Skip to main content
Top
Published in: The Journal of Supercomputing 6/2024

10-11-2023

Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model

Authors: Ali M. Al Shahrani, Ali Rizwan, Manuel Sánchez-Chero, Lilia Lucy Campos Cornejo, Mohammad Shabaz

Published in: The Journal of Supercomputing | Issue 6/2024

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The continuous deepening of information technology in the power industry has dramatically increased the exposure of the power Internet of things. Attackers use the compromised terminal as a springboard to infiltrate the network and can steal sensitive data in the power industry system or carry out damage. Facing the bottleneck of zero-trust centralized deployment of massive power terminal access, an edge zero-trust model is proposed. A cross-context recommendation strategy based on self-attention-based federated learning (SAFL) is proposed in this work. In contrast to current algorithms, SAFL fully mixes the target and auxiliary background information. FL is a technological solution that permits machine learning on-device without transferring the user's private data to a centralized cloud. Therefore, federated learning can help to accomplish personalization. Around the dumb power terminals, the zero-trust engine is deployed in a distributed multi-point, and the trust factors are collected in real-time and stored on the chain. By maintaining a consortium blockchain, the trust factor blockchain (TF_chain), the storage-type edge server synchronizes and shares the trust factor generated by the power terminal during the movement which is convenient for tracing the source and preventing the information from being tampered with abnormal and sensitive elements. Furthermore, lightweight encryption is adopted to ensure authentication information is transmitted from edge to cloud security. The simulation results show that the proposed model can decentralize the zero-trust processing load of centralized deployment and effectively combat the threat of compromised terminals under the condition of marginalized deployment.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
5.
go back to reference Yang B, Yamamoto R, Tanaka Y (2012) Historical evidence-based trust management strategy against black hole attacks in MANET. In: 2012 14th International Conference on Advanced Communication Technology (ICACT), pp 394–399 Yang B, Yamamoto R, Tanaka Y (2012) Historical evidence-based trust management strategy against black hole attacks in MANET. In: 2012 14th International Conference on Advanced Communication Technology (ICACT), pp 394–399
8.
9.
go back to reference Chen M, Chen L, Dai Z, Shao Z, Ma Y (2021) Trust evaluation based on variable weight synthesis. In: 2021 IEEE 23rd International Conference on High Performance Computing & communications; 7th International Conference on Data Science & Systems; 19th International Conference on Smart City; 7th International Conference on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/Smart City/DependSys), pp 1685–1692. https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00248 Chen M, Chen L, Dai Z, Shao Z, Ma Y (2021) Trust evaluation based on variable weight synthesis. In: 2021 IEEE 23rd International Conference on High Performance Computing & communications; 7th International Conference on Data Science & Systems; 19th International Conference on Smart City; 7th International Conference on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/Smart City/DependSys), pp 1685–1692. https://​doi.​org/​10.​1109/​HPCC-DSS-SmartCity-DependSys53884.​2021.​00248
11.
go back to reference Yang B, Yamamoto R, Tanaka Y (2014) Dempster-Shafer evidence theory-based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. In: 16th International Conference on Advanced Communication Technology, pp 223–232. https://doi.org/10.1109/ICACT.2014.6779177 Yang B, Yamamoto R, Tanaka Y (2014) Dempster-Shafer evidence theory-based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. In: 16th International Conference on Advanced Communication Technology, pp 223–232. https://​doi.​org/​10.​1109/​ICACT.​2014.​6779177
18.
go back to reference Zhou N, Fang W, Zhang W, Lv X, Huang J (2018) A novel trust management scheme for defending against on-off attack based on gaussian distribution. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (Smart Data), pp 1806–1811. https://doi.org/10.1109/Cybermatics_2018.2018.00300 Zhou N, Fang W, Zhang W, Lv X, Huang J (2018) A novel trust management scheme for defending against on-off attack based on gaussian distribution. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (Smart Data), pp 1806–1811. https://​doi.​org/​10.​1109/​Cybermatics_​2018.​2018.​00300
20.
go back to reference Xu M, He J, Zhang B, Zhang H (2007) A new data protecting scheme based on TPM. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), pp 943–947. https://doi.org/10.1109/SNPD.2007.276 Xu M, He J, Zhang B, Zhang H (2007) A new data protecting scheme based on TPM. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), pp 943–947. https://​doi.​org/​10.​1109/​SNPD.​2007.​276
21.
go back to reference Li Q, Wen Z, Wu Z, Hu S, Wang N, He B (2019) A survey on federated learning systems: Vision, hype and reality for data privacy and protection. arXiv:1907.09693 Li Q, Wen Z, Wu Z, Hu S, Wang N, He B (2019) A survey on federated learning systems: Vision, hype and reality for data privacy and protection. arXiv:​1907.​09693
22.
go back to reference Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: concept and applications. ACM Trans Intell Syst Technol (TIST) 10(2):1–19CrossRef Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: concept and applications. ACM Trans Intell Syst Technol (TIST) 10(2):1–19CrossRef
23.
go back to reference Lu Y, Huang X, Zhang K, Maharjan S, Zhang Y (2020) Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles. IEEE Trans Veh Technol 69(4):4298–4311CrossRef Lu Y, Huang X, Zhang K, Maharjan S, Zhang Y (2020) Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles. IEEE Trans Veh Technol 69(4):4298–4311CrossRef
Metadata
Title
Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model
Authors
Ali M. Al Shahrani
Ali Rizwan
Manuel Sánchez-Chero
Lilia Lucy Campos Cornejo
Mohammad Shabaz
Publication date
10-11-2023
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 6/2024
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-023-05763-6

Other articles of this Issue 6/2024

The Journal of Supercomputing 6/2024 Go to the issue

Premium Partner