FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System

The Internet of Things (IoT) is a rapidly growing technology that has been generating increasing amounts of traffic from multiple devices. However, this growth in traffic has also created vulnerabilities that need to be addressed. To identify attacking traffic while preserving data, it is important...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless personal communications 2024-08, Vol.137 (4), p.2121-2143
Hauptverfasser: Alexander, R., Pradeep Mohan Kumar, K.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2143
container_issue 4
container_start_page 2121
container_title Wireless personal communications
container_volume 137
creator Alexander, R.
Pradeep Mohan Kumar, K.
description The Internet of Things (IoT) is a rapidly growing technology that has been generating increasing amounts of traffic from multiple devices. However, this growth in traffic has also created vulnerabilities that need to be addressed. To identify attacking traffic while preserving data, it is important to quickly process intrusive data. Federated learning is a popular solution for decentralized training that preserves data, but it can also be susceptible to federated poisoning attacks caused by malicious clients. This work proposes a clustering-based client selection strategy to identify malicious clients based on their run time, followed by a trigger-set-based encryption mechanism that verifies the authenticity of the clients. This approach allows unreliable clients with plain text-based gradients to be ignored by the global model. The methodology was evaluated using the IoT23 dataset, and its efficiency, robustness, false alarms, and ability to handle some of the poisoning attacks that occur due to tuning and pruning were verified. The LeNet and DeepCtrl algorithms were used to determine detection accuracy, and after the implementation of a watermarking strategy, the detection accuracy improved significantly. For the DeepCtrl classifier, the detection accuracy improved from 89.90 to 99.8%, while for the LeNet classifier, it improved from 86.21 to 96.54%. This proposed methodology can be a useful tool for identifying attacking traffic and improving the security of IoT networks.
doi_str_mv 10.1007/s11277-024-11477-6
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3094802358</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3094802358</sourcerecordid><originalsourceid>FETCH-LOGICAL-c200t-425db2abbe7df5372d533fa1052d210cf03de8cd4a5515ab86df5125ba727db43</originalsourceid><addsrcrecordid>eNp9kEFPwyAYQInRxDn9A55IvOihCh-ldEdTnTZZ4qEz80ZoobOzayeww_691Gq8eYEv4b2P5CF0ScktJUTcOUpBiIhAHFEahyk5QhPKBUQpi9-O0YTMYBYlQOEUnTm3ISRoM5ggP1_lWVFEc6ONVd5ovAqn3Sr7EeZcG9XirG1M53FhWlP5pu9w4Qd0fcB1b3HeBb4zHvc1Xr433drh67xf3gwPdu8G_sH4X_PgvNmeo5Natc5c_NxT9Dp_XGbP0eLlKc_uF1EFhPgoBq5LUGVphK45E6A5Y7WihIMGSqqaMG3SSseKc8pVmSYBo8BLJUDoMmZTdDXu3dn-c2-cl5t-b7vwpWRkFqcEGE8DBSNV2d45a2q5s00IcJCUyKGuHOvKUFd-15VJkNgouQB3a2P_Vv9jfQHPin2P</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3094802358</pqid></control><display><type>article</type><title>FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System</title><source>SpringerLink Journals - AutoHoldings</source><creator>Alexander, R. ; Pradeep Mohan Kumar, K.</creator><creatorcontrib>Alexander, R. ; Pradeep Mohan Kumar, K.</creatorcontrib><description>The Internet of Things (IoT) is a rapidly growing technology that has been generating increasing amounts of traffic from multiple devices. However, this growth in traffic has also created vulnerabilities that need to be addressed. To identify attacking traffic while preserving data, it is important to quickly process intrusive data. Federated learning is a popular solution for decentralized training that preserves data, but it can also be susceptible to federated poisoning attacks caused by malicious clients. This work proposes a clustering-based client selection strategy to identify malicious clients based on their run time, followed by a trigger-set-based encryption mechanism that verifies the authenticity of the clients. This approach allows unreliable clients with plain text-based gradients to be ignored by the global model. The methodology was evaluated using the IoT23 dataset, and its efficiency, robustness, false alarms, and ability to handle some of the poisoning attacks that occur due to tuning and pruning were verified. The LeNet and DeepCtrl algorithms were used to determine detection accuracy, and after the implementation of a watermarking strategy, the detection accuracy improved significantly. For the DeepCtrl classifier, the detection accuracy improved from 89.90 to 99.8%, while for the LeNet classifier, it improved from 86.21 to 96.54%. This proposed methodology can be a useful tool for identifying attacking traffic and improving the security of IoT networks.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-024-11477-6</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Accuracy ; Algorithms ; Clients ; Clustering ; Communications Engineering ; Computer Communication Networks ; Engineering ; False alarms ; Federated learning ; Internet of Things ; Intrusion detection systems ; Machine learning ; Networks ; Poisoning ; Signal,Image and Speech Processing</subject><ispartof>Wireless personal communications, 2024-08, Vol.137 (4), p.2121-2143</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c200t-425db2abbe7df5372d533fa1052d210cf03de8cd4a5515ab86df5125ba727db43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-024-11477-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-024-11477-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Alexander, R.</creatorcontrib><creatorcontrib>Pradeep Mohan Kumar, K.