Recent Advances on Federated Learning for Cybersecurity and Cybersecurity for Federated Learning for Internet of Things

被引:203
作者
Ghimire, Bimal [1 ]
Rawat, Danda B. [1 ]
机构
[1] Howard Univ, Dept Elect & Comp Sci, Washington, DC 20059 USA
基金
美国国家科学基金会;
关键词
Computer security; Data models; Cloud computing; Computational modeling; Sensors; Machine learning; Collaborative work; Cybersecurity; data offloading; federated cybersecurity (FC); federated learning (FL); machine learning (ML); PRIVACY; IOT; OPTIMIZATION; MECHANISM; FRAMEWORK; SECURITY;
D O I
10.1109/JIOT.2022.3150363
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Decentralized paradigm in the field of cybersecurity and machine learning (ML) for the emerging Internet of Things (IoT) has gained a lot of attention from the government, academia, and industries in recent years. Federated cybersecurity (FC) is regarded as a revolutionary concept to make the IoT safer and more efficient in the future. This emerging concept has the potential of detecting security threats, taking countermeasures, and limiting the spreading of threats over the IoT network system efficiently. An objective of cybersecurity is achieved by forming the federation of the learned and shared model on top of various participants. Federated learning (FL), which is regarded as a privacy-aware ML model, is particularly useful to secure the vulnerable IoT environment. In this article, we start with background and comparison of centralized learning, distributed on-site learning, and FL, which is then followed by a survey of the application of FL to cybersecurity for IoT. This survey primarily focuses on the security aspect but it also discusses several approaches that address the performance issues (e.g., accuracy, latency, resource constraint, and others) associated with FL, which may impact the security and overall performance of the IoT. To anticipate the future evolution of this new paradigm, we discuss the main ongoing research efforts, challenges, and research trends in this area. With this article, readers can have a more thorough understanding of FL for cybersecurity as well as cybersecurity for FL, different security attacks, and countermeasures.
引用
收藏
页码:8229 / 8249
页数:21
相关论文
共 130 条
[1]   A Lightweight Blockchain based Cybersecurity for IoT environments [J].
Abdulkader, Omar ;
Bamhdi, Alwi M. ;
Thayananthan, Vijey ;
Elbouraey, Fathy ;
Al-Ghamdi, Bandar .
2019 6TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2019) / 2019 5TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2019), 2019, :139-144
[2]   A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond [J].
AbdulRahman, Sawsan ;
Tout, Hanine ;
Ould-Slimane, Hakima ;
Mourad, Azzam ;
Talhi, Chamseddine ;
Guizani, Mohsen .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5476-5497
[3]   Cognitive Cybersecurity for CPS-IoT Enabled Healthcare Ecosystems [J].
Abie, Habtamu .
2019 13TH INTERNATIONAL SYMPOSIUM ON MEDICAL INFORMATION AND COMMUNICATION TECHNOLOGY (ISMICT), 2019, :216-221
[4]   Federated Mimic Learning for Privacy Preserving Intrusion Detection [J].
Al-Marri, Noor Ali Al-Athba ;
Ciftler, Bekir S. ;
Abdallah, Mohamed M. .
2020 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2020,
[5]   WSN-DS: A Dataset for Intrusion Detection Systems in Wireless Sensor Networks [J].
Almomani, Iman ;
Al-Kasasbeh, Bassam ;
AL-Akhras, Mousa .
JOURNAL OF SENSORS, 2016, 2016
[6]  
Alrashdi I, 2019, 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P305, DOI 10.1109/CCWC.2019.8666450
[7]   TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems [J].
Alsaedi, Abdullah ;
Moustafa, Nour ;
Tari, Zahir ;
Mahmood, Abdun ;
Anwar, Adnan .
IEEE ACCESS, 2020, 8 :165130-165150
[8]  
Anguita D., 2013, EUR S ART NEUR NETW
[9]  
[Anonymous], 2011, Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, DOI DOI 10.1145/1978672.1978676
[10]  
[Anonymous], 2014, SECURED PROJECT SECU