IDEAS home Printed from https://ideas.repec.org/a/spr/infosf/v27y2025i1d10.1007_s10796-023-10443-0.html
   My bibliography  Save this article

A Fully Privacy-Preserving Solution for Anomaly Detection in IoT using Federated Learning and Homomorphic Encryption

Author

Listed:
  • Marco Arazzi

    (University of Pavia)

  • Serena Nicolazzo

    (University of Milan)

  • Antonino Nocera

    (University of Pavia)

Abstract

Anomaly detection for the Internet of Things (IoT) is a very important topic in the context of cyber-security. Indeed, as the pervasiveness of this technology is increasing, so is the number of threats and attacks targeting smart objects and their interactions. Behavioral fingerprinting has gained attention from researchers in this domain as it represents a novel strategy to model object interactions and assess their correctness and honesty. Still, there exist challenges in terms of the performance of such AI-based solutions. The main reasons can be alleged to scalability, privacy, and limitations on adopted Machine Learning algorithms. Indeed, in classical distributed fingerprinting approaches, an object models the behavior of a target contact by exploiting only the information coming from the direct interaction with it, which represents a very limited view of the target because it does not consider services and messages exchanged with other neighbors. On the other hand, building a global model of a target node behavior leveraging the information coming from the interactions with its neighbors, may lead to critical privacy concerns. To face this issue, the strategy proposed in this paper exploits Federated Learning to compute a global behavioral fingerprinting model for a target object, by analyzing its interactions with different peers in the network. Our solution allows the training of such models in a distributed way by relying also on a secure delegation strategy to involve less capable nodes in IoT. Moreover, through homomorphic encryption and Blockchain technology, our approach guarantees the privacy of both the target object and the different workers, as well as the robustness of the strategy in the presence of attacks. All these features lead to a secure fully privacy-preserving solution whose robustness, correctness, and performance are evaluated in this paper using a detailed security analysis and an extensive experimental campaign. Finally, the performance of our model is very satisfactory, as it consistently discriminates between normal and anomalous behaviors across all evaluated test sets, achieving an average accuracy value of 0.85.

