BFLIDS: Blockchain-Driven Federated Learning for Intrusion Detection in IoMT Networks
Abstract
:1. Introduction
- -
- Novel blockchain-based Federated Learning approach: We propose a secure Federated Learning method for IoMT intrusion detection, which trains models on local clients and federates their learning.
- -
- Performance evaluation: We compare our Federated Learning method to traditional centralized ML methods using various popular datasets that cover numerous real-world attack scenarios.
- -
- Experimental outcomes: Our results show that distributing and aggregating models in a Federated Learning environment is competitively effective compared to centralized methods. This analysis and the proposed strategy offer valuable insights for future research in this area.
2. Related Works
2.1. Intrusion Detection in IoT Using ML and FL
2.2. Intrusion Detection Using Blockchain and FL
3. Proposed Method
3.1. Framework
- -
- FL Client Layer: incorporates local training capabilities, allowing ML models to run directly on end devices. This layer ensures data privacy and security by keeping data local.
- -
- Smart Contract Layer: manages interactions between clients and the blockchain-enabled aggregation server using smart contracts, ensuring secure and transparent operations.
- -
- Blockchain Layer: acts as a secure storage and aggregation server, utilizing decentralized storage systems like IPFSs and MongoDB for efficient data management and redundancy.
3.1.1. FL Client Layer for Local Training
- -
- Local model training: Each FL client (IoMT device) collects data and trains a local model using ML algorithms, such as CNNs, and LSTM, which were initially distributed as a global model (GM) by the server. This helps in detecting potential intrusions by analyzing patterns in the device’s data.
- -
- Data privacy and security: Training happens entirely on the local IoMT devices, which means raw data are never sent to external servers. This ensures privacy and minimizes the risk of data breaches.
- -
- Model update generation: After training, IoMT devices create local model updates that represent learned insights. These updates are shared, but the raw data are not, preserving privacy.
- -
- Blockchain integration: The FL Client Layer interacts with the blockchain to record and verify these model updates. This allows for transparent auditing and documentation of each client’s contributions.
- -
- Privacy-preserving communication: Secure communication mechanisms are used to ensure the integrity and confidentiality of the model updates during transmission.
3.1.2. Smart Contract Layer for FL Distribution
- -
- Record storage contract: This smart contract defines a structured approach to storing records within the blockchain. It includes a struct named “Record” that encapsulates essential information such as the client ID, hash of the record, and timestamp.
- -
- Storage mapping: The contract utilizes a mapping data structure to associate each record with a unique identifier (ID). The mapping allows efficient retrieval of records based on their IDs.
- -
- Event emission: Whenever a new record is stored using the “storeRecord” function, the contract emits a “RecordStored” event. This event provides a way for external parties to monitor and react to changes in the contract state.
- -
- StoreRecord function: This function enables the addition of new records to the storage. It receives inputs such as the record ID, client ID, and hash of the record. Before storing a new record, the function checks that the provided ID is not already in use to prevent overwriting existing records.
- -
- GetRecord function: The “getRecord” function allows clients to retrieve specific records from the storage based on their IDs. It takes the ID of the record as input and returns the corresponding client ID, hash, and timestamp. If the requested record does not exist, the function throws an error indicating that the record was not found.
3.1.3. Blockchain as Secure Storage and FL Aggregation
- -
- Aggregation and Global Model Update: The aggregation server gathers all local weights before training and updates the global model using the aggregation algorithm. Devices or nodes interested in participating in the FL process register with the FL aggregation server. It deploys smart contracts on the blockchain network to manage FL tasks, including participant registration, model aggregation, parameter updates, and reward distribution.
- -
- Decentralized Storage Systems: The layer incorporates decentralized storage systems comprising the InterPlanetary File System (IPFS) and MongoDB. IPFSs enable the distributed storage and retrieval of model updates across a network of nodes, ensuring redundancy and fault tolerance. MongoDB complements IPFSs by providing a structured database for indexing and querying model updates based on metadata attributes such as timestamp, client ID, and model version. By leveraging decentralized storage solutions, the FL system mitigates the risk of data loss, censorship, or single points of failure inherent in centralized storage architectures. This distributed storage approach enhances data availability, accessibility, and resilience, fostering trust and reliability in the Federated Learning process.
- -
- RESTful API: The RESTful API facilitates the seamless upload and download of local weights, as well as the upload of the global model. Through designated endpoints, clients can securely upload their local weights, download the latest model updates, and contribute to the enhancement of the global model. The API ensures efficient communication between clients and the server, enabling real-time interaction with the blockchain network. This streamlined process empowers clients to actively participate in the collaborative learning paradigm, contributing to the continuous improvement of the IDS while maintaining data privacy and integrity.
3.2. Adversary Model and Assumptions
- -
- Participant availability: We assume that the participants in the FL network are consistently available for training and sharing their local models. This assumption ensures the timely aggregation of model updates and prevents delays in the learning process.
- -
- Secure communication between FL clients and IoMT devices: For our Intrusion Detection System to operate effectively, it needs to communicate with participating Federated Learning (FL) clients and IoMT devices. We assume that these communication channels are secure and protected from any potential threats.
