Skip to main content
Erschienen in: The Journal of Supercomputing 6/2024

10.11.2023

Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model

verfasst von: Ali M. Al Shahrani, Ali Rizwan, Manuel Sánchez-Chero, Lilia Lucy Campos Cornejo, Mohammad Shabaz

Erschienen in: The Journal of Supercomputing | Ausgabe 6/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The continuous deepening of information technology in the power industry has dramatically increased the exposure of the power Internet of things. Attackers use the compromised terminal as a springboard to infiltrate the network and can steal sensitive data in the power industry system or carry out damage. Facing the bottleneck of zero-trust centralized deployment of massive power terminal access, an edge zero-trust model is proposed. A cross-context recommendation strategy based on self-attention-based federated learning (SAFL) is proposed in this work. In contrast to current algorithms, SAFL fully mixes the target and auxiliary background information. FL is a technological solution that permits machine learning on-device without transferring the user's private data to a centralized cloud. Therefore, federated learning can help to accomplish personalization. Around the dumb power terminals, the zero-trust engine is deployed in a distributed multi-point, and the trust factors are collected in real-time and stored on the chain. By maintaining a consortium blockchain, the trust factor blockchain (TF_chain), the storage-type edge server synchronizes and shares the trust factor generated by the power terminal during the movement which is convenient for tracing the source and preventing the information from being tampered with abnormal and sensitive elements. Furthermore, lightweight encryption is adopted to ensure authentication information is transmitted from edge to cloud security. The simulation results show that the proposed model can decentralize the zero-trust processing load of centralized deployment and effectively combat the threat of compromised terminals under the condition of marginalized deployment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
5.
Zurück zum Zitat Yang B, Yamamoto R, Tanaka Y (2012) Historical evidence-based trust management strategy against black hole attacks in MANET. In: 2012 14th International Conference on Advanced Communication Technology (ICACT), pp 394–399 Yang B, Yamamoto R, Tanaka Y (2012) Historical evidence-based trust management strategy against black hole attacks in MANET. In: 2012 14th International Conference on Advanced Communication Technology (ICACT), pp 394–399
8.
Zurück zum Zitat Shakkira K, Mohamed Mubarak T (2015) advanced lightweight, dependable and secure trust system for clustered wireless sensor networks. In: 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp 1–4. https://doi.org/10.1109/ICIIECS.2015.7193162. Shakkira K, Mohamed Mubarak T (2015) advanced lightweight, dependable and secure trust system for clustered wireless sensor networks. In: 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp 1–4. https://​doi.​org/​10.​1109/​ICIIECS.​2015.​7193162.
9.
Zurück zum Zitat Chen M, Chen L, Dai Z, Shao Z, Ma Y (2021) Trust evaluation based on variable weight synthesis. In: 2021 IEEE 23rd International Conference on High Performance Computing & communications; 7th International Conference on Data Science & Systems; 19th International Conference on Smart City; 7th International Conference on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/Smart City/DependSys), pp 1685–1692. https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00248 Chen M, Chen L, Dai Z, Shao Z, Ma Y (2021) Trust evaluation based on variable weight synthesis. In: 2021 IEEE 23rd International Conference on High Performance Computing & communications; 7th International Conference on Data Science & Systems; 19th International Conference on Smart City; 7th International Conference on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/Smart City/DependSys), pp 1685–1692. https://​doi.​org/​10.​1109/​HPCC-DSS-SmartCity-DependSys53884.​2021.​00248
11.
Zurück zum Zitat Yang B, Yamamoto R, Tanaka Y (2014) Dempster-Shafer evidence theory-based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. In: 16th International Conference on Advanced Communication Technology, pp 223–232. https://doi.org/10.1109/ICACT.2014.6779177 Yang B, Yamamoto R, Tanaka Y (2014) Dempster-Shafer evidence theory-based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. In: 16th International Conference on Advanced Communication Technology, pp 223–232. https://​doi.​org/​10.​1109/​ICACT.​2014.​6779177
18.
Zurück zum Zitat Zhou N, Fang W, Zhang W, Lv X, Huang J (2018) A novel trust management scheme for defending against on-off attack based on gaussian distribution. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (Smart Data), pp 1806–1811. https://doi.org/10.1109/Cybermatics_2018.2018.00300 Zhou N, Fang W, Zhang W, Lv X, Huang J (2018) A novel trust management scheme for defending against on-off attack based on gaussian distribution. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (Smart Data), pp 1806–1811. https://​doi.​org/​10.​1109/​Cybermatics_​2018.​2018.​00300
20.
Zurück zum Zitat Xu M, He J, Zhang B, Zhang H (2007) A new data protecting scheme based on TPM. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), pp 943–947. https://doi.org/10.1109/SNPD.2007.276 Xu M, He J, Zhang B, Zhang H (2007) A new data protecting scheme based on TPM. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), pp 943–947. https://​doi.​org/​10.​1109/​SNPD.​2007.​276
21.
Zurück zum Zitat Li Q, Wen Z, Wu Z, Hu S, Wang N, He B (2019) A survey on federated learning systems: Vision, hype and reality for data privacy and protection. arXiv:1907.09693 Li Q, Wen Z, Wu Z, Hu S, Wang N, He B (2019) A survey on federated learning systems: Vision, hype and reality for data privacy and protection. arXiv:​1907.​09693
22.
Zurück zum Zitat Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: concept and applications. ACM Trans Intell Syst Technol (TIST) 10(2):1–19CrossRef Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: concept and applications. ACM Trans Intell Syst Technol (TIST) 10(2):1–19CrossRef
23.
Zurück zum Zitat Lu Y, Huang X, Zhang K, Maharjan S, Zhang Y (2020) Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles. IEEE Trans Veh Technol 69(4):4298–4311CrossRef Lu Y, Huang X, Zhang K, Maharjan S, Zhang Y (2020) Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles. IEEE Trans Veh Technol 69(4):4298–4311CrossRef
Metadaten
Titel
Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model
verfasst von
Ali M. Al Shahrani
Ali Rizwan
Manuel Sánchez-Chero
Lilia Lucy Campos Cornejo
Mohammad Shabaz
Publikationsdatum
10.11.2023
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 6/2024
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05763-6

Weitere Artikel der Ausgabe 6/2024

The Journal of Supercomputing 6/2024 Zur Ausgabe

Premium Partner