TY - JOUR
T1 - SecureIIoT Environment
T2 - Federated Learning Empowered Approach for Securing IIoT from Data Breach
AU - Makkar, Aaisha
AU - Kim, Tae Woo
AU - Singh, Ashutosh Kumar
AU - Kang, Jungho
AU - Park, Jong Hyuk
N1 - Publisher Copyright:
© 2005-2012 IEEE.
PY - 2022/9/1
Y1 - 2022/9/1
N2 - The growing congruence of gadgets today resulted in a numerous type of cyber attacks. A similar trend occurs with the industrial Internet of Things (IIoT), wherein increasing data created by connected equipment offers up new opportunities for enhancing service quality for new applications. But, security has become a major design priority for smart devices since the introduction of the IIoT. However, data providers have significant challenges in exchanging their data between different cyber physical systems due to privacy and security concerns (e.g., data imbalance and leakage). In this article, we developed a safe data sharing architecture for various IIoT devices using federated learning (FL). The proposed architecture incorporates FL into the edge computing consensus process, allowing the consensus computing activity to be used for federated training as well. The proposed framework achieves high efficiency, and better security, according to numerical findings generated by experimenting deep learning models. More precisely, the proposed framework named as SecureIIoT, is able to achieve 99.79% accuracy by detecting attacks as a binary classification problem.
AB - The growing congruence of gadgets today resulted in a numerous type of cyber attacks. A similar trend occurs with the industrial Internet of Things (IIoT), wherein increasing data created by connected equipment offers up new opportunities for enhancing service quality for new applications. But, security has become a major design priority for smart devices since the introduction of the IIoT. However, data providers have significant challenges in exchanging their data between different cyber physical systems due to privacy and security concerns (e.g., data imbalance and leakage). In this article, we developed a safe data sharing architecture for various IIoT devices using federated learning (FL). The proposed architecture incorporates FL into the edge computing consensus process, allowing the consensus computing activity to be used for federated training as well. The proposed framework achieves high efficiency, and better security, according to numerical findings generated by experimenting deep learning models. More precisely, the proposed framework named as SecureIIoT, is able to achieve 99.79% accuracy by detecting attacks as a binary classification problem.
KW - Cyber security
KW - Deep learning
KW - Edge computing
KW - Federated learning (FL)
KW - Industrial Internet of things (IIoT)
UR - http://www.scopus.com/inward/record.url?scp=85124774162&partnerID=8YFLogxK
U2 - 10.1109/TII.2022.3149902
DO - 10.1109/TII.2022.3149902
M3 - Article
AN - SCOPUS:85124774162
SN - 1551-3203
VL - 18
SP - 6406
EP - 6414
JO - IEEE Transactions on Industrial Informatics
JF - IEEE Transactions on Industrial Informatics
IS - 9
ER -