- -
- Absence of malicious IoMT devices: A new IoMT product may already have security flaws when an IoMT provider first introduces it. These products should not be compromised or corrupted in any way during initial use. This will allow the system to generate only permitted interactions before an adversary M identifies and exploits any flaws, allowing our model to learn from the safe patterns.
3.3. Federated Learning Algorithm and Procedure
Algorithm 1. Adaptive Federated Learning Algorithm with Divergence Estimation and Weight Calculation. |
Input: Global model parameters ωt Local datasets for each client Di Local learning rate schedule for each client ηi(t) Output: Updated global model parameters ωt+1 //Client-Side: 1: for each client i in parallel do 2: for each epoch e do 3: Train local copy of ωt on Di using ηi(t) 4: Obtain 5: end for 6: Calculate local performance metrics on and Di 7: Estimate divergence between Pi (client’s data distribution) and Pt (global model distribution) using the Kullback–Leibler (KL) divergence (Equation (2)): 8: if divergence is acceptable then 9: Calculate importance weight based on divergence estimation: 10: else 11: Adjust learning rate ηi(t) and retrain local model 12: end if 13: end for //Server-Side: 14: Sample clients with probability proportional to 15: Collect from selected clients 16: Aggregate updates using weighted average (Equation (4)) with as weights: 17: Update the global model using (Equation (5)). 18: if the global model converges then 19: Broadcast ωt+1 to all clients 20: else 21: Repeat the process for the next round 22: end if Updated global model parameters ωt+1 |
3.4. ML Classifiers for Intrusion Detection
3.4.1. Convolutional Neural Network (CNN)
- -
- Flexibility: can handle varying input sizes while producing consistent output dimensions.
- -
- Efficiency: reduces computational load by dynamically adjusting pooling operations.
- -
- Robustness: maintains spatial hierarchies and patterns in the input data.
3.4.2. Bidirectional Long Short-Term Memory (BiLSTM)
4. Experiments, Results, and Discussion
4.1. Experimental Setup
4.2. Datasets and Pre-Processing
4.3. Evaluation Metric
- -
- True Positive (TP): the number of samples accurately identified as attacks out of all samples.
- -
- False Positive (FP): the number of benign samples mistakenly labeled as attacks.
- -
- True Negative (TN): the number of neutral samples correctly classified as normal.
- -
- False Negative (FN): the number of attack samples incorrectly categorized as normal.
- Accuracy (Acc): One measurement for assessing the classification model’s performance is accuracy. The accuracy measurement is represented by Equation (15). It is a measure of the proportion of correctly classified inputs among all inputs.
- Precision (Pre): Precision is the ability to make accurate predictions. It is a measurement of the ratio of the model’s claimed positives to the number of actual positives and is represented by Equation (16).
- Recall (Detection Rate): The recall is often referred to as the real positive rate, which measures the proportion of positives in model claims to the actual number of positives found across the data. Equation (17) depicts the recall measurement for a model.
- F1-Score: A model’s performance can also be evaluated using the F1-Score. It represents a model’s weighted average of recall and precision and is given by Equation (18).
4.4. Performance Evaluation
4.4.1. Intrusion Detection Using Centralized Methods
4.4.2. Intrusion Detection using Blockchain-Enabled FL Method
4.5. Deployment of Smart Contracts for the FL Distributor
4.6. Smart Contract Analysis
4.7. Security Analysis of Smart Contracts
4.8. Comparison to Similar Works
4.9. Discussion
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Rughoobur, P.; Nagowah, L. A lightweight replay attack detection framework for battery depended IoT devices designed for healthcare. In Proceedings of the 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), Dubai, United Arab Emirates, 18–20 December 2017; pp. 811–817. [Google Scholar]
- Seh, A.H.; Zarour, M.; Alenezi, M.; Sarkar, A.K.; Agrawal, A.; Kumar, R.; Ahmad Khan, R. Healthcare data breaches: Insights and implications. Healthcare 2020, 8, 133. [Google Scholar] [CrossRef] [PubMed]
- Xu, Q.; He, Z.; Li, Z.; Xiao, M.; Goh, R.S.M.; Li, Y. An effective blockchain-based, decentralized application for smart building system management. In Real-Time Data Analytics for Large Scale Sensor Data; Academic Press: Cambridge, MA, USA, 2020; pp. 157–181. [Google Scholar]
- checkpoint.com. Intrusion Detection System (IDS). Available online: https://www.checkpoint.com/cyber-hub/network-security/what-is-an-intrusion-detection-system-ids/ (accessed on 13 September 2022).