Suggested Citation

  • Marco Arazzi & Serena Nicolazzo & Antonino Nocera, 2025. "A Fully Privacy-Preserving Solution for Anomaly Detection in IoT using Federated Learning and Homomorphic Encryption," Information Systems Frontiers, Springer, vol. 27(1), pages 367-390, February.
  • Handle: RePEc:spr:infosf:v:27:y:2025:i:1:d:10.1007_s10796-023-10443-0
    DOI: 10.1007/s10796-023-10443-0
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10796-023-10443-0
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10796-023-10443-0?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Sabrina Sicari & Cinzia Cappiello & Francesco Pellegrini & Daniele Miorandi & Alberto Coen-Porisini, 2016. "A security-and quality-aware system architecture for Internet of Things," Information Systems Frontiers, Springer, vol. 18(4), pages 665-677, August.
    2. Marco Ferretti & Serena Nicolazzo & Antonino Nocera, 2021. "H2O: Secure Interactions in IoT via Behavioral Fingerprinting," Future Internet, MDPI, vol. 13(5), pages 1-29, April.
    3. Vipindev Adat & B. B. Gupta, 2018. "Security in Internet of Things: issues, challenges, taxonomy, and architecture," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 67(3), pages 423-441, March.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Roman Lukyanenko & Andrea Wiggins & Holly K. Rosser, 0. "Citizen Science: An Information Quality Research Frontier," Information Systems Frontiers, Springer, vol. 0, pages 1-23.
    2. Kumar Prateek & Nitish Kumar Ojha & Fahiem Altaf & Soumyadev Maity, 2023. "Quantum secured 6G technology-based applications in Internet of Everything," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 82(2), pages 315-344, February.
    3. Jun-Feng Tian & Hao-Ning Wang, 2020. "An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios," International Journal of Distributed Sensor Networks, , vol. 16(5), pages 15501477209, May.
    4. Eric Forcael & Isabella Ferrari & Alexander Opazo-Vega & Jesús Alberto Pulido-Arcas, 2020. "Construction 4.0: A Literature Review," Sustainability, MDPI, vol. 12(22), pages 1-28, November.
    5. Danyal Arshad & Muhammad Asim & Noshina Tariq & Thar Baker & Hissam Tawfik & Dhiya Al-Jumeily OBE, 2022. "THC-RPL: A lightweight Trust-enabled routing in RPL-based IoT networks against Sybil attack," PLOS ONE, Public Library of Science, vol. 17(7), pages 1-33, July.
    6. Abhishek Verma & Virender Ranga, 2020. "CoSec-RPL: detection of copycat attacks in RPL based 6LoWPANs using outlier analysis," Telecommunication Systems: Modelling, Analysis, Design and Management, Springer, vol. 75(1), pages 43-61, September.
    7. Quan Z. Sheng & Xue Li & Anne H.H. Ngu & Yongrui Qin & Dong Xie, 2016. "Guest editorial: web of things," Information Systems Frontiers, Springer, vol. 18(4), pages 639-643, August.
    8. Victor Chang & Carole Goble & Muthu Ramachandran & Lazarus Jegatha Deborah & Reinhold Behringer, 2021. "Editorial on Machine Learning, AI and Big Data Methods and Findings for COVID-19," Information Systems Frontiers, Springer, vol. 23(6), pages 1363-1367, December.
    9. Emmanuel W. Ayaburi & James Wairimu & Francis Kofi Andoh-Baidoo, 2019. "Antecedents and Outcome of Deficient Self-Regulation in Unknown Wireless Networks Use Context: An Exploratory Study," Information Systems Frontiers, Springer, vol. 21(6), pages 1213-1229, December.
    10. Jianmao Xiao & Xinyi Liu & Jia Zeng & Yuanlong Cao & Zhiyong Feng, 2022. "Recommendation of Healthcare Services Based on an Embedded User Profile Model," International Journal on Semantic Web and Information Systems (IJSWIS), IGI Global, vol. 18(1), pages 1-21, January.
    11. Silviu-Gabriel Szentesi & Lavinia Denisia Cuc & Ramona Lile & Paul Nichita Cuc, 2021. "Internet of Things (IoT), Challenges and Perspectives in Romania: A Qualitative Research," The AMFITEATRU ECONOMIC journal, Academy of Economic Studies - Bucharest, Romania, vol. 23(57), pages 448-448.
    12. Radhwan Sneesl & Yusmadi Yah Jusoh & Marzanah A. Jabar & Salfarina Abdullah, 2022. "Revising Technology Adoption Factors for IoT-Based Smart Campuses: A Systematic Review," Sustainability, MDPI, vol. 14(8), pages 1-27, April.
    13. Nadir, Ibrahim & Mahmood, Haroon & Asadullah, Ghalib, 2022. "A taxonomy of IoT firmware security and principal firmware analysis techniques," International Journal of Critical Infrastructure Protection, Elsevier, vol. 38(C).
    14. Roman Lukyanenko & Andrea Wiggins & Holly K. Rosser, 2020. "Citizen Science: An Information Quality Research Frontier," Information Systems Frontiers, Springer, vol. 22(4), pages 961-983, August.
    15. Isha Batra & Sahil Verma & Arun Malik & Kavita & Uttam Ghosh & Joel J. P. C. Rodrigues & Gia Nhu Nguyen & A. S. M. Sanwar Hosen & Vinayagam Mariappan, 2020. "Hybrid Logical Security Framework for Privacy Preservation in the Green Internet of Things," Sustainability, MDPI, vol. 12(14), pages 1-16, July.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:27:y:2025:i:1:d:10.1007_s10796-023-10443-0. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.