Intelligent Edge Computing for IoT: Enhancing Security and Privacy

Lobna Osman, Olutosin Taiwo, A. Elashry, A. Ezugwu
{"title":"Intelligent Edge Computing for IoT: Enhancing Security and Privacy","authors":"Lobna Osman, Olutosin Taiwo, A. Elashry, A. Ezugwu","doi":"10.54216/jisiot.080105","DOIUrl":null,"url":null,"abstract":"Edge computing is a distributed computing paradigm that involves processing data at or near the edge of the internet of things (IoT) network, instead of centralized server. This makes the cyber-attacks increasingly sophisticated, and traditional security measures become no longer sufficient to protect against them. Concurrently, privacy concerns arise when sensitive data is involved in Edge computing applications containing confidential information. In this paper, we propose a privacy-preserved federated learning (FL) approach for cyber-attack detection in edge based IoT ecosystem. A novel lightweight convolutional Transformer network (LCT) network is designed to precisely identify cyber-attacks though learning attack patterns from IoT traffics in local edge devices, where model is personalized though fine-tuning. The privacy of model and data is preserved in our system via incorporating differential privacy and secure aggregation during the cooperative training process on edge devices. We evaluate our proposed approach on a real-world dataset of network traffic (NSL-KDD) containing various types of attacks, and the experimental results show that our personalized FL approach outperforms traditional FL in terms of detection accuracy. We also show that our approach is effective in handling non-stationary data and adapting to changes in the network environment.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Intelligent Systems and Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54216/jisiot.080105","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Edge computing is a distributed computing paradigm that involves processing data at or near the edge of the internet of things (IoT) network, instead of centralized server. This makes the cyber-attacks increasingly sophisticated, and traditional security measures become no longer sufficient to protect against them. Concurrently, privacy concerns arise when sensitive data is involved in Edge computing applications containing confidential information. In this paper, we propose a privacy-preserved federated learning (FL) approach for cyber-attack detection in edge based IoT ecosystem. A novel lightweight convolutional Transformer network (LCT) network is designed to precisely identify cyber-attacks though learning attack patterns from IoT traffics in local edge devices, where model is personalized though fine-tuning. The privacy of model and data is preserved in our system via incorporating differential privacy and secure aggregation during the cooperative training process on edge devices. We evaluate our proposed approach on a real-world dataset of network traffic (NSL-KDD) containing various types of attacks, and the experimental results show that our personalized FL approach outperforms traditional FL in terms of detection accuracy. We also show that our approach is effective in handling non-stationary data and adapting to changes in the network environment.
物联网智能边缘计算:增强安全性和隐私性
边缘计算是一种分布式计算范式,涉及在物联网(IoT)网络的边缘或附近处理数据,而不是集中式服务器。这使得网络攻击变得越来越复杂,传统的安全措施不再足以抵御它们。同时,当包含机密信息的边缘计算应用程序涉及敏感数据时,就会出现隐私问题。在本文中,我们提出了一种隐私保护的联邦学习(FL)方法,用于基于边缘的物联网生态系统中的网络攻击检测。一种新型的轻量级卷积变压器网络(LCT)网络旨在通过从本地边缘设备的物联网流量中学习攻击模式来精确识别网络攻击,其中模型通过微调进行个性化。我们的系统通过在边缘设备的协同训练过程中结合差分隐私和安全聚合来保护模型和数据的隐私。我们在包含各种类型攻击的真实网络流量数据集(NSL-KDD)上评估了我们提出的方法,实验结果表明,我们的个性化FL方法在检测精度方面优于传统FL。我们还表明,我们的方法在处理非平稳数据和适应网络环境变化方面是有效的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
CiteScore
1.70
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信