2021
DOI: 10.1109/access.2021.3118642
|View full text |Cite
|
Sign up to set email alerts
|

Federated Deep Learning for Cyber Security in the Internet of Things: Concepts, Applications, and Experimental Analysis

Abstract: In this article, we present a comprehensive study with an experimental analysis of federated deep learning approaches for cyber security in the Internet of Things (IoT) applications. Specifically, we first provide a review of the federated learning-based security and privacy systems for several types of IoT applications, including, Industrial IoT, Edge Computing, Internet of Drones, Internet of Healthcare Things, Internet of Vehicles, etc. Second, the use of federated learning with blockchain and malware/intru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 154 publications
(50 citation statements)
references
References 157 publications
(124 reference statements)
0
41
0
Order By: Relevance
“…The proposed model is validated based on the three types of GRU models as shown in Table 2. As mentioned earlier, numerous statistical parameters have been calculated in comparison to state-of-the-art studies of Logistic Regression (LR [18]), Recurrent Neural Network (RNN [24]), and Deep Neural Network (DNN [25]) to determine the performance enhancement of the proposed approach. The window size is considered for different scenarios using linear-quadratic-linear functions for better assessment of the proposed model.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed model is validated based on the three types of GRU models as shown in Table 2. As mentioned earlier, numerous statistical parameters have been calculated in comparison to state-of-the-art studies of Logistic Regression (LR [18]), Recurrent Neural Network (RNN [24]), and Deep Neural Network (DNN [25]) to determine the performance enhancement of the proposed approach. The window size is considered for different scenarios using linear-quadratic-linear functions for better assessment of the proposed model.…”
Section: Resultsmentioning
confidence: 99%
“…For comparative analysis, numerous state-of-the-art studies/techniques have been used. Specifically, three challenging deep learning studies/techniques have been utilized for performance assessment including Campos et al [18] Ferrag et al [24], and Friha et al [25].…”
Section: Experimental Set-upmentioning
confidence: 99%
“…The applications of FL are found in various major fields such as in network optimization [40], Google advanced keyboard for prediction [41], in healthcare systems like COVID-19 detection [42] and in intrusion detection [43]. However, finding the appropriate testing model for privacy and security algorithms for IoMT is still an open research issue, and researchers are finding it difficult to either use a centralized or FL-based model to test [44]. The main difference between centralized ML and FL is that in centralized ML the learning data is uploaded to the central server, where processing is performed and information is shared among different users.…”
Section: Fl and Its Perspective In Iomtmentioning
confidence: 99%
“…Then, FL is a nascent instrument to quicken the convergence for crowdsensing patterns. For instance, in [131][132], the authors investigated the FLenhanced UE crowdsensing system, with an emphasis on confidentiality-increasing great gradient boost up with the collaboration of numerous clients like manufacturing UEs. A safe gradient aggregation procedure is constructed by incorporating homomorphic encoding with the secret distribution that inhibits the central computing server from predicting decoding outcomes before operating aggregation.…”
Section: ) Ue Crowdsensingmentioning
confidence: 99%