Skip to main content

Enabling Edge Devices Using Federated Learning and Big Data for Proactive Decisions

  • Conference paper
  • First Online:
Recent Trends in Image Processing and Pattern Recognition (RTIP2R 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1704))

  • 371 Accesses

Abstract

Big data and cloud computing lay a new paradigm of data analytics and pave an insight for new types of intelligent devices. These smart devices continuously capture, store, and transfer data to the centrally controlled devices. In recent years, there has been an exponential increase in smart devices, which has increased the amount of data generated by these devices. The communication of the generated data to the central nodes results in a high communication rate. This type of data communication is vulnerable to network intrusions and multiple security threats. Realtime processing of the data is also a huge challenge, and it is an arduous task to provide support to the applications working on realtime decision making. This paper proposes a message passing approach among intelligent edge devices, which leverages the advantages of the big data analytics and federated learning to tackle the challenges as mentioned above. The experimental analysis of several benchmark datasets supports the proposed approach’s theoretical base. The proposed approach with suitable number of edge devices reduces the overall training time maximum by one third while maintaining a significant amount of accuracy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lee, K.H., Lee, Y.J., Choi, H., Chung, Y.D., Moon, B.: Parallel data processing with MapReduce: a survey. ACM SIGMOD Rec. 40(4), 11–20 (2012)

    Article  Google Scholar 

  2. McMahan, B., Moore, E., Ramage, D., Hampson, S., y Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial Intelligence and Statistics, pp. 1273–1282. PMLR, April 2017

    Google Scholar 

  3. Spachos, P., Hatzinakos, D.: Real-time indoor carbon dioxide monitoring through cognitive wireless sensor networks. IEEE Sens. J. 16(2), 506–514 (2015)

    Article  Google Scholar 

  4. Van der Geest, M., Polinder, H., Ferreira, J.A., Veltman, A., Wolmarans, J.J., Tsiara, N.: Analysis and neutral voltage-based detection of interturn faults in high-speed permanent-magnet machines with parallel strands. IEEE Trans. Industr. Electron. 62(6), 3862–3873 (2015)

    Google Scholar 

  5. Mahmood, M.A., Seah, W.K., Welch, I.: Reliability in wireless sensor networks: A survey and challenges ahead. Comput. Netw. 79, 166–187 (2015)

    Article  Google Scholar 

  6. Mehmood, A., Mukherjee, M., Ahmed, S.H., Song, H., Malik, K.M.: NBC-MAIDS: Naïve Bayesian classification technique in multi-agent system-enriched IDS for securing IoT against DDoS attacks. J. Supercomput. 74(10), 5156–5170 (2018). https://doi.org/10.1007/s11227-018-2413-7

    Article  Google Scholar 

  7. Konečný, J., McMahan, H.B., Yu, F.X., Richtárik, P., Suresh, A.T., Bacon, D.: Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492 (2016)

  8. Li, T., Sahu, A.K., Talwalkar, A., Smith, V.: Federated learning: Challenges, methods, and future directions. IEEE Signal Process. Mag. 37(3), 50–60 (2020)

    Article  Google Scholar 

  9. Yang, Q., Liu, Y., Cheng, Y., Kang, Y., Chen, T., Yu, H.: Federated learning. Synthesis Lectu. Artifi. Intell. Mach. Learn. 13(3), 1–207 (2019)

    Article  Google Scholar 

  10. Tsang, Y.P., Lee, C.K.M.: Artificial intelligence in industrial design: A semi-automated literature survey. Eng. Appl. Artif. Intell. 112, 104884 (2022)

    Article  Google Scholar 

  11. Pandey, S.K., Mishra, R.B., Tripathi, A.K.: Machine learning based methods for software fault prediction: A survey. Expert Syst. Appl. 172, 114595 (2021)

    Article  Google Scholar 

  12. Ge, N., Li, G., Zhang, L., Liu, Y.: Failure prediction in production line based on federated learning: an empirical study. J. Intell. Manufact. 1–18 (2021)

    Google Scholar 

  13. Zhang, W., Li, X., Ma, H., Luo, Z., Li, X.: Federated learning for machinery fault diagnosis with dynamic validation and self-supervision. Knowl.-Based Syst. 213, 106679 (2021)

    Article  Google Scholar 

  14. Liu, Y., et al.: Deep anomaly detection for time-series data in industrial IoT: A communication-efficient on-device federated learning approach. IEEE Internet Things J. 8(8), 6348–6358 (2020)

    Article  Google Scholar 

  15. Thakkar, A., Lohiya, R.: A review on machine learning and deep learning perspectives of IDS for IoT: recent updates, security issues, and challenges. Arch. Comput. Methods Eng. 28(4), 3211–3243 (2021)

    Article  Google Scholar 

  16. Manzoor, M.A., Morgan, Y.: Real-time support vector machine based network intrusion detection system using Apache Storm. In 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 1–5. IEEE (Oct 2016)

    Google Scholar 

  17. Omrani, T., Dallali, A., Rhaimi, B. C., Fattahi, J.: Fusion of ANN and SVM classifiers for network attack detection. In 2017 18th International Conference on Sciences and Techniques of Automatic Control and Computer Engineering (STA), pp. 374–377. IEEE (Dec 2017)

    Google Scholar 

  18. Chang, Y., Li, W., Yang, Z.: Network intrusion detection based on random forest and support vector machine. In 2017 IEEE International Conference On Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), vol. 1, pp. 635–638. IEEE (Jul 2017)

    Google Scholar 

  19. Ferrag, M.A., Maglaras, L., Moschoyiannis, S., Janicke, H.: Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Sec. Appli. 50, 102419 (2020)

    Google Scholar 

  20. Dixit, P., Silakari, S.: Deep learning algorithms for cybersecurity applications: A technological and status review. Comput. Sci. Rev. 39, 100317 (2021)

    Article  MathSciNet  Google Scholar 

  21. Telstra, Telstra network disruptions. www.kaggle.com/c/telstra-recruiting-network/data

  22. M.L. Group, Credit card fraud detection (Mar 2018). www.kaggle.com/mlg-ulb/creditcardfraud

  23. Loparo, K.A.K.A.: Loparo, Bearing data center, case western reserve university. www.csegroups.case.edu/bearingdatacenter/pages/download-data-file

  24. Aws-Samples, aws-samples/aws-iot-examples (Apr 2016). www.github.com/aws-samples/aws-iot-examples/tree/master/predictionDataSimulator

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abishi Chowdhury .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chowdhury, A., Swaminathan, A., Ashoka, R.R., Pal, A. (2023). Enabling Edge Devices Using Federated Learning and Big Data for Proactive Decisions. In: Santosh, K., Goyal, A., Aouada, D., Makkar, A., Chiang, YY., Singh, S.K. (eds) Recent Trends in Image Processing and Pattern Recognition. RTIP2R 2022. Communications in Computer and Information Science, vol 1704. Springer, Cham. https://doi.org/10.1007/978-3-031-23599-3_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-23599-3_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-23598-6

  • Online ISBN: 978-3-031-23599-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics