4.8 Article

Recent Advances on Federated Learning for Cybersecurity and Cybersecurity for Federated Learning for Internet of Things

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 9, 期 11, 页码 8229-8249

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2022.3150363

关键词

Computer security; Data models; Cloud computing; Computational modeling; Sensors; Machine learning; Collaborative work; Cybersecurity; data offloading; federated cybersecurity (FC); federated learning (FL); machine learning (ML)

资金

  1. DoD Center of Excellence in AI and Machine Learning (CoE-AIML) at Howard University [W911NF-20-2-0277]
  2. U.S. Army Research Laboratory
  3. U.S. National Science Foundation (NSF) [CNS/SaTC 2039583, 1828811]
  4. National Nuclear Security Agency (NNSA) Grant
  5. Direct For Education and Human Resources
  6. Division Of Human Resource Development [1828811] Funding Source: National Science Foundation

向作者/读者索取更多资源

This article discusses the decentralized paradigm in the field of cybersecurity and machine learning for the emerging Internet of Things (IoT). It highlights the concept of federated cybersecurity (FC) and the application of federated learning (FL) in securing the IoT environment. The article also explores the performance issues and future research trends in this area.
Decentralized paradigm in the field of cybersecurity and machine learning (ML) for the emerging Internet of Things (IoT) has gained a lot of attention from the government, academia, and industries in recent years. Federated cybersecurity (FC) is regarded as a revolutionary concept to make the IoT safer and more efficient in the future. This emerging concept has the potential of detecting security threats, taking countermeasures, and limiting the spreading of threats over the IoT network system efficiently. An objective of cybersecurity is achieved by forming the federation of the learned and shared model on top of various participants. Federated learning (FL), which is regarded as a privacy-aware ML model, is particularly useful to secure the vulnerable IoT environment. In this article, we start with background and comparison of centralized learning, distributed on-site learning, and FL, which is then followed by a survey of the application of FL to cybersecurity for IoT. This survey primarily focuses on the security aspect but it also discusses several approaches that address the performance issues (e.g., accuracy, latency, resource constraint, and others) associated with FL, which may impact the security and overall performance of the IoT. To anticipate the future evolution of this new paradigm, we discuss the main ongoing research efforts, challenges, and research trends in this area. With this article, readers can have a more thorough understanding of FL for cybersecurity as well as cybersecurity for FL, different security attacks, and countermeasures.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据