- Da Costa, K.A.; Papa, J.P.; Lisboa, C.O.; Munoz, R.; de Albuquerque, V.H.C. Internet of Things: A survey on machine learning-based intrusion detection approaches. Comput. Netw. 2019, 151, 147–157. [Google Scholar] [CrossRef]
- Khraisat, A.; Gondal, I.; Vamplew, P.; Kamruzzaman, J. Survey of intrusion detection systems: Techniques, datasets and challenges. Cybersecurity 2019, 2, 20. [Google Scholar] [CrossRef]
- Rege, M.; Mbah, R.B.K. Machine learning for cyber defense and attack. Data Anal. 2018, 2018, 83. [Google Scholar]
- Latif, S.; Zou, Z.; Idrees, Z.; Ahmad, J. A novel attack detection scheme for the industrial internet of things using a lightweight random neural network. IEEE Access 2020, 8, 89337–89350. [Google Scholar] [CrossRef]
- Shafique, A.; Ahmed, J.; Boulila, W.; Ghandorh, H.; Ahmad, J.; Rehman, M.U. Detecting the security level of various cryptosystems using machine learning models. IEEE Access 2020, 9, 9383–9393. [Google Scholar] [CrossRef]
- McMahan, B.; Moore, E.; Ramage, D.; Hampson, S.; y Arcas, B.A. Communication-efficient learning of deep networks from decentralized data. Artif. Intell. Stat. 2017, 54, 1273–1282. [Google Scholar]
- Xu, G.; Li, H.; Liu, S.; Yang, K.; Lin, X. Verifynet: Secure and verifiable federated learning. IEEE Trans. Inf. Forensics Secur. 2019, 15, 911–926. [Google Scholar] [CrossRef]
- Li, R.; Song, T.; Mei, B.; Li, H.; Cheng, X.; Sun, L. Blockchain for Large-Scale Internet of Things Data Storage and Protection. IEEE Trans. Serv. Comput. 2019, 12, 762–771. [Google Scholar] [CrossRef]
- Rashid, M.; Choi, P.; Lee, S.-H.; Kwon, K.-R. Block-HPCT: Blockchain Enabled Digital Health Passports and Contact Tracing of Infectious Diseases like COVID-19. Sensors 2022, 22, 4256. [Google Scholar] [CrossRef] [PubMed]
- Laufenberg, D.; Li, L.; Shahriar, H.; Han, M. Developing a blockchain-enabled collaborative intrusion detection system: An exploratory study. In Advances in Information and Communication: Proceedings of the 2020 Future of Information and Communication Conference (FICC), San Francisco, CA, USA, 5–6 March 2020; Springer: Cham, Switzerland, 2020; pp. 172–183. [Google Scholar]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, W.; Chen, X.; Weng, J.; Imran, M. An overview on smart contracts: Challenges, advances and platforms. Future Gener. Comput. Syst. 2020, 105, 475–491. [Google Scholar] [CrossRef]
- ipfs. InterPlanetary File System. Available online: https://docs.ipfs.tech/ (accessed on 27 October 2022).
- A Blockchain Platform for the Enterprise (Hyperledger Fabric). Hyperledger. Available online: https://hyperledger-fabric.readthedocs.io/en/latest/ (accessed on 22 October 2022).
- Yu, Y.; Li, Y.; Tian, J.; Liu, J. Blockchain-based solutions to security and privacy issues in the internet of things. IEEE Wirel. Commun. 2018, 25, 12–18. [Google Scholar] [CrossRef]
- Bobde, Y.; Narayanan, G.; Jati, M.; Raj, R.S.P.; Cvitić, I.; Peraković, D. Enhancing Industrial IoT Network Security through Blockchain Integration. Electronics 2024, 13, 687. [Google Scholar] [CrossRef]
- Alajlan, R.; Alhumam, N.; Frikha, M. Cybersecurity for blockchain-based IoT systems: A review. Appl. Sci. 2023, 13, 7432. [Google Scholar] [CrossRef]
- Zhao, R.; Yin, Y.; Shi, Y.; Xue, Z. Intelligent intrusion detection based on federated learning aided long short-term memory. Phys. Commun. 2020, 42, 101157. [Google Scholar] [CrossRef]
- Driss, M.; Almomani, I.; e Huma, Z.; Ahmad, J. A federated learning framework for cyberattack detection in vehicular sensor networks. Complex Intell. Syst. 2022, 8, 4221–4235. [Google Scholar] [CrossRef]
- Khan, L.U.; Pandey, S.R.; Tran, N.H.; Saad, W.; Han, Z.; Nguyen, M.N.H.; Hong, C.S. Federated learning for edge networks: Resource optimization and incentive mechanism. IEEE Commun. Mag. 2020, 58, 88–93. [Google Scholar] [CrossRef]
- Nguyen, T.D.; Marchal, S.; Miettinen, M.; Fereidooni, H.; Asokan, N.; Sadeghi, A.-R. DÏoT: A federated self-learning anomaly detection system for IoT. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; pp. 756–767. [Google Scholar]
- Du, Z.; Wu, C.; Yoshinaga, T.; Yau, K.-L.A.; Ji, Y.; Li, J. Federated learning for vehicular internet of things: Recent advances and open issues. IEEE Open J. Comput. Soc. 2020, 1, 45–61. [Google Scholar] [CrossRef] [PubMed]
- Mothukuri, V.; Khare, P.; Parizi, R.M.; Pouriyeh, S.; Dehghantanha, A.; Srivastava, G. Federated-Learning-Based Anomaly Detection for IoT Security Attacks. IEEE Internet Things J. 2022, 9, 2545–2554. [Google Scholar] [CrossRef]
- Wu, Y.; Dai, H.-N.; Tang, H. Graph neural networks for anomaly detection in industrial Internet of Things. IEEE Internet Things J. 2021, 9, 9214–9231. [Google Scholar] [CrossRef]
- Deng, A.; Hooi, B. Graph neural network-based anomaly detection in multivariate time series. Proc. AAAI Conf. Artif. Intell. 2021, 35, 4027–4035. [Google Scholar] [CrossRef]
- Xiao, J.; Yang, L.; Zhong, F.; Chen, H.; Li, X. Robust anomaly-based intrusion detection system for in-vehicle network by graph neural network framework. Appl. Intell. 2023, 53, 3183–3206. [Google Scholar] [CrossRef]
- Kong, X.; Zhang, W.; Wang, H.; Hou, M.; Chen, X.; Yan, X.; Das, S.K. Federated Graph Anomaly Detection via Contrastive Self-Supervised Learning. In IEEE Transactions on Neural Networks and Learning Systems; IEEE: New York, NY, USA, 2024. [Google Scholar]
- Poursafaei, F.; Rabbany, R.; Zilic, Z. Sigtran: Signature vectors for detecting illicit activities in blockchain transaction networks. In Advances in Knowledge Discovery and Data Mining: 25th Pacific-Asia Conference, PAKDD 2021, Virtual Event, 11–14 May 2021, Proceedings; Springer International Publishing: Cham, Switzerland, 2021; pp. 27–39. [Google Scholar]
- Poursafaei, F.; Zilic, Z.; Rabbany, R. A Strong Node Classification Baseline for Temporal Graphs. In Proceedings of the 2022 SIAM International Conference on Data Mining (SDM), Alexandria, VA, USA, 28–30 April 2022; SIAM: Philadelphia, PA, USA, 2022; pp. 648–656. [Google Scholar]
- Alexopoulos, N.; Vasilomanolakis, E.; Ivánkó, N.R.; Mühlhäuser, M. Towards blockchain-based collaborative intrusion detection systems. In Critical Information Infrastructures Security: 12th International Conference, CRITIS 2017, Lucca, Italy, 8–13 October 2017; Springer International Publishing: Cham, Switzerland, 2017; pp. 107–118. [Google Scholar]
- Rashid, M.M.; Lee, S.-H.; Kwon, K.-R. Blockchain technology for combating deepfake and protect video/image integrity. J. Korea Multimed. Soc. 2021, 24, 1044–1058. [Google Scholar]
- Zaabar, B.; Cheikhrouhou, O.; Abid, M. Intrusion detection system for IoMT through blockchain-based federated learning. In Proceedings of the 2022 15th International Conference on Security of Information and Networks (SIN), Sousse, Tunisia, 11–13 November 2022; pp. 1–8. [Google Scholar]
- Casado-Vara, R.; de la Prieta, F.; Prieto, J.; Corchado, J.M. Blockchain framework for IoT data quality via edge computing. In Proceedings of the 1st Workshop on Blockchain-Enabled Networked Sensor Systems, Shenzhen, China, 4 November 2018; ACM: New York, NY, USA, 2018; pp. 19–24. [Google Scholar]
- Alkadi, O.; Moustafa, N.; Turnbull, B.; Choo, K.-K.R. A deep blockchain framework-enabled collaborative intrusion detection for protecting IoT and cloud networks. IEEE Internet Things J. 2020, 8, 9463–9472. [Google Scholar] [CrossRef]
- Kumar, R.; Kumar, P.; Tripathi, R.; Gupta, G.P.; Garg, S.; Hassan, M.M. A distributed intrusion detection system to detect DDoS attacks in blockchain-enabled IoT network. J. Parallel Distrib. Comput. 2022, 164, 55–68. [Google Scholar] [CrossRef]
- Sindhusaranya, B.; Yamini, R.; Manimekalai, M.A.P.; Geetha, K. Federated Learning and Blockchain-Enabled Privacy-Preserving Healthcare 5.0 System: A Comprehensive Approach to Fraud Prevention and Security in IoMT. J. Internet Serv. Inf. Secur. 2023, 13, 199–209. [Google Scholar]
- Golomb, T.; Mirsky, Y.; Elovici, Y. CIoTA: Collaborative IoT anomaly detection via blockchain. arXiv 2018, arXiv:1803.03807. [Google Scholar]
- Lakhan, A.; Mohammed, M.A.; Nedoma, J.; Martinek, R.; Tiwari, P.; Vidyarthi, A.; Alkhayyat, A.; Wang, W. Federated-learning based privacy preservation and fraud-enabled blockchain IoMT system for healthcare. IEEE J. Biomed. Health Inform. 2022, 27, 664–672. [Google Scholar] [CrossRef] [PubMed]
- Dey, S. Securing majority-attack in blockchain using machine learning and algorithmic game theory: A proof of work. In Proceedings of the 2018 10th Computer Science and Electronic Engineering (CEEC), Colchester, UK, 19–21 September 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 7–10. [Google Scholar]
- Lian, Z.; Zeng, Q.; Wang, W.; Gadekallu, T.R.; Su, C. Blockchain-based two-stage federated learning with non-IID data in IoMT system. IEEE Trans. Comput. Soc. Syst. 2022, 10, 1701. [Google Scholar] [CrossRef]
- Eskandari, Z.; Rezaee, M. Blockchain-Enabled Federated Learning to Enhance Security and Privacy in Internet of Medical Things (IoMT). Int. J. Web Res. 2023, 6, 87–93. [Google Scholar]
- Faheem, M.; Kuusniemi, H.; Eltahawy, B.; Bhutta, M.S.; Raza, B. A lightweight smart contracts framework for blockchain-based secure communication in smart grid applications. IET Gener. Transm. Distrib. 2024, 18, 625–638. [Google Scholar] [CrossRef]
- Faheem, M.; Al-Khasawneh, M.A. Multilayer cyberattacks identification and classification using machine learning in internet of blockchain (IoBC)-based energy networks. Data Brief. 2024, 54, 110461. [Google Scholar] [CrossRef] [PubMed]
- Faheem, M.; Al-Khasawneh, M.A.; Khan, A.A.; Madni, S.H.H. Cyberattack patterns in blockchain-based communication networks for distributed renewable energy systems: A study on big datasets. Data Brief. 2024, 53, 110212. [Google Scholar] [CrossRef] [PubMed]
- grpc.io/. An Introduction to Key gRPC Concepts, with an Overview of gRPC Architecture and RPC Life Cycle. Available online: https://grpc.io/docs/what-is-grpc/core-concepts/ (accessed on 29 September 2022).
- Zhang, Q.; Zhang, M.; Chen, T.; Sun, Z.; Ma, Y.; Yu, B. Recent advances in convolutional neural network acceleration. Neurocomputing 2019, 323, 37–51. [Google Scholar] [CrossRef]
- Hochreiter, S.; Schmidhuber, J. Long short-term memory. Neural Comput. 1997, 9, 1735–1780. [Google Scholar] [CrossRef] [PubMed]
- Chawla, N.V.; Bowyer, K.W.; Hall, L.O.; Kegelmeyer, W.P. SMOTE: Synthetic minority over-sampling technique. J. Artif. Intell. Res. 2002, 16, 321–357. [Google Scholar] [CrossRef]
- Solidity. Available online: https://docs.soliditylang.org/en/v0.8.13/ (accessed on 25 October 2022).
- Remix IDE. Available online: https://remix.ethereum.org/ (accessed on 25 October 2022).
- Ferrag, M.A.; Friha, O.; Hamouda, D.; Maglaras, L.; Janicke, H. Edge-IIoTset: A new comprehensive realistic cyber security dataset of IoT and IIoT applications for centralized and federated learning. IEEE Access 2022, 10, 40281–40306. [Google Scholar] [CrossRef]
- Sarhan, M.; Layeghy, S.; Moustafa, N.; Portmann, M. Netflow datasets for machine learning-based network intrusion detection systems. In Big Data Technologies and Applications: 10th EAI International Conference, BDTA 2020, and 13th EAI International Conference on Wireless Internet, WiCON 2020, Virtual Event, 11 December 2020, Proceedings 10; Springer: Cham, Switzerland; pp. 117–135.
- Narkhede, S.; towardsdatascience.com. Understanding Confusion Matrix. 9 May 2018. Available online: https://towardsdatascience.com/understanding-confusion-matrix-a9ad42dcfd62 (accessed on 2 October 2022).
- Luu, L.; Chu, D.H.; Olickel, H.; Saxena, P.; Hobor, A. Making smart contracts smarter. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; ACM: New York, NY, USA; pp. 254–269. [Google Scholar]
- Li, B.; Wu, Y.; Song, J.; Lu, R.; Li, T.; Zhao, L. DeepFed: Federated deep learning for intrusion detection in industrial cyber—Physical systems. IEEE Trans. Ind. Inform. 2020, 17, 5615–5624. [Google Scholar] [CrossRef]
- Huong, T.T.; Bac, T.P.; Long, D.M.; Thang, B.D.; Binh, N.T.; Luong, T.D.; Phuc, T.K. Lockedge: Low-complexity cyberattack detection in iot edge computing. IEEE Access 2021, 9, 29696–29710. [Google Scholar] [CrossRef]
- Khan, I.A.; Razzak, I.; Pi, D.; Khan, N.; Hussain, Y.; Li, B.; Kousar, T. Fed-inforce-fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks. Inf. Fusion 2024, 101, 102002. [Google Scholar] [CrossRef]
Study | Year | Strengths | Weaknesses | Applications |
---|---|---|---|---|
Zhao et al. [21] | 2020 | Addresses the issue of non-IID. High accuracy (99.21%), uses LSTM and RNN, and robust to long data sequences. | High computational requirements can strain devices and reduce their operational efficiency. The latency introduced by blockchain transactions may hinder the real-time processing capabilities of the IDS. | Intelligent intrusion detection in IoT networks. |
Driss et al. [22] | 2022 | High performance in VSNs, uses GRUs, and maintains privacy. Capability to detect complex cyberattack patterns, improving the robustness of the detection system. | Specific to vehicular sensor networks and the dataset. The implementation of Federated Learning and GRU-based models can be resource-intensive. | Intrusion detection in vehicular sensor networks. |
Khan et al. [23] | 2020 | Stackelberg game-based method and customized ML for device capabilities. | Can be complex to implement in diverse environments. | FL communication among edge servers in large IoT networks. |
Nguyen et al. [24] | 2019 | Self-learning anomaly detection and continuous monitoring. | Potentially high False Positive rate. | Anomaly detection in IoT device communication. |
Du et al. [25] | 2020 | Enhances security in vehicular IoT and uses MEC for large networks. | Specific to vehicular IoT devices and may not generalize well in other scenarios. | Security and performance management in vehicular IoT devices. |
Mothukuri et al. [26] | 2022 | Maintains data privacy, uses GRUs, and is better than traditional methods. | Did not evaluate false alarm rate and few commonly used performance metrics. | Anomaly detection in IoT devices. |
Wu et al. [27] | 2022 | Addresses fraud detection, providing a secure framework for identifying fraudulent activities in IoMT healthcare systems. | IoMT devices often have limited computational power and storage, which can hinder the performance and scalability of the proposed system. | Healthcare data management and fraud detection. |
Deng et al. [28] | 2021 | The use of attention weights and graph-based structures provides interpretability, allowing users to understand the relationships between sensors and the root causes of detected anomalies. | The performance of the model heavily relies on the quality and completeness of the input data, which can be a limitation in environments with noisy or missing data. | Industrial IoT (IIoT) and Transportation Systems. |
Xiao et al. [29] | 2022 | Leverages Graph Attention Networks (GATs) to capture the complex relationships between traffic data, enhancing the detection of subtle anomalies. Uses an attention mechanism within the model to provide insights into which parts of the data contribute most to anomaly detection. | Integrating GNNs into existing in-vehicle networks can be complex and resource-intensive, requiring significant computational power and expertise. | Anomaly detection in automotive security and fleet management. |
Kong et al. [30] | 2024 | The FedCAD model demonstrates superior performance in detecting anomalies, outperforming baseline methods on benchmark datasets. The use of contrastive self-supervised learning improves the quality of data representations, leading to more accurate anomaly detection. | The current implementation is restricted to homogeneous graphs, limiting its applicability to more complex heterogeneous graph structures. | A robust framework that can handle the complexities of graph-structured data. |
