Towards Enhancing Privacy-Preservation of a Federated Learning CNN Intrusion Detection System in IoT: Method and Empirical Study

Author:

Torre Damiano1ORCID,Chennamaneni Anitha2ORCID,Jo JaeYun2ORCID,Vyas Gitika2ORCID,Sabrsula Brandon2ORCID

Affiliation:

1. University of Washington Tacoma, USA

2. Texas A&M University - Central Texas, USA

Abstract

Enormous risks and hidden dangers of information security exist in the applications of Internet of Things (IoT) technologies. To secure IoT software systems, software engineers have to deploy advanced security software such as Intrusion Detection Systems (IDS) that are able to keep track of how the IoT devices behave within the network and detect any malicious activity that may be occurring. Considering that IoT devices generate large amounts of data, Artificial intelligence (AI) is often regarded as the best method for implementing IDS thanks to AI's high capability in processing large amounts of IoT data. To tackle these security concerns, specifically the ones tied to the privacy of data used in IoT systems, the software implementation of a Federated Learning (FL) method is often used to improve both privacy preservation (PP) and scalability in IoT networks. In this paper, we present a FL IDS that leverages a 1 Dimensional Convolutional Neural Network (CNN) for efficient and accurate intrusion detection in IoT networks. To address the critical issue of PP in FL, we incorporate three techniques: Differential Privacy, Diffie–Hellman Key Exchange, and Homomorphic Encryption. To evaluate the effectiveness of our solution, we conduct experiments on seven publicly available IoT datasets: TON IoT, IoT-23, Bot-IoT, CIC IoT 2023, CIC IoMT 2024, RT-IoT 2022, and EdgeIIoT. Our CNN-based approach achieves outstanding performance with an average accuracy, precision, recall, and F1-score of 97.31%, 95.59%, 92.43%, and 92.69%, respectively, across these datasets. These results demonstrate the effectiveness of our approach in accurately identifying and detecting intrusions in IoT networks. Furthermore, our experiments reveal that implementing all three PP techniques only incurs a minimal increase in computation time, with a 10% overhead compared to our solution without any PP mechanisms. This finding highlights the feasibility and efficiency of our solution in maintaining privacy while achieving high performance. Finally, we show the effectiveness of our solution through a comparison study with other recent IDS trained and tested on the same datasets we use.

Publisher

Association for Computing Machinery (ACM)

Reference93 articles.

1. Generative deep learning to detect cyberattacks for the IoT-23 dataset;Abdalgawad Nada;IEEE Access,2021

2. Sulyman Abdulkareem, Chuan Foh, François Carrez, and Klaus Moessner. 2024. A Lightweight Sel for Attack Detection in Iot/Iiot Networks. Iiot Networks (2024).

3. Shweta Agrawal, Shafi Goldwasser, and Saleet Mossel. 2021. Deniable fully homomorphic encryption from learning with errors. In Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II 41. Springer, 641–670.

4. Comparative Analysis of Machine Learning Models for Intrusion Detection in Internet of Things Networks Using the RT-IoT2022 Dataset;Airlangga Gregorius;MALCOM: Indonesian Journal of Machine Learning and Computer Science,2024

5. Deep learning-enabled threat intelligence scheme in the internet of things networks;Al-Hawawreh Muna;IEEE Transactions on Network Science and Engineering,2020

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3