SecureIIoT Environment: Federated Learning Empowered Approach for Securing IIoT From Data Breach
Journal article
Authors | Aaisha Makkar, Tae Woo Kim, Ashutosh Kumar Singh, Jungho Kang and Jong Hyuk Park |
---|---|
Abstract | The growing congruence of gadgets today resulted in a numerous type of cyber attacks. A similar trend occurs with the industrial Internet of Things (IIoT), wherein increasing data created by connected equipment offers up new opportunities for enhancing service quality for new applications. But, security has become a major design priority for smart devices since the introduction of the IIoT. However, data providers have significant challenges in exchanging their data between different cyber physical systems due to privacy and security concerns (e.g., data imbalance and leakage). In this article, we developed a safe data sharing architecture for various IIoT devices using federated learning (FL). The proposed architecture incorporates FL into the edge computing consensus process, allowing the consensus computing activity to be used for federated training as well. The proposed framework achieves high efficiency, and better security, according to numerical findings generated by experimenting deep learning models. More precisely, the proposed framework named as SecureIIoT, is able to achieve 99.79% accuracy by detecting attacks as a binary classification problem. |
Keywords | Cyber security; deep learning; edge computing; federated learning (FL); industrial Internet of things (IIoT) |
Year | 2022 |
Journal | IEEE Transactions on Industrial Informatics |
Journal citation | 18 (9), pp. 6406 - 6414 |
Publisher | IEEE |
ISSN | 1941-0050 |
Digital Object Identifier (DOI) | https://doi.org/10.1109/tii.2022.3149902 |
Web address (URL) | https://ieeexplore.ieee.org/document/9709089 |
Output status | Published |
Publication dates | |
Online | 09 Sep 2022 |
Publication process dates | |
Deposited | 22 May 2023 |
https://repository.derby.ac.uk/item/9yx2v/secureiiot-environment-federated-learning-empowered-approach-for-securing-iiot-from-data-breach
61
total views0
total downloads2
views this month0
downloads this month