Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Securing IoT with Deep Federated Learning: A Trust-based Malicious Node Identification Approach

Full metadata record
DC Field Value Language
dc.contributor.authorAwan, K.A.-
dc.contributor.authorDin, I.U.-
dc.contributor.authorZareei, M.-
dc.contributor.authorAlmogren, A.-
dc.contributor.authorSeo-Kim, B.-
dc.contributor.authorDiaz, J.A.P.-
dc.date.accessioned2023-07-11T02:40:10Z-
dc.date.available2023-07-11T02:40:10Z-
dc.date.created2023-07-11-
dc.date.issued2023-
dc.identifier.issn2169-3536-
dc.identifier.urihttps://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/31493-
dc.description.abstractThe Internet of Things (IoT) has revolutionized the world with its diverse applications and smart connected devices. These IoT devices communicate with each other without human intervention and make life easier in many ways. However, the independence of these devices raises several significant concerns, such as security and privacy preservation due to malicious and compromised nodes within the network. Trust management has been introduced as a less computationally intensive alternative to traditional approaches such as cryptography. The proposed FedTrust approach addresses these challenges by designing a method for identifying malicious and compromised nodes using federated learning. FedTrust trains edge nodes with a provided dataset and forms a global model to predict the abnormal behavior of IoT nodes. The proposed approach utilizes a novel trust dataset consisting of 19 trust parameters from three major components: knowledge, experience, and reputation. To reduce the computational burden, FedTrust employs the concept of communities with dedicated servers to divide the dataset into smaller parts for more efficient training. The proposed approach is extensively evaluated in comparison to existing approaches in terms of accuracy, precision, and other metrics to validate its performance in IoT networks. Simulation results demonstrate the effectiveness of FedTrust by achieving a higher rate of detection and prediction of malicious and compromised nodes. Author-
dc.language영어-
dc.language.isoen-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.titleSecuring IoT with Deep Federated Learning: A Trust-based Malicious Node Identification Approach-
dc.typeArticle-
dc.contributor.affiliatedAuthorSeo-Kim, B.-
dc.identifier.doi10.1109/ACCESS.2023.3284677-
dc.identifier.scopusid2-s2.0-85162701159-
dc.identifier.wosid001016811500001-
dc.identifier.bibliographicCitationIEEE Access, v.11, pp.1 - 1-
dc.relation.isPartOfIEEE Access-
dc.citation.titleIEEE Access-
dc.citation.volume11-
dc.citation.startPage1-
dc.citation.endPage1-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorBlockchains-
dc.subject.keywordAuthorComputational modeling-
dc.subject.keywordAuthorDeep learning-
dc.subject.keywordAuthorDeep Learning-
dc.subject.keywordAuthorFederated Learning-
dc.subject.keywordAuthorFederated learning-
dc.subject.keywordAuthorInternet of Things-
dc.subject.keywordAuthorInternet of Things-
dc.subject.keywordAuthorMalicious Nodes-
dc.subject.keywordAuthorMalware-
dc.subject.keywordAuthorPrivacy Preservation-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorTrust management-
dc.subject.keywordAuthorTrust Management-
dc.subject.keywordAuthorTrustworthiness-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Software and Communications Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Kim, Byung Seo photo

Kim, Byung Seo
Graduate School (Software and Communications Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE