2022
DOI: 10.1016/j.compeleceng.2022.108379
|View full text |Cite
|
Sign up to set email alerts
|

HBFL: A hierarchical blockchain-based federated learning framework for collaborative IoT intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
26
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 44 publications
(27 citation statements)
references
References 22 publications
0
26
0
1
Order By: Relevance
“…In this study, we also compare and contrast experimental data to show that BCEAD has better detection performance than previous methods. Sarhan et al [25] presented a federated learning architecture built on a blockchain-based hierarchy to ensure that collaborative IoT intrusion detection is safe and private. The proposed machine learning-based intrusion detection system employs a federated learning architecture with a hierarchical structure to safeguard the confidentiality of the training and company information.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In this study, we also compare and contrast experimental data to show that BCEAD has better detection performance than previous methods. Sarhan et al [25] presented a federated learning architecture built on a blockchain-based hierarchy to ensure that collaborative IoT intrusion detection is safe and private. The proposed machine learning-based intrusion detection system employs a federated learning architecture with a hierarchical structure to safeguard the confidentiality of the training and company information.…”
Section: Related Workmentioning
confidence: 99%
“…Machine learning models are statistical algorithms with the ability to infer meaningful insights about future data by learning complex patterns in existing data [25]. These ML models are designed using a training procedure in which the learning models glean relevant meanings from the accessible data logs.…”
Section: Sensor Nodesmentioning
confidence: 99%
See 1 more Smart Citation
“…Protection of physical components, applications, network connections and data are managed by this process. This process is effectively beneficial for an organisation to ensure integrity, availability and confidentiality of IoT ecosystems [18]. High volume of flaws discovers in IoT framework on a daily basis to maintain security challenges.…”
Section: Major Concerns Of Industrial Iot Securitymentioning
confidence: 99%
“…Randhir Kumar et al [17] put forth a fog computing solution to detect DDoS attacks in blockchain-enabled IoT networks, achieving efficient detection compared to traditional methods. Mohanad Sarhan et al [18] proposed a hierarchical blockchain-based federated learning framework for IoT intrusion detection, ensuring enhanced security while maintaining data integrity.…”
mentioning
confidence: 99%