Poursafaei et al. [31], [32] | 2021, 2022 | SigTran represents nodes based on structural and transactional characteristics, effectively differentiating nodes involved in illicit activities. TGBASE does not require any parameter tuning, simplifying its implementation and use. | The integration of graph-based methods and signature vectors may introduce complexity in implementation and require substantial computational resources. TGBASE relies on a predefined set of features, which may not capture all nuances of complex temporal graphs, especially in more intricate or diverse applications. | Detecting illicit activities in blockchain transactions. |
Alexopoulos et al. [33] | 2017 | Combines CIDSs with blockchain and enhances trustworthiness. | Managing trust among a large number of collaborating parties can be complex and resource-intensive. | Collaborative Intrusion Detection Systems (CIDSs). |
Rashid et al. [34] | 2021 | Decentralized, secure data traceability, and combats deepfakes. | Focuses on multimedia content and does not cover detailed IoT scenarios. | Data traceability and protection against deepfakes. |
Zaabar et al. [35] | 2022 | Uses Hyperledger Fabric, replaces the central server in FL, and secure learning. | Demonstrates implementation complexity and is specific to IoMT environments. | Intrusion detection in IoMT environments. |
Casado-Vara et al. [36] | 2018 | Decentralized data management and uses edge computing. | High implementation complexity and uses game theory-based algorithm. | Data quality improvement and false data detection. |
Alkadi et al. [37] | 2020 | Uses BiLSTM and smart contracts for confidentiality, outperforming existing models. | While the framework aims to minimize energy consumption and delay, it may still face challenges in highly resource-constrained environments where IoMT devices have extremely limited computational and storage capacities. | Decentralized IDSs in IoT and cloud networks. |
Kumar et al. [38] | 2022 | Uses fog computing for DDoS detection, Random Forest, and XGBoost. | Can cause high latency in data transmission and processing in IoT networks, which can delay the detection and mitigation of threats. | DDoS detection in blockchain-enabled IoT networks. |
Sindhusaranya et al. [39] | 2023 | Privacy-preserving, uses FL-BEPP, and addresses both soft and hard constraints. | The overhead associated with blockchain transactions and Federated Learning model updates can lead to increased latency and reduced performance in large-scale IoMT deployments. | Fraud prevention and security in the IoMT. |
Golomb et al. [40] | 2018 | Collaborative anomaly detection utilizing blockchain. | Designed for limited resources, it may increase computation and communication overhead. | Anomaly detection in IoT networks. |
Lakhan et al. [41] | 2022 | Considers task scheduling, energy consumption (e.g., soft constraints), and hard constraints (e.g., deadlines) when they are being executed on distributed fog and cloud nodes. | Does not address dynamic and unknown run-time attacks, which are more challenging for IoMT systems. | Fraud and privacy preservation in distributed fog and cloud nodes. |
Dey et al. [42] | 2018 | Uses intelligent software agents and is game theory-based | Has high implementation complexity and focuses on transaction evaluation. | Identifying and evaluating malicious transactions. |
Lian et al. [43] | 2022 | Two-stage FL approach, blockchain-based data sharing, and improves accuracy. | Data sharing adds security overheads, which could impact the overall system performance. | Collaborative model training in IoMT devices. |
Eskandari et al. [44] | 2023 | Addresses poisoning attacks and uses a reputation-based consensus mechanism. | Has high computational requirements and is specific to poisoning attacks. | Poisoning attack prevention in FL settings. |
Faheem et al. [45,46,47] | 2024 | These studies provide solutions combining Federated Learning and Blockchain to enhance security and privacy in IoT networks. It offers decentralized storage solutions and smart contracts for efficient data management. They also suggested blockchain for secure data traceability and privacy in multimedia content, addressing issues like deepfakes and cyberattacks. | Implementation complexity can be high, and there can be challenges in achieving scalability and managing computational overhead. The 2nd work focuses primarily on multimedia content and may not cover a broader range of IoT scenarios. | IoT networks, particularly in scenarios requiring enhanced security and privacy, such as smart grids and industrial IoT systems. |
Dataset | Class | Precision | Recall | F1-Score | |||
---|---|---|---|---|---|---|---|
CNN | BiLSTM | CNN | BiLSTM | CNN | BiLSTM | ||
Edge-IIoTset | Normal/Benign | 0.98 | 0.96 | 0.99 | 0.95 | 0.98 | 0.95 |
