IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v10y2022i12p2141-d842974.html
   My bibliography  Save this article

Federated Learning-Inspired Technique for Attack Classification in IoT Networks

Author

Listed:
  • Tariq Ahamed Ahanger

    (College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia)

  • Abdulaziz Aldaej

    (College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia)

  • Mohammed Atiquzzaman

    (School of Computer Science, University of Oklahoma, Norman, OK 73019, USA)

  • Imdad Ullah

    (College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia)

  • Muhammad Yousufudin

    (College of Computer Engineering and Sciences, Prince Sattam Bin Abdulaziz University, Al-Kharj 11942, Saudi Arabia)

Abstract

More than 10-billion physical items are being linked to the internet to conduct activities more independently and with less human involvement owing to the Internet of Things (IoT) technology. IoT networks are considered a source of identifiable data for vicious attackers to carry out criminal actions using automated processes. Machine learning (ML)-assisted methods for IoT security have gained much attention in recent years. However, the ML-training procedure incorporates large data which is transferable to the central server since data are created continually by IoT devices at the edge. In other words, conventional ML relies on a single server to store all of its data, which makes it a less desirable option for domains concerned about user privacy. The Federated Learning (FL)-based anomaly detection technique, which utilizes decentralized on-device data to identify IoT network intrusions, represents the proposed solution to the aforementioned problem. By exchanging updated weights with the centralized FL-server, the data are kept on local IoT devices while federating training cycles over GRUs (Gated Recurrent Units) models. The ensemble module of the technique assesses updates from several sources for improving the accuracy of the global ML technique. Experiments have shown that the proposed method surpasses the state-of-the-art techniques in protecting user data by registering enhanced performance measures of Statistical Analysis, Energy Efficiency, Memory Utilization, Attack Classification, and Client Accuracy Analysis for the identification of attacks.

Suggested Citation

  • Tariq Ahamed Ahanger & Abdulaziz Aldaej & Mohammed Atiquzzaman & Imdad Ullah & Muhammad Yousufudin, 2022. "Federated Learning-Inspired Technique for Attack Classification in IoT Networks," Mathematics, MDPI, vol. 10(12), pages 1-17, June.
  • Handle: RePEc:gam:jmathe:v:10:y:2022:i:12:p:2141-:d:842974
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/10/12/2141/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/10/12/2141/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Samer Jaloudi, 2019. "Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study," Future Internet, MDPI, vol. 11(3), pages 1-18, March.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Zhongyun Hua & Yushu Zhang, 2023. "Preface to the Special Issue on “Mathematical Methods for Computer Science”," Mathematics, MDPI, vol. 11(16), pages 1-3, August.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Marwane Ayaida & Nadhir Messai & Frederic Valentin & Dimitri Marcheras, 2022. "TalkRoBots: A Middleware for Robotic Systems in Industry 4.0," Future Internet, MDPI, vol. 14(4), pages 1-25, March.
    2. Thyago Celso Cavalcante Nepomuceno & Késsia Thais Cavalcanti Nepomuceno & Fabiano Carlos da Silva & Silas Garrido Teixeira de Carvalho Santos, 2023. "Quantifying Webpage Performance: A Comparative Analysis of TCP/IP and QUIC Communication Protocols for Improved Efficiency," Data, MDPI, vol. 8(8), pages 1-14, August.
    3. SungKu Kang & Ran Jin & Xinwei Deng & Ron S. Kenett, 2023. "Challenges of modeling and analysis in cybermanufacturing: a review from a machine learning and computation perspective," Journal of Intelligent Manufacturing, Springer, vol. 34(2), pages 415-428, February.
    4. Cheng Qian & Xing Liu & Colin Ripley & Mian Qian & Fan Liang & Wei Yu, 2022. "Digital Twin—Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions," Future Internet, MDPI, vol. 14(2), pages 1-25, February.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:12:p:2141-:d:842974. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.