FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System
The Internet of Things (IoT) is a rapidly growing technology that has been generating increasing amounts of traffic from multiple devices. However, this growth in traffic has also created vulnerabilities that need to be addressed. To identify attacking traffic while preserving data, it is important...
Gespeichert in:
Veröffentlicht in: | Wireless personal communications 2024-08, Vol.137 (4), p.2121-2143 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2143 |
---|---|
container_issue | 4 |
container_start_page | 2121 |
container_title | Wireless personal communications |
container_volume | 137 |
creator | Alexander, R. Pradeep Mohan Kumar, K. |
description | The Internet of Things (IoT) is a rapidly growing technology that has been generating increasing amounts of traffic from multiple devices. However, this growth in traffic has also created vulnerabilities that need to be addressed. To identify attacking traffic while preserving data, it is important to quickly process intrusive data. Federated learning is a popular solution for decentralized training that preserves data, but it can also be susceptible to federated poisoning attacks caused by malicious clients. This work proposes a clustering-based client selection strategy to identify malicious clients based on their run time, followed by a trigger-set-based encryption mechanism that verifies the authenticity of the clients. This approach allows unreliable clients with plain text-based gradients to be ignored by the global model. The methodology was evaluated using the IoT23 dataset, and its efficiency, robustness, false alarms, and ability to handle some of the poisoning attacks that occur due to tuning and pruning were verified. The LeNet and DeepCtrl algorithms were used to determine detection accuracy, and after the implementation of a watermarking strategy, the detection accuracy improved significantly. For the DeepCtrl classifier, the detection accuracy improved from 89.90 to 99.8%, while for the LeNet classifier, it improved from 86.21 to 96.54%. This proposed methodology can be a useful tool for identifying attacking traffic and improving the security of IoT networks. |
doi_str_mv | 10.1007/s11277-024-11477-6 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3094802358</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3094802358</sourcerecordid><originalsourceid>FETCH-LOGICAL-c200t-425db2abbe7df5372d533fa1052d210cf03de8cd4a5515ab86df5125ba727db43</originalsourceid><addsrcrecordid>eNp9kEFPwyAYQInRxDn9A55IvOihCh-ldEdTnTZZ4qEz80ZoobOzayeww_691Gq8eYEv4b2P5CF0ScktJUTcOUpBiIhAHFEahyk5QhPKBUQpi9-O0YTMYBYlQOEUnTm3ISRoM5ggP1_lWVFEc6ONVd5ovAqn3Sr7EeZcG9XirG1M53FhWlP5pu9w4Qd0fcB1b3HeBb4zHvc1Xr433drh67xf3gwPdu8G_sH4X_PgvNmeo5Natc5c_NxT9Dp_XGbP0eLlKc_uF1EFhPgoBq5LUGVphK45E6A5Y7WihIMGSqqaMG3SSseKc8pVmSYBo8BLJUDoMmZTdDXu3dn-c2-cl5t-b7vwpWRkFqcEGE8DBSNV2d45a2q5s00IcJCUyKGuHOvKUFd-15VJkNgouQB3a2P_Vv9jfQHPin2P</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3094802358</pqid></control><display><type>article</type><title>FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System</title><source>SpringerLink Journals - AutoHoldings</source><creator>Alexander, R. ; Pradeep Mohan Kumar, K.</creator><creatorcontrib>Alexander, R. ; Pradeep Mohan Kumar, K.</creatorcontrib><description>The Internet of Things (IoT) is a rapidly growing technology that has been generating increasing amounts of traffic from multiple devices. However, this growth in traffic has also created vulnerabilities that need to be addressed. To identify attacking traffic while preserving data, it is important to quickly process intrusive data. Federated learning is a popular solution for decentralized training that preserves data, but it can also be susceptible to federated poisoning attacks caused by malicious clients. This work proposes a clustering-based client selection strategy to identify malicious clients based on their run time, followed by a trigger-set-based encryption mechanism that verifies the authenticity of the clients. This approach allows unreliable clients with plain text-based gradients to be ignored by the global model. The methodology was evaluated using the IoT23 dataset, and its efficiency, robustness, false alarms, and ability to handle some of the poisoning attacks that occur due to tuning and pruning were verified. The LeNet and DeepCtrl algorithms were used to determine detection accuracy, and after the implementation of a watermarking strategy, the detection accuracy improved significantly. For the DeepCtrl classifier, the detection accuracy improved from 89.90 to 99.8%, while for the LeNet classifier, it improved from 86.21 to 96.54%. This proposed methodology can be a useful tool for identifying attacking traffic and improving the security of IoT networks.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-024-11477-6</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Accuracy ; Algorithms ; Clients ; Clustering ; Communications Engineering ; Computer Communication Networks ; Engineering ; False alarms ; Federated learning ; Internet of Things ; Intrusion detection systems ; Machine learning ; Networks ; Poisoning ; Signal,Image and Speech Processing</subject><ispartof>Wireless personal communications, 2024-08, Vol.137 (4), p.2121-2143</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c200t-425db2abbe7df5372d533fa1052d210cf03de8cd4a5515ab86df5125ba727db43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-024-11477-6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-024-11477-6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Alexander, R.</creatorcontrib><creatorcontrib>Pradeep Mohan Kumar, K.</creatorcontrib><title>FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>The Internet of Things (IoT) is a rapidly growing technology that has been generating increasing amounts of traffic from multiple devices. However, this growth in traffic has also created vulnerabilities that need to be addressed. To identify attacking traffic while preserving data, it is important to quickly process intrusive data. Federated learning is a popular solution for decentralized training that preserves data, but it can also be susceptible to federated poisoning attacks caused by malicious clients. This work proposes a clustering-based client selection strategy to identify malicious clients based on their run time, followed by a trigger-set-based encryption mechanism that verifies the authenticity of the clients. This approach allows unreliable clients with plain text-based gradients to be ignored by the global model. The methodology was evaluated using the IoT23 dataset, and its efficiency, robustness, false alarms, and ability to handle some of the poisoning attacks that occur due to tuning and pruning were verified. The LeNet and DeepCtrl algorithms were used to determine detection accuracy, and after the implementation of a watermarking strategy, the detection accuracy improved significantly. For the DeepCtrl classifier, the detection accuracy improved from 89.90 to 99.8%, while for the LeNet classifier, it improved from 86.21 to 96.54%. This proposed methodology can be a useful tool for identifying attacking traffic and improving the security of IoT networks.</description><subject>Accuracy</subject><subject>Algorithms</subject><subject>Clients</subject><subject>Clustering</subject><subject>Communications Engineering</subject><subject>Computer Communication Networks</subject><subject>Engineering</subject><subject>False alarms</subject><subject>Federated learning</subject><subject>Internet of Things</subject><subject>Intrusion detection systems</subject><subject>Machine learning</subject><subject>Networks</subject><subject>Poisoning</subject><subject>Signal,Image and Speech Processing</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kEFPwyAYQInRxDn9A55IvOihCh-ldEdTnTZZ4qEz80ZoobOzayeww_691Gq8eYEv4b2P5CF0ScktJUTcOUpBiIhAHFEahyk5QhPKBUQpi9-O0YTMYBYlQOEUnTm3ISRoM5ggP1_lWVFEc6ONVd5ovAqn3Sr7EeZcG9XirG1M53FhWlP5pu9w4Qd0fcB1b3HeBb4zHvc1Xr433drh67xf3gwPdu8G_sH4X_PgvNmeo5Natc5c_NxT9Dp_XGbP0eLlKc_uF1EFhPgoBq5LUGVphK45E6A5Y7WihIMGSqqaMG3SSseKc8pVmSYBo8BLJUDoMmZTdDXu3dn-c2-cl5t-b7vwpWRkFqcEGE8DBSNV2d45a2q5s00IcJCUyKGuHOvKUFd-15VJkNgouQB3a2P_Vv9jfQHPin2P</recordid><startdate>20240801</startdate><enddate>20240801</enddate><creator>Alexander, R.</creator><creator>Pradeep Mohan Kumar, K.</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20240801</creationdate><title>FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System</title><author>Alexander, R. ; Pradeep Mohan Kumar, K.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c200t-425db2abbe7df5372d533fa1052d210cf03de8cd4a5515ab86df5125ba727db43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Accuracy</topic><topic>Algorithms</topic><topic>Clients</topic><topic>Clustering</topic><topic>Communications Engineering</topic><topic>Computer Communication Networks</topic><topic>Engineering</topic><topic>False alarms</topic><topic>Federated learning</topic><topic>Internet of Things</topic><topic>Intrusion detection systems</topic><topic>Machine learning</topic><topic>Networks</topic><topic>Poisoning</topic><topic>Signal,Image and Speech Processing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Alexander, R.</creatorcontrib><creatorcontrib>Pradeep Mohan Kumar, K.</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Alexander, R.</au><au>Pradeep Mohan Kumar, K.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2024-08-01</date><risdate>2024</risdate><volume>137</volume><issue>4</issue><spage>2121</spage><epage>2143</epage><pages>2121-2143</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>The Internet of Things (IoT) is a rapidly growing technology that has been generating increasing amounts of traffic from multiple devices. However, this growth in traffic has also created vulnerabilities that need to be addressed. To identify attacking traffic while preserving data, it is important to quickly process intrusive data. Federated learning is a popular solution for decentralized training that preserves data, but it can also be susceptible to federated poisoning attacks caused by malicious clients. This work proposes a clustering-based client selection strategy to identify malicious clients based on their run time, followed by a trigger-set-based encryption mechanism that verifies the authenticity of the clients. This approach allows unreliable clients with plain text-based gradients to be ignored by the global model. The methodology was evaluated using the IoT23 dataset, and its efficiency, robustness, false alarms, and ability to handle some of the poisoning attacks that occur due to tuning and pruning were verified. The LeNet and DeepCtrl algorithms were used to determine detection accuracy, and after the implementation of a watermarking strategy, the detection accuracy improved significantly. For the DeepCtrl classifier, the detection accuracy improved from 89.90 to 99.8%, while for the LeNet classifier, it improved from 86.21 to 96.54%. This proposed methodology can be a useful tool for identifying attacking traffic and improving the security of IoT networks.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-024-11477-6</doi><tpages>23</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0929-6212 |
ispartof | Wireless personal communications, 2024-08, Vol.137 (4), p.2121-2143 |
issn | 0929-6212 1572-834X |
language | eng |
recordid | cdi_proquest_journals_3094802358 |
source | SpringerLink Journals - AutoHoldings |
subjects | Accuracy Algorithms Clients Clustering Communications Engineering Computer Communication Networks Engineering False alarms Federated learning Internet of Things Intrusion detection systems Machine learning Networks Poisoning Signal,Image and Speech Processing |
title | FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T14%3A48%3A51IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=FWICSS-Federated%20Watermarked%20Ideal%20Client%20Selection%20Strategy%20for%20Internet%20of%20Things%20(IoT)%20Intrusion%20Detection%20System&rft.jtitle=Wireless%20personal%20communications&rft.au=Alexander,%20R.&rft.date=2024-08-01&rft.volume=137&rft.issue=4&rft.spage=2121&rft.epage=2143&rft.pages=2121-2143&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-024-11477-6&rft_dat=%3Cproquest_cross%3E3094802358%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3094802358&rft_id=info:pmid/&rfr_iscdi=true |