Federated Learning: An Intrusion Detection Privacy Preserving Approach to Decentralized AI Model Training for IOT Security

International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 7 (1):1-8 (2018)
  Copy   BIBTEX

Abstract

There are various aspects to Internet of Things security, such as guaranteeing the safety of both the devices and the Internet of Things networks to which they connect. Many other types of equipment, including industrial robots, smart grids, construction automation systems, entertainment gadgets, and many more, are included in this, despite the fact that they were not designed with network security in mind. When it comes to securing systems, networks, and data, IoT device security must be able to resist a wide range of IoT security assaults. One of the most important issues in the field of data security is the creation of intrusion detection systems (IDSs) for the Internet of Things. Client devices (edge devices) in Federated Learning utilize local data to train the machine learning model, and then send the updated model parameters to a cloud server so that they may be aggregated (rather than raw data).This paper proposes a machine learning system that employs federated learning to detect intrusions in the IoT. The FedAVG algorithm is employed to aggregate models. Models are trained locally by nodes. The models are trained and validated using machine learning methods, including Random Forest, ID3, and Support Vector Machine. The NSL KDD data set is employed to undertake experiments.

Other Versions

No versions found

Links

PhilArchive

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Securing IoT Networks: Machine Learning-Based Malware Detection and Adaption.G. Ganesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-16.
Cybersecurity in the Internet of Things (IoT): Challenges and Solutions.R. Surya Kala A. N. Abirama Valli - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management (Ijarasem) 12 (1):344-347.
Cybersecurity in the Internet of Things (IoT): Challenges and Solutions.R. Surya Kala A. N. Abirama Valli - 2025 - International Journal of Advanced Research in Arts, Science, Engineering and Management 12 (1):344-347.
CYBERSECURITY STRATEGIES FOR IOT DEVICES IN SMART CITIES.Sharma Sidharth - 2017 - Journal of Artificial Intelligence and Cyber Security (Jaics) 1 (1):1-6.

Analytics

Added to PP
2025-03-20

Downloads
20 (#1,129,483)

6 months
20 (#150,857)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Advanced Hybrid Feature Extraction Techniques for Signature Authentication.V. Nagabhuchchayya Chowdry R. Rajkumar, R. Shravan - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (8):10456-10461.
The Book Recommender Engine using Collaborative Filtering.Om Bhopulka Madhavi Mali, Sakshi Waghmare, Sakshi Shete, Pratik Darawade - 2021 - International Journal of Innovative Research in Computer and Communication Engineering 9 (12):14788-14790.

Add more citations

References found in this work

No references found.

Add more references