Securing IoT Environment by Deploying Federated Deep Learning Models

被引:0
|
作者
Alghamdi, Saleh [1 ]
Albeshri, Aiiad [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp Sci, Jeddah, Saudi Arabia
关键词
Internet of Things (IoT); security breaches; machine learning; Deep Learning (DL); INTERNET;
D O I
10.14569/IJACSA.2024.0150413
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The vast network of interconnected devices, known as the Internet of Things (IoT), produces significant volumes of data and is vulnerable to security threats. The proliferation of IoT protocols has resulted in numerous zero-day attacks, which traditional machine learning systems struggle to detect due to IoT networks' complexity and the sheer volume of these attacks. This situation highlights the urgent need for developing more advanced and effective attack detection methods to address the growing security challenges in IoT environments. In this research, we propose an attack detection mechanism based on deep learning for federated learning in IoT. Specifically, we aim to detect and prevent malicious attacks in the form of model poisoning and Byzantine attacks that can compromise the accuracy and integrity of the trained model. The objective is to compare the performance of a distributed attack detection system using a DL model against a centralized detection system that uses shallow machine learning models. The proposed approach uses a distributed attack detection system that consists of multiple nodes, each with its own DL model for detecting attacks. The DL model is trained using a large dataset of network traffic to learn high-level features that can distinguish between normal and malicious traffic. The distributed system allows for efficient and scalable detection of attacks in a federated learning network within the IoT. The experiments show that the distributed attack detection system using DL outperforms centralized detection systems that use shallow machine learning models. The proposed approach has the potential to improve the security of the IoT by detecting attacks more effectively than traditional machine learning systems. However, there are limitations to the approach, such as the need for a large dataset for training the DL model and the computational resources required for the distributed system.
引用
收藏
页码:122 / 129
页数:8
相关论文
共 50 条
  • [21] Securing Fog-enabled IoT: federated learning and generative adversarial networks for intrusion detection
    Lei, Ting
    TELECOMMUNICATION SYSTEMS, 2025, 88 (01)
  • [22] APINET: A Methodology for Deploying Deep and Machine Learning Models as Services
    Zatarain Cabada, Ramon
    Barron Estrada, Maria Lucia
    Leyva Lopez, Nestor
    Cardenas Lopez, Hector Manuel
    Batiz Beltran, Victor Manuel
    2023 MEXICAN INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE, ENC, 2024,
  • [23] Securing Dynamic Service Function Chain Orchestration in EC-IoT Using Federated Learning
    Wang, Shuyi
    Yang, Longxiang
    SENSORS, 2022, 22 (23)
  • [24] An optimal federated learning-based intrusion detection for IoT environment
    Karunamurthy, A.
    Vijayan, K.
    Kshirsagar, Pravin R.
    Tan, Kuan Tak
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [25] Decentralized Federated Learning for Industrial IoT With Deep Echo State Networks
    Qiu, Wenqi
    Ai, Wu
    Chen, Huazhou
    Feng, Quanxi
    Tang, Guoqiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (04) : 5849 - 5857
  • [26] Deep Federated Learning for IoT-based Decentralized Healthcare Systems
    Elayan, Haya
    Aloqaily, Moayad
    Guizani, Mohsen
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 105 - 109
  • [27] CAEFL: Composable and Environment Aware Federated Learning Models
    Xu, Ruomeng
    Michala, Anna Lito
    Trinder, Phil
    PROCEEDINGS OF THE 21ST ACM SIGPLAN INTERNATIONAL WORKSHOP ON ERLANG, ERLANG 2022, 2022, : 9 - 20
  • [28] Adapting Deep Learning models to IoT environments
    Resifi, Sofien
    Hassan, Hassan
    Drira, Khalil
    2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, : 67 - 74
  • [29] SecureIIoT Environment: Federated Learning Empowered Approach for Securing IIoT From Data Breach
    Makkar, Aaisha
    Kim, Tae Woo
    Singh, Ashutosh Kumar
    Kang, Jungho
    Park, Jong Hyuk
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (09) : 6406 - 6414
  • [30] Securing MQTT protocol for IoT environment using IDS based on ensemble learning
    Zeghida, Hayette
    Boulaiche, Mehdi
    Chikh, Ramdane
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (04) : 1075 - 1086