Privacy-Preserved Cyberattack Detection in Industrial Edge of Things (IEoT): A Blockchain-Orchestrated Federated Learning Approach

Faculty Computer Science Year: 2022
Type of Publication: ZU Hosted Pages: Page(s): 7920 - 7934
Authors:
Journal: IEEE Transactions on Industrial Informatics IEEE Volume: Volume: 18
Keywords : Privacy-Preserved Cyberattack Detection , Industrial Edge , Things    
Abstract:
The Industrial Internet ofThings (IIoT) plays an essential role in the digital renovation of conventional industries to Industry 4.0. With the connectivity of sensors, actuators, appliances, and other industrial objects, IIoT enables data availability, improved analytics, and automatic control. Thanks to the complex distributed nature, a wide range of stealthy and evolving cyberattacks become a major threat to the trustworthiness and security of IIoT systems. This makes the standard security procedures unable to assure the trustworthiness of IIoT that protect against cyberattacks. As a remedy, this article presents a blockchain-orchestrated edge intelligence (BoEI) framework that integrates an innovative decentralized federated learning (called Fed-Trust) for cyberattack detection in IIoT. In the Fed-Trust, a temporal convolutional generative network is introduced to enable semi-supervised learning from semi-labeled data. BoEI includes reputation-based blockchain to enable decentralized recording and verification of the transactions for guaranteeing the security and privacy of data and gradients. Fog computing is exploited to offload the block mining operation from the edge side thereby improving the overall computation and communication performance of Fed-Trust. Proof of concept simulations using two public datasets validate the robustness and efficiency of the Fed-Trust over the cutting-edge cyberattack detection approaches.
   
     
 
       

Author Related Publications

  • Mohammed Abdel Basset Metwally Attia, "Discrete greedy flower pollination algorithm for spherical traveling salesman problem", Springer, 2019 More
  • Mohammed Abdel Basset Metwally Attia, "A New Hybrid Flower Pollination Algorithm for Solving Constrained Global Optimization Problems", Natural Sciences Publishing Cor., 2014 More
  • Mohammed Abdel Basset Metwally Attia, "A novel equilibrium optimization algorithm for multi-thresholding image segmentation problems", Springer London, 2021 More
  • Mohammed Abdel Basset Metwally Attia, "An efficient binary slime mould algorithm integrated with a novel attacking-feeding strategy for feature selection", Pergamon, 2021 More
  • Mohammed Abdel Basset Metwally Attia, "An efficient teaching-learning-based optimization algorithm for parameters identification of photovoltaic models: Analysis and validations", Pergamon, 2021 More

Department Related Publications

  • Mohammed Abdel Basset Metwally Attia, "The role of single valued neutrosophic sets and rough sets in smart city: Imperfect and incomplete information systems", Elsevier‏, 2018 More
  • Mai Mohammed Abdul Sattar Jaafar, "The role of single valued neutrosophic sets and rough sets in smart city: Imperfect and incomplete information systems", Elsevier‏, 2018 More
  • Saber Mohamed, "A Constraint Consensus Memetic Algorithm for Solving Constrained Optimization Problems", Taylor & Francis, 2013 More
  • Saber Mohamed, "Self-Adaptive Differential Evolution Incorporating a Heuristic Mixing of Operators", Springer, 2012 More
  • Saber Mohamed, "Configuring Two-algorithm-based Evolutionary Approach for Solving Dynamic Economic Dispatch Problems", Elsevier, 2016 More
Tweet