{"title":"FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things(物联网)入侵检测系统","authors":"R. Alexander, K. Pradeep Mohan Kumar","doi":"10.1007/s11277-024-11477-6","DOIUrl":null,"url":null,"abstract":"<p>The Internet of Things (IoT) is a rapidly growing technology that has been generating increasing amounts of traffic from multiple devices. However, this growth in traffic has also created vulnerabilities that need to be addressed. To identify attacking traffic while preserving data, it is important to quickly process intrusive data. Federated learning is a popular solution for decentralized training that preserves data, but it can also be susceptible to federated poisoning attacks caused by malicious clients. This work proposes a clustering-based client selection strategy to identify malicious clients based on their run time, followed by a trigger-set-based encryption mechanism that verifies the authenticity of the clients. This approach allows unreliable clients with plain text-based gradients to be ignored by the global model. The methodology was evaluated using the IoT23 dataset, and its efficiency, robustness, false alarms, and ability to handle some of the poisoning attacks that occur due to tuning and pruning were verified. The LeNet and DeepCtrl algorithms were used to determine detection accuracy, and after the implementation of a watermarking strategy, the detection accuracy improved significantly. For the DeepCtrl classifier, the detection accuracy improved from 89.90 to 99.8%, while for the LeNet classifier, it improved from 86.21 to 96.54%. This proposed methodology can be a useful tool for identifying attacking traffic and improving the security of IoT networks.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"39 1","pages":""},"PeriodicalIF":1.9000,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System\",\"authors\":\"R. Alexander, K. Pradeep Mohan Kumar\",\"doi\":\"10.1007/s11277-024-11477-6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The Internet of Things (IoT) is a rapidly growing technology that has been generating increasing amounts of traffic from multiple devices. However, this growth in traffic has also created vulnerabilities that need to be addressed. To identify attacking traffic while preserving data, it is important to quickly process intrusive data. Federated learning is a popular solution for decentralized training that preserves data, but it can also be susceptible to federated poisoning attacks caused by malicious clients. This work proposes a clustering-based client selection strategy to identify malicious clients based on their run time, followed by a trigger-set-based encryption mechanism that verifies the authenticity of the clients. This approach allows unreliable clients with plain text-based gradients to be ignored by the global model. The methodology was evaluated using the IoT23 dataset, and its efficiency, robustness, false alarms, and ability to handle some of the poisoning attacks that occur due to tuning and pruning were verified. The LeNet and DeepCtrl algorithms were used to determine detection accuracy, and after the implementation of a watermarking strategy, the detection accuracy improved significantly. For the DeepCtrl classifier, the detection accuracy improved from 89.90 to 99.8%, while for the LeNet classifier, it improved from 86.21 to 96.54%. This proposed methodology can be a useful tool for identifying attacking traffic and improving the security of IoT networks.</p>\",\"PeriodicalId\":23827,\"journal\":{\"name\":\"Wireless Personal Communications\",\"volume\":\"39 1\",\"pages\":\"\"},\"PeriodicalIF\":1.9000,\"publicationDate\":\"2024-08-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Wireless Personal Communications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s11277-024-11477-6\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Personal Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11277-024-11477-6","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
FWICSS-Federated Watermarked Ideal Client Selection Strategy for Internet of Things (IoT) Intrusion Detection System
The Internet of Things (IoT) is a rapidly growing technology that has been generating increasing amounts of traffic from multiple devices. However, this growth in traffic has also created vulnerabilities that need to be addressed. To identify attacking traffic while preserving data, it is important to quickly process intrusive data. Federated learning is a popular solution for decentralized training that preserves data, but it can also be susceptible to federated poisoning attacks caused by malicious clients. This work proposes a clustering-based client selection strategy to identify malicious clients based on their run time, followed by a trigger-set-based encryption mechanism that verifies the authenticity of the clients. This approach allows unreliable clients with plain text-based gradients to be ignored by the global model. The methodology was evaluated using the IoT23 dataset, and its efficiency, robustness, false alarms, and ability to handle some of the poisoning attacks that occur due to tuning and pruning were verified. The LeNet and DeepCtrl algorithms were used to determine detection accuracy, and after the implementation of a watermarking strategy, the detection accuracy improved significantly. For the DeepCtrl classifier, the detection accuracy improved from 89.90 to 99.8%, while for the LeNet classifier, it improved from 86.21 to 96.54%. This proposed methodology can be a useful tool for identifying attacking traffic and improving the security of IoT networks.
期刊介绍:
The Journal on Mobile Communication and Computing ...
Publishes tutorial, survey, and original research papers addressing mobile communications and computing;
Investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia;
Explores propagation, system models, speech and image coding, multiple access techniques, protocols, performance evaluation, radio local area networks, and networking and architectures, etc.;
98% of authors who answered a survey reported that they would definitely publish or probably publish in the journal again.
Wireless Personal Communications is an archival, peer reviewed, scientific and technical journal addressing mobile communications and computing. It investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia. A partial list of topics included in the journal is: propagation, system models, speech and image coding, multiple access techniques, protocols performance evaluation, radio local area networks, and networking and architectures.
In addition to the above mentioned areas, the journal also accepts papers that deal with interdisciplinary aspects of wireless communications along with: big data and analytics, business and economy, society, and the environment.
The journal features five principal types of papers: full technical papers, short papers, technical aspects of policy and standardization, letters offering new research thoughts and experimental ideas, and invited papers on important and emerging topics authored by renowned experts.