Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Securing IoT with Deep Federated Learning: A Trust-based Malicious Node Identification Approachopen access

Authors
Awan, K.A.Din, I.U.Zareei, M.Almogren, A.Seo-Kim, B.Diaz, J.A.P.
Issue Date
2023
Publisher
Institute of Electrical and Electronics Engineers Inc.
Keywords
Blockchains; Computational modeling; Deep learning; Deep Learning; Federated Learning; Federated learning; Internet of Things; Internet of Things; Malicious Nodes; Malware; Privacy Preservation; Security; Security; Trust management; Trust Management; Trustworthiness
Citation
IEEE Access, v.11, pp.1 - 1
Journal Title
IEEE Access
Volume
11
Start Page
1
End Page
1
URI
https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/31493
DOI
10.1109/ACCESS.2023.3284677
ISSN
2169-3536
Abstract
The Internet of Things (IoT) has revolutionized the world with its diverse applications and smart connected devices. These IoT devices communicate with each other without human intervention and make life easier in many ways. However, the independence of these devices raises several significant concerns, such as security and privacy preservation due to malicious and compromised nodes within the network. Trust management has been introduced as a less computationally intensive alternative to traditional approaches such as cryptography. The proposed FedTrust approach addresses these challenges by designing a method for identifying malicious and compromised nodes using federated learning. FedTrust trains edge nodes with a provided dataset and forms a global model to predict the abnormal behavior of IoT nodes. The proposed approach utilizes a novel trust dataset consisting of 19 trust parameters from three major components: knowledge, experience, and reputation. To reduce the computational burden, FedTrust employs the concept of communities with dedicated servers to divide the dataset into smaller parts for more efficient training. The proposed approach is extensively evaluated in comparison to existing approaches in terms of accuracy, precision, and other metrics to validate its performance in IoT networks. Simulation results demonstrate the effectiveness of FedTrust by achieving a higher rate of detection and prediction of malicious and compromised nodes. Author
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Software and Communications Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Byung Seo photo

Kim, Byung Seo
Graduate School (Software and Communications Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE