Skip to main content

Advertisement

Log in

Security Issues and Solutions in Federate Learning Under IoT Critical Infrastructure

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Digital world especially artificial intelligence and IoT have a vital and significant role in human life for exchanging the information and offering services through internet. These are recent and advanced technologies that has profound effects on various aspects of human life such as education, health care, socials and so on. IoT deals with various sensing objects and machines those interacts with each other for doing the activities. All these connected machines generates a huge amount of data and collects all data to one centralized server for further processing as well as managed by third party (cloud platform). Data has direct relationship with IoT devices however the size and number of IoT devices getting increase the size of collected data in central server (cloud) increase too so this has significant direct impact on performance, quality of services, computational power and time, the most important are data privacy and security issues respect to user data because centralized learning has classical algorithms to process IoT devices related data. More data owners were not interested to share their private and sensitive data with third organization cloud. Therefor to overcome these challenges and attract users’ attention the google founded system called federated learning is the affordable solution that enables on object-machine learning on which data owners and end users need not any more to share their sensitive data with others through centralized point cloud. Instead of centralized system they use distributed system and only need to share updated learning model between centralized server (cloud) and other end-user in the system. Federated learning (FL) boost the scope of decentralized approach because a huge number of data owners and end-users are interested to connect with each other to have a collaborated training without sending sensitive data to cloud. FL still vulnerable against various security threats and risks. This paper focus on two points; first we explore information about overall activity of IoT devices, structures and interactions with each other as well as information about cloud (centralized) learning system and distributed (FL) learning system. Second; the analysis of overall vulnerabilities being exploited by malicious attackers and security challenges to FL system and determine defensive techniques to enhance privacy and security in FL system to achieve security triad confidentiality, integrity and availability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Data Availability Statements

Data sharing not applicable to this article as no datasets were generated.

References

  1. Safdar, Z. (2017). A security model for iot based systems. Technical Journal, University of Engineering and Technology (UET) Taxila, Pakistan, 22(4), 74–84

    Google Scholar 

  2. Tawalbeh, L. (2020). IoT privacy and security: Challenges and solutions. International Journal for Applied Science, 10(12),1–17.

    Google Scholar 

  3. Khan, L. U., Saad, W., Han, Z., Hossain, E., & Hong, C. S. (2021). Federated Learning for Internet of Things: Recent Advances, Taxonomy, and Open Challenges. IEEE Communications Surveys & Tutorials, 23(3), 1759–1799.

  4. Parizi, R. M., & Mothukuri, V. (2020). A survey on security and privacy of federated learning. Future Generation Computer System, 115, 619–640.

    Google Scholar 

  5. Hussain, F. (). Machine learning in IoT security: Current solutions and future challenges. IEEE Communications Surveys & Tutorials, 22(3), 1686–1721.

  6. Peteiro-Barral, D., & Guijarro-Berdina, B. (2013). A survey of methods for distributed machine learning. Progress in Artificial Intelligence, 2(1), 1–11.

    Article  Google Scholar 

  7. Aledhari, M., & Parizi, R. M. (2020). Federated learning: A survey on enabling technologies, protocols, and applications. IEEE Access Multidisciplinary, 8, 140699–140725.

    Article  Google Scholar 

  8. Atzoria, L., Ierab, A., & Morabito, G. (2010). The inernet of things: A survey. Computer Networks, 54(15), 2787–2805.

    Article  Google Scholar 

  9. Balandin, S., Andreev, S., & Koucheryavy, Y. (2012). Internet of things, smart spaces and next-generation networking. Springer, 7469, 464–471.

    Google Scholar 

  10. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of things (IoT): a vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.

    Article  Google Scholar 

  11. Wu, M., Lu, T.-J., Ling, F.-Y., Sun, J., Du, H.-Y. (2013) Research on the architecture of internet of things. In 3rd International conference on advanced computer theory and engineering ( ICACTE). IEEE.

  12. Filičevs, E., Kampars, J., & Aleksandrovics, V. (2016). Internet of things: Structure, feature, and management. Information Technology and Management Science, 19(15), 78–84.

    Google Scholar 

  13. Charith Perera, A. Z. (2014). Context-aware computing for the internet of things: A survey. IEEE Communications Surveys and Tutorials, 16(1), 414–454.

    Article  Google Scholar 

  14. Maple, C., Hongmei, H. E. (2016) The security challenges in the iot enabled cyber-physical systems and opportunities for evolutionary computing and other computational intelligence. In IEEE congress on evolutionary computing (CEC) (pp. 1015–1021).

  15. Tyagi, S., Darwish, A., & Khan, M. Y. (2014). Managing computing infrastructure for IoT data. Scientific Research publishing Advances in Internet of Things, 4, 29–35.

    Article  Google Scholar 

  16. Tawalbdh, L. (2017). Lightweight crypto and security. In Security and privacy in cyber-physical system: Foundation, principle and applications (pp. 243–261). West Sussex, Wiley.

  17. Waheed, N., He, X., Ikram, M., Usman, M., Hashmi, S. S., & Usman, M. (2020). Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures. ACM Comput Servey, 53(3), 1–35.

    Google Scholar 

  18. Ali, I., Sabir, S., & Ullah, Z. (2016). Internet of things security, device authentication and access control: A Review. International Journal of Computer Science and Information Security (IJCSIS), 14(8), 456–466.

    Google Scholar 

  19. Brendan McMahan, H., Moore, E., Ramage, D., Hampson, S., Arcas, B. A. (2017) Communication-efficient learning of deep networks from decentralized data. In Proceedings fo the 20th international conference on artificial intelligence and statistics, USA.

  20. Pandey, S. R., Tran, N. H., Bennis, M., Tun, Y. K., Manzoor, A., & Hong, C. S. (2020). A Crowdsourcing framework for on-device federated learning. IEEE Transaction on Wireless Communication, 19(5), 3241–3256.

    Article  Google Scholar 

  21. Aledhari, M., Razzak, R., Parizi, R. M., & Saeed, F. (2020). Federated learning: A survey on enabling technologies, protocols, and applications. IEEE Access Multidisciplinary Journal, 8, 14099–14725.

    Google Scholar 

  22. Li, Z., Sharma, V., & Mohanty, S. P. (2020). Preserving data privacy via federated learning: Challenges and solutions. IEEE Consumer Electronics Magazin, 9(3), 8–16.

    Article  Google Scholar 

  23. Yang, S., Ren, B., Zhou, X., Liu, L. (2019). Parallel distributed logistic regression for vertical federated learning without a third-party coordinator. ArXiv Preprint, 2019.

  24. Abdulrahman, S., Tout, H., Ould-Slimane, H., Mourad, A., Talhi, C., Guizani, M. (). A survey on federated learning: the journey from centralized to distributed on-site learning and beyond. IEEE Internet of Things Journal, 0(0), 1–34.

  25. Qiang Yang, Y. L. T. C. (2019). Federated machine learning: Concept and application. ACM Transactions on Intelligent System and Technology, 10(2), 121–1219.

    Google Scholar 

  26. Brendan McMahan, H., Moore, E., Ramage, D., Hampson, S., Arcas, B. A. (2017). Communication-efficient learning of deep networks from decentralized data. In Proceeding of the 20th international conference on artificial intelligence and statistics (AISTATS), Florida, USA.

  27. Truex, S., Baracaldo, N., Anwar, A., Steinke, T., Ludwig, H., Zhang, R., Zhou, Y. (2019). A hybrid approach to privacy-preserving federated learning. Association for Computing Machinery (ACM).

  28. Milad Nasr, R. S. A. H. (2019). Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning. In IEEE symposium on security and privacy (pp. 739–753).

