Securing IoT with Deep Federated Learning: A Trust-based Malicious Node Identification Approach
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Awan, K.A. | - |
dc.contributor.author | Din, I.U. | - |
dc.contributor.author | Zareei, M. | - |
dc.contributor.author | Almogren, A. | - |
dc.contributor.author | Seo-Kim, B. | - |
dc.contributor.author | Diaz, J.A.P. | - |
dc.date.accessioned | 2023-07-11T02:40:10Z | - |
dc.date.available | 2023-07-11T02:40:10Z | - |
dc.date.created | 2023-07-11 | - |
dc.date.issued | 2023 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hongik/handle/2020.sw.hongik/31493 | - |
dc.description.abstract | The Internet of Things (IoT) has revolutionized the world with its diverse applications and smart connected devices. These IoT devices communicate with each other without human intervention and make life easier in many ways. However, the independence of these devices raises several significant concerns, such as security and privacy preservation due to malicious and compromised nodes within the network. Trust management has been introduced as a less computationally intensive alternative to traditional approaches such as cryptography. The proposed FedTrust approach addresses these challenges by designing a method for identifying malicious and compromised nodes using federated learning. FedTrust trains edge nodes with a provided dataset and forms a global model to predict the abnormal behavior of IoT nodes. The proposed approach utilizes a novel trust dataset consisting of 19 trust parameters from three major components: knowledge, experience, and reputation. To reduce the computational burden, FedTrust employs the concept of communities with dedicated servers to divide the dataset into smaller parts for more efficient training. The proposed approach is extensively evaluated in comparison to existing approaches in terms of accuracy, precision, and other metrics to validate its performance in IoT networks. Simulation results demonstrate the effectiveness of FedTrust by achieving a higher rate of detection and prediction of malicious and compromised nodes. Author | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.title | Securing IoT with Deep Federated Learning: A Trust-based Malicious Node Identification Approach | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Seo-Kim, B. | - |
dc.identifier.doi | 10.1109/ACCESS.2023.3284677 | - |
dc.identifier.scopusid | 2-s2.0-85162701159 | - |
dc.identifier.wosid | 001016811500001 | - |
dc.identifier.bibliographicCitation | IEEE Access, v.11, pp.1 - 1 | - |
dc.relation.isPartOf | IEEE Access | - |
dc.citation.title | IEEE Access | - |
dc.citation.volume | 11 | - |
dc.citation.startPage | 1 | - |
dc.citation.endPage | 1 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | Y | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordAuthor | Blockchains | - |
dc.subject.keywordAuthor | Computational modeling | - |
dc.subject.keywordAuthor | Deep learning | - |
dc.subject.keywordAuthor | Deep Learning | - |
dc.subject.keywordAuthor | Federated Learning | - |
dc.subject.keywordAuthor | Federated learning | - |
dc.subject.keywordAuthor | Internet of Things | - |
dc.subject.keywordAuthor | Internet of Things | - |
dc.subject.keywordAuthor | Malicious Nodes | - |
dc.subject.keywordAuthor | Malware | - |
dc.subject.keywordAuthor | Privacy Preservation | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Trust management | - |
dc.subject.keywordAuthor | Trust Management | - |
dc.subject.keywordAuthor | Trustworthiness | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
94, Wausan-ro, Mapo-gu, Seoul, 04066, Korea02-320-1314
COPYRIGHT 2020 HONGIK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.