Cited 10 time in
PoAh-Enabled Federated Learning Architecture for DDoS Attack Detection in IoT Networks
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Park, Jin Ho | - |
| dc.contributor.author | Yotxay, Sangthong | - |
| dc.contributor.author | Singh, Sushil Kumar | - |
| dc.contributor.author | Park, Jong Hyuk | - |
| dc.date.accessioned | 2024-08-08T11:00:36Z | - |
| dc.date.available | 2024-08-08T11:00:36Z | - |
| dc.date.issued | 2024-01 | - |
| dc.identifier.issn | 2192-1962 | - |
| dc.identifier.issn | 2192-1962 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/21526 | - |
| dc.description.abstract | Nowadays, the Internet of Things (IoT) has widely influenced many areas of human life; several advanced IoT applications and services are developing in smart cities. However, IoT and smart city applications have various issues and challenges, such as security, privacy preservation, data authentication, decentralization, and latency. Security and privacy are essential issues with distributed denial of service (DDoS) attack detection because of the limitation of security techniques and the heterogeneity of IoT devices. An attack detection system is deployed in the IoT network and classifies it. Blockchain technology is accumulating popularity in many applications, its ability to secure the system while discarding centralized requirements. Proof of authentication (PoAh) is used as a consensus mechanism to maintain secure system authentication, sustainability, and high scalability. Furthermore, federated learning has recently proposed to train local models (gated recurrent unit) and share with a global model for aggregation on IoT devices utilizing numerous user-generated data samples while reducing data loss. Therefore, we propose a PoAh-enabled federated learning architecture for DDoS attack detection in IoT networks. Federated learning is used at the federated layer for privacy preservation to mitigate the negative impacts required for fast processing, accuracy, stability, and low latency. Moreover, blockchain technology is utilized at the authentication layer with PoAh for ensures data authentication and validation, high security, and performance in IoT networks. Finally, we evaluate the proposed architecture with theoretical, quantitative, and security analysis and show that its accuracy, precision, recall, F1-score, and efficiency percentage is approximately 98.6% which is better than existing research studies. | - |
| dc.format.extent | 24 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | 한국컴퓨터산업협회 | - |
| dc.title | PoAh-Enabled Federated Learning Architecture for DDoS Attack Detection in IoT Networks | - |
| dc.type | Article | - |
| dc.publisher.location | 대한민국 | - |
| dc.identifier.doi | 10.22967/HCIS.2024.14.003 | - |
| dc.identifier.scopusid | 2-s2.0-85188784098 | - |
| dc.identifier.wosid | 001139742500001 | - |
| dc.identifier.bibliographicCitation | Human-centric Computing and Information Sciences, v.14, pp 1 - 24 | - |
| dc.citation.title | Human-centric Computing and Information Sciences | - |
| dc.citation.volume | 14 | - |
| dc.citation.startPage | 1 | - |
| dc.citation.endPage | 24 | - |
| dc.type.docType | Article | - |
| dc.identifier.kciid | ART003216403 | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.description.journalRegisteredClass | kci | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.subject.keywordPlus | BLOCKCHAIN | - |
| dc.subject.keywordPlus | AUTHENTICATION | - |
| dc.subject.keywordPlus | SECURITY | - |
| dc.subject.keywordPlus | SCHEME | - |
| dc.subject.keywordAuthor | Blockchain | - |
| dc.subject.keywordAuthor | Internet of Things | - |
| dc.subject.keywordAuthor | Federated Learning | - |
| dc.subject.keywordAuthor | Proof of Authentication | - |
| dc.subject.keywordAuthor | Network Security | - |
| dc.subject.keywordAuthor | and Anomaly | - |
| dc.subject.keywordAuthor | Detection | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
