback-based Federated Learning,” 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS), Jul. 2021.
E. Bagdasaryan, A. Veit, Y. Hua, D. Estrin, and V. Shmatikov, “How To Backdoor Federated Learning.” arXiv, 2018.
V. Tolpegin, S. Truex, M. E. Gursoy, and L. Liu, “Data Poisoning Attacks Against Federated Learning Systems.” arXiv, 2020.
N. Moustafa and J. Slay, “UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set),” 2015 Military Communications and Information Systems Conference (MilCIS), Nov. 2015.
N. Moustafa, “the future of IoT mini guide: The burgeoning IoT market continues,” Available: www.unsw.adfa.edu.au/australian-centre-forcyber- ecurity/cybersecurity/ADFA-NB15- Datasets, Dec. 2021.
M. Malik, M. Dutta, and J. Granjal, “A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things,” IEEE Access, vol. 7, pp. 27443–27464, 2019.
A. Arya and S. Jha, “An Analytical Review on Data Privacy and Anonymity in ‘Internet of Things (IoT) Enabled Services,”’ 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Dec. 17, 2021.
N. Moustafa, G. Misra, and J. Slay, “Generalized Outlier Gaussian Mixture Technique Based on Automated Association Features for Simulating and Detecting Web Application Attacks,” IEEE Transactions on Sustainable Computing, vol. 6, no.
, pp. 245–256, Apr. 01, 2021.
https://www.kaggle.com/code/carlkirstein/unswnb15-modelling-97-7.
S. M. Kasongo and Y. Sun, “Performance Analysis of Intrusion Detection Systems Using a Feature Selection Method on the UNSW-NB15 Dataset,” Journal of Big Data, vol. 7, no. 1. Springer Science and Business Media LLC, Nov. 25, 2020.
A. Halbouni, T. S. Gunawan, M. H. Habaebi, M. Halbouni, M. Kartiwi, and R. Ahmad, “CNNLSTM: Hybrid Deep Neural Network for Network Intrusion Detection System,” IEEE Access, vol. 10, pp. 99837–99849, 2022.
H. C. Altunay and Z. Albayrak, “A hybrid CNN+LSTM-based intrusion detection system for industrial IoT networks,” Engineering Science and Technology, an International Journal, vol. 38, p. 101322, Feb. 2023.
S. Kim, L. Chen, and J. Kim, “Intrusion Prediction using LSTM and GRU with UNSW-NB15,” 2021 Computing, Communications and IoT Applications (ComComAp), Nov. 26, 2021.
P. TS and P. Shrinivasacharya, “Evaluating neural networks using Bi-Directional LSTM for network IDS (intrusion detection systems) in cyber security,” Global Transitions Proceedings, vol. 2, no. 2, pp. 448–454, Nov. 2021.
L. Ashiku and C. Dagli, “Network Intrusion Detection System using Deep Learning,” Procedia Computer Science, vol. 185, pp. 239–247, 2021.