  29. Mao, J., Cao, C., Juan Wang, L., Ye, J., Zhong, W. (). Research on the security technology of federated learning privacy-preserving. In Journal of physics: Conference series, Haikou, China.

  30. Rivest, R. L., Adleman, L., & Dertouzos, M. L. (2012). On data banks and privacy homomorphisms. Advance in Cryptology-crypto, 4(11), 868–886.

    Google Scholar 

  31. David Evans, V. K. (). A pragmatic introduction to secure multi-party computation. Journal of Cryptology, Verlage, New York

  32. Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., Shmatikov, V. (). How to backdoor federated learning. In 23rd international conference on artificial intelligence and statistics (AISTATS), Palermo, Italy.

  33. Truex, S., Liu, L., Gursoy, M. E., Yu, L., Wei, W., et al. (2019). Demystifying membership inference attacks in machine learning as a service. In IEEE transactions on services computing (pp. 1–17).

  34. Zhou, X., Ming, Xu., Yiming, Wu., & Zheng, N. (2021). Deep model poisoning attack on federated learning. Journal of Future Internet, 13(5), 1–14.

    Google Scholar 

  35. Hongsong, C., Yongpeng, Z., Yongrui, C., et al. (2021). Security threats and defensive approaches in machine learning system under big data environment (p. 21). Springer.

  36. Brendan McMahan, H., Moore, E., Ramage, D., Hampson, S., Agüera Arcas, B. (2017). Communication-efficient learning of deep networks from decentralized data. In 20th international conference on artificial intelligence and statistics (AISTATS), Florida, USA.

  37. Ateniese, G., Perez-Cruz, F., Hitaj, B. (2017). Depp models under the GAN: information leakage from collaborative deep learning. In the 2017 ACM SIGSAC conference on computer and communications security, New York, USA.

  38. Santos, B., et al. (). Improving cellular IoT security with identity federation and anomaly detection. In 5th international conference on computer and communication systems, Shanghai, China.

  39. Liu, D., Miller, T., Sayeed, R., Mandl, K. D. (2018). FADL: federated-autonomous depp learning for distributed electronic health record. In Machine learning for health (ML4H), Boston, USA.

  40. Konečný, J., Brendan McMahan, H., Yu, F. X., Richtárik, P., Theertha Suresh, A., Bacon, D. (2017). Federated learning: Strategies for improving communication efficiency. University of Edinburgh.

  41. Kholod, I., Yanaki, E., Fomichev, D., Shalugin, E., Novikova, E., Filippov, E., & Nordlund, M. (2020). Open-source federated learning frameworks for IoT: A comparative review and analysis. MDPI, 21, 1.

    Google Scholar 

  42. Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., Brendan McMahan, H., Patel, S., Ramage, D., Segal, A., Seth, K. (2016). Practical secure aggregation for federated learning on user-held data. In 30th Conference on neural information processing system (NIPS 2016), Barcelona, Spain.

Download references

Acknowledgements

The National Key Research and Development Program of China (2018YFB0803403) and Fundamental Research Funds for the Central Universities (FRF-AT-20-11) from the Ministry of Education of China supported this work.

Funding

The work is supported by the National Key Research and Development Program of China(2018YFB0803403) and Fundamental Research Funds for the Central Universities(FRF-AT-20-11) from the Ministry of Education of China.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hongsong Chen.

Ethics declarations

Conflict of interest

Hereby I declare, this academic paper is my achievement and the result of an original investigation. I further state that this paper has not been previously submitted for any other academic degree. Authors can confirm that all relevant data are included in the article and we do not use any type of code. The manuscript has written by Nasir Ahmad Jalali and professor Chen Hongsong gives him necessary directs. As the authors declared, that they have no conflicts of interest to this work.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jalali, N.A., Chen, H. Security Issues and Solutions in Federate Learning Under IoT Critical Infrastructure. Wireless Pers Commun 129, 475–500 (2023). https://doi.org/10.1007/s11277-022-10107-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-10107-3

Keywords

Navigation