{"title":"Temporal transaction network anomaly detection for Industrial Internet of Things with federated graph neural networks","authors":"Qingyong Wang , Beibei Han","doi":"10.1016/j.cie.2025.111122","DOIUrl":null,"url":null,"abstract":"<div><div>The Industrial Internet of Things (IIoT) has experienced significant advancements in recent years, resulting in a considerable increase in the volume of data generated by interconnected devices. This surge in data has created new opportunities to enhance the quality of service in machine learning applications within the IIoT through data sharing. Among these applications, anomaly detection in transaction networks utilizing graph neural networks (GNNs) has emerged as a prominent research topic. However, most current anomaly detection methods either focus exclusively on single-faceted transaction information or assume that multiple types of transaction network data are centrally stored or shared. In the field of IIoT scenario, privacy concerns and legal restrictions frequently hinder data centralization, resulting in data islands, which refer to decentralized multisource transaction information. Therefore, we propose a novel <u>fed</u>erated <u>G</u>NNs framework for the <u>t</u>emporal <u>t</u>ransaction network <u>a</u>nomaly <u>d</u>etection, designated as FedGT<span><math><msup><mrow></mrow><mrow><mn>2</mn></mrow></msup></math></span>AD. Specifically, the training process is bifurcated: client-side privacy temporal transaction network feature extraction is conducted locally at its corresponding client, while privacy-protected feature aggregation from all clients occurs on a trusted server. To facilitate more effective anomaly detection, each client initially models edge features and temporal transaction information as node attributes, along with network snapshots for subsequent graph feature computation with GNNs. During the integration process, the server integrates the node-level embedding and computes multisource transaction network features from all clients following a differential privacy mechanism to ensure client-side data security. The experimental results on three decentralized multisource transaction networks demonstrated that FedGT<span><math><msup><mrow></mrow><mrow><mn>2</mn></mrow></msup></math></span>AD outperforms baseline methods by 0.9% to 2.7% in accuracy. Overall, FedGT<span><math><msup><mrow></mrow><mrow><mn>2</mn></mrow></msup></math></span>AD offers a promising approach for mining decentralized multisource transaction networks while preserving privacy in anomaly detection tasks.</div></div>","PeriodicalId":55220,"journal":{"name":"Computers & Industrial Engineering","volume":"205 ","pages":"Article 111122"},"PeriodicalIF":6.7000,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Industrial Engineering","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0360835225002682","RegionNum":1,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
The Industrial Internet of Things (IIoT) has experienced significant advancements in recent years, resulting in a considerable increase in the volume of data generated by interconnected devices. This surge in data has created new opportunities to enhance the quality of service in machine learning applications within the IIoT through data sharing. Among these applications, anomaly detection in transaction networks utilizing graph neural networks (GNNs) has emerged as a prominent research topic. However, most current anomaly detection methods either focus exclusively on single-faceted transaction information or assume that multiple types of transaction network data are centrally stored or shared. In the field of IIoT scenario, privacy concerns and legal restrictions frequently hinder data centralization, resulting in data islands, which refer to decentralized multisource transaction information. Therefore, we propose a novel federated GNNs framework for the temporal transaction network anomaly detection, designated as FedGTAD. Specifically, the training process is bifurcated: client-side privacy temporal transaction network feature extraction is conducted locally at its corresponding client, while privacy-protected feature aggregation from all clients occurs on a trusted server. To facilitate more effective anomaly detection, each client initially models edge features and temporal transaction information as node attributes, along with network snapshots for subsequent graph feature computation with GNNs. During the integration process, the server integrates the node-level embedding and computes multisource transaction network features from all clients following a differential privacy mechanism to ensure client-side data security. The experimental results on three decentralized multisource transaction networks demonstrated that FedGTAD outperforms baseline methods by 0.9% to 2.7% in accuracy. Overall, FedGTAD offers a promising approach for mining decentralized multisource transaction networks while preserving privacy in anomaly detection tasks.
期刊介绍:
Computers & Industrial Engineering (CAIE) is dedicated to researchers, educators, and practitioners in industrial engineering and related fields. Pioneering the integration of computers in research, education, and practice, industrial engineering has evolved to make computers and electronic communication integral to its domain. CAIE publishes original contributions focusing on the development of novel computerized methodologies to address industrial engineering problems. It also highlights the applications of these methodologies to issues within the broader industrial engineering and associated communities. The journal actively encourages submissions that push the boundaries of fundamental theories and concepts in industrial engineering techniques.