589 research outputs found
FLBP: A Federated Learning-enabled and Blockchain-supported Privacy-Preserving of Electronic Patient Records for the Internet of Medical Things
The evolution of the computing paradigms and the Internet of Medical Things (IoMT) have transfigured the healthcare sector with an alarming rise of privacy issues in healthcare records. The rapid growth of medical data leads to privacy and security concerns to protect the confidentiality and integrity of the data in the feature-loaded infrastructure and applications. Moreover, the sharing of medical records of a patient among hospitals rises security and interoperability issues. This article, therefore, proposes a Federated Learning-and-Blockchain-enabled framework to protect electronic medical records from unauthorized access using a deep learning technique called Artificial Neural Network (ANN) for a collaborative IoMT-Fog-Cloud environment. ANN is used to identify insiders and intruders. An Elliptical Curve Digital Signature (ECDS) algorithm is adopted to devise a secured Blockchain-based validation method. To process the anti-malicious propagation method, a Blockchain-based Health Record Sharing (BHRS) is implemented. In addition, an FL approach is integrated into Blockchain for scalable applications to form a global model without the need of sharing and storing the raw data in the Cloud. The proposed model is evident from the simulations that it improves the operational cost and communication (latency) overhead with a percentage of 85.2% and 62.76%, respectively. The results showcase the utility and efficacy of the proposed model
Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems
Intelligent transportation systems (ITSs) have been fueled by the rapid
development of communication technologies, sensor technologies, and the
Internet of Things (IoT). Nonetheless, due to the dynamic characteristics of
the vehicle networks, it is rather challenging to make timely and accurate
decisions of vehicle behaviors. Moreover, in the presence of mobile wireless
communications, the privacy and security of vehicle information are at constant
risk. In this context, a new paradigm is urgently needed for various
applications in dynamic vehicle environments. As a distributed machine learning
technology, federated learning (FL) has received extensive attention due to its
outstanding privacy protection properties and easy scalability. We conduct a
comprehensive survey of the latest developments in FL for ITS. Specifically, we
initially research the prevalent challenges in ITS and elucidate the
motivations for applying FL from various perspectives. Subsequently, we review
existing deployments of FL in ITS across various scenarios, and discuss
specific potential issues in object recognition, traffic management, and
service providing scenarios. Furthermore, we conduct a further analysis of the
new challenges introduced by FL deployment and the inherent limitations that FL
alone cannot fully address, including uneven data distribution, limited storage
and computing power, and potential privacy and security concerns. We then
examine the existing collaborative technologies that can help mitigate these
challenges. Lastly, we discuss the open challenges that remain to be addressed
in applying FL in ITS and propose several future research directions
Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices
Home appliance manufacturers strive to obtain feedback from users to improve
their products and services to build a smart home system. To help manufacturers
develop a smart home system, we design a federated learning (FL) system
leveraging the reputation mechanism to assist home appliance manufacturers to
train a machine learning model based on customers' data. Then, manufacturers
can predict customers' requirements and consumption behaviors in the future.
The working flow of the system includes two stages: in the first stage,
customers train the initial model provided by the manufacturer using both the
mobile phone and the mobile edge computing (MEC) server. Customers collect data
from various home appliances using phones, and then they download and train the
initial model with their local data. After deriving local models, customers
sign on their models and send them to the blockchain. In case customers or
manufacturers are malicious, we use the blockchain to replace the centralized
aggregator in the traditional FL system. Since records on the blockchain are
untampered, malicious customers or manufacturers' activities are traceable. In
the second stage, manufacturers select customers or organizations as miners for
calculating the averaged model using received models from customers. By the end
of the crowdsourcing task, one of the miners, who is selected as the temporary
leader, uploads the model to the blockchain. To protect customers' privacy and
improve the test accuracy, we enforce differential privacy on the extracted
features and propose a new normalization technique. We experimentally
demonstrate that our normalization technique outperforms batch normalization
when features are under differential privacy protection. In addition, to
attract more customers to participate in the crowdsourcing FL task, we design
an incentive mechanism to award participants.Comment: This paper appears in IEEE Internet of Things Journal (IoT-J
Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges
open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that deal with smart agriculture. Then, we provide a classification of threat models against green IoT-based agriculture into five categories, including, attacks against privacy, authentication, confidentiality, availability, and integrity properties. Moreover, we provide a taxonomy and a side-by-side comparison of the state-of-the-art methods toward secure and privacy-preserving technologies for IoT applications and how they will be adapted for green IoT-based agriculture. In addition, we analyze the privacy-oriented blockchain-based solutions as well as consensus algorithms for IoT applications and how they will be adapted for green IoT-based agriculture. Based on the current survey, we highlight open research challenges and discuss possible future research directions in the security and privacy of green IoT-based agriculture
Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses
The ongoing deployment of the fifth generation (5G) wireless networks
constantly reveals limitations concerning its original concept as a key driver
of Internet of Everything (IoE) applications. These 5G challenges are behind
worldwide efforts to enable future networks, such as sixth generation (6G)
networks, to efficiently support sophisticated applications ranging from
autonomous driving capabilities to the Metaverse. Edge learning is a new and
powerful approach to training models across distributed clients while
protecting the privacy of their data. This approach is expected to be embedded
within future network infrastructures, including 6G, to solve challenging
problems such as resource management and behavior prediction. This survey
article provides a holistic review of the most recent research focused on edge
learning vulnerabilities and defenses for 6G-enabled IoT. We summarize the
existing surveys on machine learning for 6G IoT security and machine
learning-associated threats in three different learning modes: centralized,
federated, and distributed. Then, we provide an overview of enabling emerging
technologies for 6G IoT intelligence. Moreover, we provide a holistic survey of
existing research on attacks against machine learning and classify threat
models into eight categories, including backdoor attacks, adversarial examples,
combined attacks, poisoning attacks, Sybil attacks, byzantine attacks,
inference attacks, and dropping attacks. In addition, we provide a
comprehensive and detailed taxonomy and a side-by-side comparison of the
state-of-the-art defense methods against edge learning vulnerabilities.
Finally, as new attacks and defense technologies are realized, new research and
future overall prospects for 6G-enabled IoT are discussed
Blockchain technology research and application: a systematic literature review and future trends
Blockchain, as the basis for cryptocurrencies, has received extensive
attentions recently. Blockchain serves as an immutable distributed ledger
technology which allows transactions to be carried out credibly in a
decentralized environment. Blockchain-based applications are springing up,
covering numerous fields including financial services, reputation system and
Internet of Things (IoT), and so on. However, there are still many challenges
of blockchain technology such as scalability, security and other issues waiting
to be overcome. This article provides a comprehensive overview of blockchain
technology and its applications. We begin with a summary of the development of
blockchain, and then give an overview of the blockchain architecture and a
systematic review of the research and application of blockchain technology in
different fields from the perspective of academic research and industry
technology. Furthermore, technical challenges and recent developments are also
briefly listed. We also looked at the possible future trends of blockchain
- …