Backdoor Attack | 0.97 | 0.95 | 0.98 | 0.95 | 0.97 | 0.95 | |
DDoS_HTTP Attack | 0.93 | 0.91 | 0.93 | 0.9 | 0.93 | 0.9 | |
DDoS_ICMP Attack | 0.98 | 0.95 | 0.97 | 0.95 | 0.97 | 0.95 | |
DDoS_TCP Attack | 0.84 | 0.8 | 0.85 | 0.81 | 0.84 | 0.8 | |
DDoS_UDP Attack | 0.7 | 0.7 | 0.7 | 0.68 | 0.7 | 0.69 | |
Fingerprinting Attack | 0.79 | 0.78 | 0.8 | 0.77 | 0.79 | 0.77 | |
MITM Attack | 0.95 | 0.91 | 0.95 | 0.9 | 0.95 | 0.9 | |
Password Attack | 0.84 | 0.85 | 0.84 | 0.85 | 0.84 | 0.85 | |
Port_Scanning Attack | 0.99 | 0.96 | 0.99 | 0.96 | 0.99 | 0.96 | |
Ransomware Attack | 0.89 | 0.88 | 0.89 | 0.87 | 0.89 | 0.87 | |
SQL_injection Attack | 0.72 | 0.71 | 0.73 | 0.66 | 0.72 | 0.68 | |
Uploading Attack | 0.79 | 0.76 | 0.78 | 0.77 | 0.78 | 0.76 | |
Vulnerability_scanner | 0.99 | 0.95 | 0.98 | 0.96 | 0.98 | 0.95 | |
XSS Attack | 0.84 | 0.82 | 0.83 | 0.82 | 0.83 | 0.82 | |
TON_IoT | Normal | 0.98 | 0.97 | 0.98 | 0.95 | 0.98 | 0.96 |
DDoS | 0.99 | 0.97 | 0.98 | 0.96 | 0.99 | 0.96 | |
Injection | 0.96 | 0.94 | 0.97 | 0.94 | 0.97 | 0.94 | |
Password | 0.95 | 0.94 | 0.96 | 0.93 | 0.96 | 0.93 | |
Backdoor | 0.98 | 0.97 | 0.97 | 0.95 | 0.98 | 0.96 | |
Ransomware | 0.99 | 0.97 | 0.98 | 0.96 | 0.99 | 0.97 | |
XSS | 0.99 | 0.98 | 0.98 | 0.96 | 0.99 | 0.98 | |
Scanning | 0.99 | 0.99 | 0.99 | 0.96 | 0.99 | 0.97 |
Dataset | Classifier | Clients | 1st FL Round | 50th FL Round | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
IID | Non-IID | IID | Non-IID | |||||||||||
Best | Worst | Global | Best | Worst | Global | Best | Worst | Global | Best | Worst | Global | |||
Edge-IIoTset | CNN | K = 10 | 0.53 | 0.38 | 0.51 | 0.28 | 0.13 | 0.26 | 0.98 | 0.96 | 0.97 | 0.96 | 0.94 | 0.95 |
K = 15 | 0.46 | 0.35 | 0.45 | 0.20 | 0.09 | 0.19 | 0.98 | 0.95 | 0.96 | 0.95 | 0.92 | 0.94 | ||
K = 20 | 0.46 | 0.32 | 0.43 | 0.19 | 0.06 | 0.17 | 0.99 | 0.95 | 0.97 | 0.95 | 0.91 | 0.93 | ||
BiLSTM | K = 10 | 0.42 | 0.44 | 0.50 | 0.25 | 0.17 | 0.23 | 0.96 | 0.94 | 0.96 | 0.92 | 0.90 | 0.91 | |
K = 15 | 0.48 | 0.40 | 0.46 | 0.21 | 0.13 | 0.19 | 0.96 | 0.94 | 0.95 | 0.92 | 0.90 | 0.91 | ||
K = 20 | 0.49 | 0.42 | 0.48 | 0.21 | 0.14 | 0.20 | 0.97 | 0.94 | 0.94 | 0.91 | 0.89 | 0.90 | ||
TON_IoT | CNN | K = 10 | 0.57 | 0.41 | 0.47 | 0.32 | 0.16 | 0.25 | 0.99 | 0.95 | 0.98 | 0.97 | 0.94 | 0.96 |
K = 15 | 0.48 | 0.38 | 0.48 | 0.30 | 0.14 | 0.20 | 0.99 | 0.94 | 0.98 | 0.96 | 0.95 | 0.95 | ||
K = 20 | 0.48 | 0.34 | 0.45 | 0.21 | 0.10 | 0.21 | 0.99 | 0.96 | 0.97 | 0.96 | 0.94 | 0.95 | ||
BiLSTM | K = 10 | 0.44 | 0.47 | 0.49 | 0.31 | 0.07 | 0.28 | 0.93 | 0.90 | 0.93 | 0.95 | 0.91 | 0.95 | |
K = 15 | 0.50 | 0.43 | 0.49 | 0.26 | 0.20 | 0.21 | 0.95 | 0.90 | 0.93 | 0.95 | 0.92 | 0.93 | ||
K = 20 | 0.51 | 0.45 | 0.51 | 0.27 | 0.15 | 0.20 | 0.94 | 0.89 | 0.93 | 0.93 | 0.90 | 0.92 |
Functions | Transaction Cost (Gas) | Execution Cost (Gas) |
---|---|---|
StoreRecord | 31,845 | 25,158 |
GetRecord | 43,738 | 29,184 |
IoT IDS | Year | Blockchain-Enabled? | Dataset | Classifier | No. of Clients | Accuracy (%) | F1-Score |
---|---|---|---|---|---|---|---|
Li et al. [58] | 2021 | No | Gas Pipeline | CNN-GRU | K = [3, 5, 7] | 96.20 | 0.95 |
Zhao et al. [21] | 2020 | No | SEA | RNN-LSTM | K = 4 | 97.21 | 0.96 |
Nguyen et al. [24] | 2019 | No | Private Dataset | RNN-GRU | K = [5, 9, 15] | 96.51 | 0.96 |
Huong et al. [59] | 2021 | No | Bot-IoT | LocKedge | K = 4 | 96.70 | 0.95 |
Khan et al. [60] | 2024 | No | ToN_IoT | RL (Q-Learning) | K= 3 | 96.40 | 0.95 |
Our Solution | 2024 | Yes | Edge_IIoTset | CNN, BiLSTM | K = [10, 15, 20] | 97.43 (CNN) 96.02(BiLSTM) | 0.97 (CNN) 0.96(BiLSTM) |
TON_IoT | CNN, BiLSTM | K = [10, 15, 20] | 98.21(CNN) 97.42(BiLSTM) | 0.98 (CNN) 0.97(BiLSTM) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Begum, K.; Mozumder, M.A.I.; Joo, M.-I.; Kim, H.-C. BFLIDS: Blockchain-Driven Federated Learning for Intrusion Detection in IoMT Networks. Sensors 2024, 24, 4591. https://doi.org/10.3390/s24144591
Begum K, Mozumder MAI, Joo M-I, Kim H-C. BFLIDS: Blockchain-Driven Federated Learning for Intrusion Detection in IoMT Networks. Sensors. 2024; 24(14):4591. https://doi.org/10.3390/s24144591
Chicago/Turabian StyleBegum, Khadija, Md Ariful Islam Mozumder, Moon-Il Joo, and Hee-Cheol Kim. 2024. "BFLIDS: Blockchain-Driven Federated Learning for Intrusion Detection in IoMT Networks" Sensors 24, no. 14: 4591. https://doi.org/10.3390/s24144591
APA StyleBegum, K., Mozumder, M. A. I., Joo, M.-I., & Kim, H.-C. (2024). BFLIDS: Blockchain-Driven Federated Learning for Intrusion Detection in IoMT Networks. Sensors, 24(14), 4591. https://doi.org/10.3390/s24144591