Adaptive federated learning scheme for recognition of malicious attacks in an IoT network
Computing - Trang 1-16 - 2023
Tóm tắt
The Internet of Things (IoT) is crucial for deploying a novel Artificial Intelligence (AI) model for both network and application management. However, using classical centralized learning algorithms in the IoT environment is challenging, given massively distributed private datasets. Advancements in AI have helped us solve various use cases, but it operates under two significant challenges. Firstly, the data exists in separate clusters, and secondly, the current AI has limited data privacy and security. Federated learning (FL) aims to preserve data privacy through distributed learning methods that keep the data in storage silos. Likewise, differential privacy improves data privacy by measuring the privacy loss in communication among the elements of FL. The paper proposes two adaptive approaches for making model training differentially private in a vertical federated environment. The first one uses random feature selection to train different machine learning models, and performance improvement is also proposed. The second approach uses a tree structure, i.e., Classification and Regression Trees, using some defined constraints. Further, we created a scheme to help identify malicious users/devices in a federated network cluster using parity checks for every FL iteration.
Tài liệu tham khảo
Imteaj A, Thakker U, Wang S, Li J, Amini MH (2021) A survey on federated learning for resource-constrained IoT devices. IEEE Internet Things J 9:1–24
Ali M, Karimipour H, Tariq M (2021) Integration of blockchain and federated learning for internet of things: recent advances and future challenges. Comput Secur 108:102355
Chhikara P, Tekchandani R, Kumar N, Guizani M, Hassan MM (2021) Federated learning and autonomous UAVs for hazardous zone detection and AQI prediction in IoT environment. IEEE Internet Things J 8(20):15456–15467. https://doi.org/10.1109/JIOT.2021.3074523
Singh SK, Salim MM, Cha J, Pan Y, Park JH (2020) Machine learning-based network sub-slicing framework in a sustainable 5g environment. Sustainability 12(15):6250
Ham H-S, Kim H-H, Kim M-S, Choi M-J (2014) Linear SVM-based android malware detection for reliable IoT services. J Appl Math. https://doi.org/10.1155/2014/594501
Bhatia M, Sood SK, Manocha A (2020) Fog-inspired smart home environment for domestic animal healthcare. Comput Commun 160:521–533
Hodo E, Bellekens X, Hamilton A, Dubouilh P-L, Iorkyase E, Tachtatzis C, Atkinson R (2016) Threat analysis of IoT networks using artificial neural network intrusion detection system. In: International symposium on networks, computers and communications (ISNCC). IEEE, pp 1–6
Chhikara P, Gupta P, Singh P, Bhatia T (2021) A deep transfer learning based model for automatic detection of covid-19 from chest x-rays. Turk J Electr Eng Comput Sci 29(SI–1):2663–2679
Barnawi A, Chhikara P, Tekchandani R, Kumar N, Boulares M (2021) A CNN-based scheme for covid-19 detection with emergency services provisions using an optimal path planning. Multimed Syst. https://doi.org/10.1007/s00530-021-00833-2
Hewamalage H, Bergmeir C, Bandara K (2021) Recurrent neural networks for time series forecasting: current status and future directions. Int J Forecast 37(1):388–427
Thar K, Tran NH, Oo TZ, Hong CS (2018) DeepMEC: mobile edge caching using deep learning. IEEE Access 6:78260–78275
Khan LU, Saad W, Han Z, Hossain E, Hong CS (2021) Federated learning for internet of things: recent advances, taxonomy, and open challenges. IEEE Commun Surv Tutor 23:1759–1799
McMahan B, Moore E, Ramage D, Hampson S, y Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics. PMLR, pp 1273–1282
Li T, Sahu AK, Zaheer M, Sanjabi M, Talwalkar A, Smith V (2018) Federated optimization in heterogeneous networks. arXiv preprint. arXiv:1812.06127
Li T, Sanjabi M, Beirami A, Smith V (2019) Fair resource allocation in federated learning. In: International conference on learning representations
Fallah A, Mokhtari A, Ozdaglar A (2020) Personalized federated learning with theoretical guarantees: a model-agnostic meta-learning approach. Adv Neural Inf Process Syst 33:3557–3568
Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: concept and applications. ACM Trans Intell Syst Technol (TIST) 10(2):1–19
Aono Y, Hayashi T, Wang L, Moriai S et al (2017) Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans Inf Forensics Secur 13(5):1333–1345
Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the ACM SIGSAC conference on computer and communications security, pp 1175–1191
Hu Y, Niu D, Yang J, Zhou S (2019) FDML: a collaborative machine learning framework for distributed features. In: Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery and data mining, pp 2232–2240
Chhikara P, Singh P, Tekchandani R, Kumar N, Guizani M (2021) Federated learning meets human emotions: a decentralized framework for human-computer interaction for IoT applications. IEEE Internet Things J 8(8):6949–6962. https://doi.org/10.1109/JIOT.2020.3037207
Melis L, Song C, De Cristofaro E, Shmatikov V (2019) Exploiting unintended feature leakage in collaborative learning. In: IEEE symposium on security and privacy (SP). IEEE, pp 691–706
Bhagoji AN, Chakraborty S, Mittal P, Calo S (2019) Analyzing federated learning through an adversarial lens. In: International conference on machine learning. PMLR, pp 634–643
Zhu H, Xu J, Liu S, Jin Y (2021) Federated learning on non-IID data: a survey. Neurocomputing 465:371–390
Papernot N, Abadi M, Erlingsson U, Goodfellow I, Talwar K (2016) Semi-supervised knowledge transfer for deep learning from private training data. arXiv preprint. arXiv:1610.05755
Chhikara P, Jain N, Tekchandani R, Kumar N (2020) Data dimensionality reduction techniques for industry 4.0: research results, challenges, and future research directions. Softw Pract Exp 52:658–688
Breiman L (1996) Bagging predictors. Mach Learn 24(2):123–140
Quinlan JR (1986) Induction of decision trees. Mach Learn 1(1):81–106
Zhang J, Chen B, Cheng X, Binh HTT, Yu S (2021) Poisongan: generative poisoning attacks against federated learning in edge computing systems. IEEE Internet Things J 8(5):3310–3322. https://doi.org/10.1109/JIOT.2020.3023126
Biggio B, Nelson B, Laskov P (2012) Poisoning attacks against support vector machines. In: Proceedings of the 29th International conference on international conference on machine learning, pp 1467–1474
Jere MS, Farnan T, Koushanfar F (2020) A taxonomy of attacks on federated learning. IEEE Secur Priv 19(2):20–28
Bagdasaryan E, Veit A, Hua Y, Estrin D, Shmatikov V (2020) How to backdoor federated learning. In: International conference on artificial intelligence and statistics. PMLR, pp 2938–2948
Bhagoji AN, Chakraborty S, Mittal P, Calo S (2019) Analyzing federated learning through an adversarial lens. In: International conference on machine learning. PMLR, pp 634–643
Aiken W, Kim H, Woo S, Ryoo J (2021) Neural network laundering: removing black-box backdoor watermarks from deep neural networks. Comput Secur 106:102277