</creatorcontrib><title>FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>The Internet of Things (IoT) is a rapidly growing technology that has been generating increasing amounts of traffic from multiple devices. However, this growth in traffic has also created vulnerabilities that need to be addressed. To identify attacking traffic while preserving data, it is important to quickly process intrusive data. Federated learning is a popular solution for decentralized training that preserves data, but it can also be susceptible to federated poisoning attacks caused by malicious clients. This work proposes a clustering-based client selection strategy to identify malicious clients based on their run time, followed by a trigger-set-based encryption mechanism that verifies the authenticity of the clients. This approach allows unreliable clients with plain text-based gradients to be ignored by the global model. The methodology was evaluated using the IoT23 dataset, and its efficiency, robustness, false alarms, and ability to handle some of the poisoning attacks that occur due to tuning and pruning were verified. The LeNet and DeepCtrl algorithms were used to determine detection accuracy, and after the implementation of a watermarking strategy, the detection accuracy improved significantly. For the DeepCtrl classifier, the detection accuracy improved from 89.90 to 99.8%, while for the LeNet classifier, it improved from 86.21 to 96.54%. This proposed methodology can be a useful tool for identifying attacking traffic and improving the security of IoT networks.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Clients</subject><subject>Clustering</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Engineering</subject><subject>False alarms</subject><subject>Federated learning</subject><subject>Internet of Things</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Networks</subject><subject>Poisoning</subject><subject>Signal,Image and Speech Processing</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kEFPwyAYQInRxDn9A55IvOihCh-ldEdTnTZZ4qEz80ZoobOzayeww_691Gq8eYEv4b2P5CF0ScktJUTcOUpBiIhAHFEahyk5QhPKBUQpi9-O0YTMYBYlQOEUnTm3ISRoM5ggP1_lWVFEc6ONVd5ovAqn3Sr7EeZcG9XirG1M53FhWlP5pu9w4Qd0fcB1b3HeBb4zHvc1Xr433drh67xf3gwPdu8G_sH4X_PgvNmeo5Natc5c_NxT9Dp_XGbP0eLlKc_uF1EFhPgoBq5LUGVphK45E6A5Y7WihIMGSqqaMG3SSseKc8pVmSYBo8BLJUDoMmZTdDXu3dn-c2-cl5t-b7vwpWRkFqcEGE8DBSNV2d45a2q5s00IcJCUyKGuHOvKUFd-15VJkNgouQB3a2P_Vv9jfQHPin2P</recordid><startdate>20240801</startdate><enddate>20240801</enddate><creator>Alexander, R.</creator><creator>Pradeep Mohan Kumar, K.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20240801</creationdate><title>FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System</title><author>Alexander, R. ; Pradeep Mohan Kumar, K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c200t-425db2abbe7df5372d533fa1052d210cf03de8cd4a5515ab86df5125ba727db43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Clients</topic><topic>Clustering</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Engineering</topic><topic>False alarms</topic><topic>Federated learning</topic><topic>Internet of Things</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Networks</topic><topic>Poisoning</topic><topic>Signal,Image and Speech Processing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alexander, R.</creatorcontrib><creatorcontrib>Pradeep Mohan Kumar, K.</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alexander, R.</au><au>Pradeep Mohan Kumar, K.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2024-08-01</date><risdate>2024</risdate><volume>137</volume><issue>4</issue><spage>2121</spage><epage>2143</epage><pages>2121-2143</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>The Internet of Things (IoT) is a rapidly growing technology that has been generating increasing amounts of traffic from multiple devices. However, this growth in traffic has also created vulnerabilities that need to be addressed. To identify attacking traffic while preserving data, it is important to quickly process intrusive data. Federated learning is a popular solution for decentralized training that preserves data, but it can also be susceptible to federated poisoning attacks caused by malicious clients. This work proposes a clustering-based client selection strategy to identify malicious clients based on their run time, followed by a trigger-set-based encryption mechanism that verifies the authenticity of the clients. This approach allows unreliable clients with plain text-based gradients to be ignored by the global model. The methodology was evaluated using the IoT23 dataset, and its efficiency, robustness, false alarms, and ability to handle some of the poisoning attacks that occur due to tuning and pruning were verified. The LeNet and DeepCtrl algorithms were used to determine detection accuracy, and after the implementation of a watermarking strategy, the detection accuracy improved significantly. For the DeepCtrl classifier, the detection accuracy improved from 89.90 to 99.8%, while for the LeNet classifier, it improved from 86.21 to 96.54%. This proposed methodology can be a useful tool for identifying attacking traffic and improving the security of IoT networks.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-024-11477-6</doi><tpages>23</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0929-6212
ispartof Wireless personal communications, 2024-08, Vol.137 (4), p.2121-2143
issn 0929-6212
1572-834X
language eng
recordid cdi_proquest_journals_3094802358
source SpringerLink Journals - AutoHoldings
subjects Accuracy
Algorithms
Clients
Clustering
Communications Engineering
Computer Communication Networks
Engineering
False alarms
Federated learning
Internet of Things
Intrusion detection systems
Machine learning
Networks
Poisoning
Signal,Image and Speech Processing
title FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T14%3A48%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=FWICSS-Federated%20Watermarked%20Ideal%20Client%20Selection%20Strategy%20for%20Internet%20of%20Things%20(IoT)%20Intrusion%20Detection%20System&rft.jtitle=Wireless%20personal%20communications&rft.au=Alexander,%20R.&rft.date=2024-08-01&rft.volume=137&rft.issue=4&rft.spage=2121&rft.epage=2143&rft.pages=2121-2143&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-024-11477-6&rft_dat=%3Cproquest_cross%3E3094802358%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3094802358&rft_id=info:pmid/&rfr_iscdi=true