Federated Quantum-Based Privacy-Preserving Threat Detection Model for Consumer Internet of Things

被引:35
作者
Namakshenas, Danyal [1 ]
Yazdinejad, Abbas [1 ]
Dehghantanha, Ali [1 ]
Srivastava, Gautam [2 ,3 ,4 ]
机构
[1] Univ Guelph, Sch Comp Sci, Cyber Sci Lab, Canada Cyber Foundry, Guelph, ON N1G 4S7, Canada
[2] Brandon Univ, Dept Math & Comp Sci, Brandon, MB R7A 6A9, Canada
[3] China Med Univ, Res Ctr Interneural Comp, Taichung 404, Taiwan
[4] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut 03797, Lebanon
关键词
CIoT; FL; quantum computing; privacy-preserving;
D O I
10.1109/TCE.2024.3377550
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The Internet of Things (IoT) has significantly impacted the evolution of consumer-oriented smart environments, primarily due to its capacity for transformative device-to-device communication. While this capability enhances user convenience and experience in the Consumer IoT sector, it also generates vast amounts of data. While beneficial for consumer insight and electronic optimization, this data is vulnerable to security breaches. We focus on Machine Learning-based threat detection systems to address these challenges within Consumer IoT. While effective in recognizing threats, these systems often overlook crucial privacy considerations, a critical aspect in the realm of consumer devices. To counter this, Federated Learning (FL) emerges as a promising solution for maintaining data privacy in Consumer IoT. However, FL faces its own challenges, especially when dealing with malicious clients. This paper addresses two primary challenges in Consumer IoT threat detection. First, we tackle an unaddressed issue in FL: the rigorous validation of its clients. The advent of quantum computing could render traditional validation techniques obsolete. We introduce a quantum-centric registration and authentication strategy to overcome this, ensuring stringent client validation in an FL framework. The second challenge involves protecting clients' model weights within FL. We propose the integration of Additive Homomorphic Encryption into our model, offering a robust solution that secures the privacy of FL participants without compromising on computational efficiency. Our empirical results underscore the efficacy of our approach, achieving an average accuracy of 94.93% on the N-baIoT dataset and 91.93% on the Edge-IIoTset dataset, showcasing consistent and robust performance across diverse client configurations. This approach can potentially significantly improve the security and privacy landscape of Consumer IoT.
引用
收藏
页码:5829 / 5838
页数:10
相关论文
共 42 条
[1]   Review Federated Learning for intrusion detection system: Concepts, challenges and future directions [J].
Agrawal, Shaashwat ;
Sarkar, Sagnik ;
Aouedi, Ons ;
Yenduri, Gokul ;
Piamrat, Kandaraj ;
Alazab, Mamoun ;
Bhattacharya, Sweta ;
Maddikunta, Praveen Kumar Reddy ;
Gadekallu, Thippa Reddy .
COMPUTER COMMUNICATIONS, 2022, 195 :346-361
[2]   Federated Learning for Privacy Preservation in Smart Healthcare Systems: A Comprehensive Survey [J].
Ali, Mansoor ;
Naeem, Faisal ;
Tariq, Muhammad ;
Kaddoum, Georges .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2023, 27 (02) :778-789
[3]  
[Anonymous], 2018, P LIV INT THINGS CYB
[4]   Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions [J].
Antwi-Boasiako, Emmanuel ;
Zhou, Shijie ;
Liao, Yongjian ;
Liu, Qihe ;
Wang, Yuyu ;
Owusu-Agyemang, Kwabena .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61
[5]   Daylight entanglement-based quantum key distribution with a quantum dot source [J].
Basset, F. Basso ;
Valeri, M. ;
Neuwirth, J. ;
Polino, E. ;
Rota, M. B. ;
Poderini, D. ;
Pardo, C. ;
Rodari, G. ;
Roccia, E. ;
da Silva, S. F. Covre ;
Ronco, G. ;
Spagnolo, N. ;
Rastelli, A. ;
Carvacho, G. ;
Sciarrino, F. ;
Trotta, R. .
QUANTUM SCIENCE AND TECHNOLOGY, 2023, 8 (02)
[6]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[7]   FedRecover: Recovering from Poisoning Attacks in Federated Learning using Historical Information [J].
Cao, Xiaoyu ;
Jia, Jinyuan ;
Zhang, Zaixi ;
Gong, Neil Zhenqiang .
2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, :1366-1383
[8]   Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats [J].
Chen, Zhiyan ;
Liu, Jinxin ;
Shen, Yu ;
Simsek, Murat ;
Kantarci, Burak ;
Mouftah, Hussein T. ;
Djukic, Petar .
ACM COMPUTING SURVEYS, 2023, 55 (05)
[9]   VCFL: A verifiable and collusion attack resistant privacy preserving framework for cross-silo federated learning [J].
Du, Weidong ;
Li, Min ;
Yang, Xiaoyuan ;
Wu, Liqiang ;
Zhou, Tanping .
PERVASIVE AND MOBILE COMPUTING, 2022, 86
[10]   Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning [J].
Ferrag, Mohamed Amine ;
Friha, Othmane ;
Hamouda, Djallel ;
Maglaras, Leandros ;
Janicke, Helge .
IEEE ACCESS, 2022, 10 :40281-40306