Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Federated learning for drone authentication

Published: 01 September 2021 Publication History

Abstract

The ever-rising applications of drones in the Internet of Things (IoT) era is offering many opportunities and challenges. Owing to drone abilities (silent flying, capturing photos and videos, etc.), there is widespread concern about drone authentication and which drones allow to fly. In this regard, there are several machine learning (ML) proposals for authentication in IoT networks. Such ML-based models have drawbacks in data security, privacy-preserving, and scalability when applied in drone authentication. ML-based methods collect all data and centrally train the authentication model, exposing the model to adversarial situations. This paper proposes a federated learning-based drone authentication model with drones’ Radio Frequency (RF) features in IoT networks. In the proposed model, the Deep Neural Network (DNN) architecture is implemented for drone authentication with Stochastic Gradient Descent (SGD) optimization performed locally on drones. Also, Homomorphic encryption and the secure aggregation method are applied to secure model parameters. Experimental results show that the federated drone authentication model gains a high true positive rate (TPR) during drone authentication and better performance compared to other ML-based models.

References

[1]
Yazdinejad A., Parizi R.M., Dehghantanha A., Zhang Q., Choo K.-K.R., An energy-efficient SDN controller architecture for IoT networks with blockchain-based security, IEEE Trans. Serv. Comput. 13 (4) (2020) 625–638.
[2]
Yazdinejad A., Srivastava G., Parizi R.M., Dehghantanha A., Choo K.-K.R., Aledhari M., Decentralized authentication of distributed patients in hospital networks using blockchain, IEEE J. Biomed. Health Inf. 24 (8) (2020) 2146–2156.
[3]
Al-Emadi S., Al-Senaid F., Drone detection approach based on radio-frequency using convolutional neural network, in: 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), IEEE, 2020, pp. 29–34.
[4]
Yang S., Qin H., Liang X., Gulliver T.A., An improved unauthorized unmanned aerial vehicle detection algorithm using radiofrequency-based statistical fingerprint analysis, Sensors 19 (2) (2019) 274.
[5]
Shi W., Zhou H., Li J., Xu W., Zhang N., Shen X., Drone assisted vehicular networks: Architecture, challenges and opportunities, IEEE Netw. 32 (3) (2018) 130–137.
[6]
Kumar A., Krishnamurthi R., Nayyar A., Luhach A.K., Khan M.S., Singh A., A novel Software-Defined Drone Network (SDDN)-based collision avoidance strategies for on-road traffic monitoring and management, Veh. Commun. 28 (2021).
[7]
Yazdinejad A., Parizi R.M., Srivastava G., Dehghantanha A., Making sense of blockchain for AI deepfakes technology, in: 2020 IEEE Globecom Workshops (GC Wkshps), IEEE, 2020, pp. 1–6.
[8]
Yazdinejad A., Parizi R.M., Dehghantanha A., Karimipour H., Srivastava G., Aledhari M., Enabling drones in the internet of things with decentralized blockchain-based security, IEEE Internet Things J. 8 (8) (2020) 6406–6415.
[9]
Hosseini H., Yun S., Park H., Louizos C., Soriaga J., Welling M., Federated learning of user authentication models, 2020, arxiv preprint arXiv:2007.04618.
[10]
Hong C.-P., A study of machine learning based face recognition for user authentication, J. Semicond. Disp. Technol. 19 (2) (2020) 96–99.
[11]
Mothukuri V., Parizi R.M., Pouriyeh S., Huang Y., Dehghantanha A., Srivastava G., A survey on security and privacy of federated learning, Future Gener. Comput. Syst. 115 (2021) 619–640.
[12]
Aledhari M., Razzak R., Parizi R.M., Saeed F., Federated learning: A survey on enabling technologies, protocols, and applications, IEEE Access 8 (2020) 140699–140725.
[13]
Yazdinejadna A., Parizi R.M., Dehghantanha A., Khan M.S., A kangaroo-based intrusion detection system on software-defined networks, Comput. Netw. (2020),. URL http://www.sciencedirect.com/science/article/pii/S1389128620312949.
[14]
Bello A., Biswal B., Shetty S., Kamhoua C., Gold K., Radio frequency classification toolbox for drone detection, in: Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, Vol. 11006, International Society for Optics and Photonics, 2019, p. 110061Y.
[15]
Nilsson A., Smith S., Evaluating the Performance of Federated Learning A Case Study of Distributed Machine Learning with Erlang, (Master’s thesis) 2018.
[16]
Huang A., Gao S., Chen J., Xu L., Nathan A., High security user authentication enabled by piezoelectric keystroke dynamics and machine learning, IEEE Sens. J. 20 (21) (2020) 13037–13046.
[17]
Lee K., Esposito C., Lee S.-Y., Vulnerability analysis challenges of the mouse data based on machine learning for image-based user authentication, IEEE Access 7 (2019) 177241–177253.
[18]
Ashibani Y., Mahmoud Q.H., A machine learning-based user authentication model using mobile app data, in: International Conference on Intelligent and Fuzzy Systems, Springer, 2019, pp. 408–415.
[19]
Huang A., Gao S., Chen J., Xu L., Nathan A., High security user authentication enabled by piezoelectric keystroke dynamics and machine learning, IEEE Sens. J. 20 (21) (2020) 13037–13046.
[20]
Hailemariam Y., Yazdinejad A., Parizi R.M., Srivastava G., Dehghantanha A., An empirical evaluation of AI deep explainable tools, in: 2020 IEEE Globecom Workshops (GC Wkshps), IEEE, 2020, pp. 1–6.
[21]
P. Nguyen, H. Truong, M. Ravindranathan, A. Nguyen, R. Han, T. Vu, Matthan: Drone presence detection by identifying physical signatures in the drone’s rf communication, in: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, 2017, pp. 211–224.
[22]
Mothukuri V., Khare P., Parizi R.M., Pouriyeh S., Dehghantanha A., Srivastava G., Federated learning-based anomaly detection for IoT security attacks, IEEE Internet Things J. (2021) 1,.
[23]
K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H.B. McMahan, S. Patel, D. Ramage, A. Segal, K. Seth, Practical secure aggregation for privacy-preserving machine learning, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 1175–1191.
[24]
McMahan B., Moore E., Ramage D., Hampson S., y Arcas B.A., Communication-efficient learning of deep networks from decentralized data, in: Artificial Intelligence and Statistics, PMLR, 2017, pp. 1273–1282.
[25]
Yu F.X., Rawat A.S., Menon A.K., Kumar S., Federated learning with only positive labels, 2020, arxiv preprint arXiv:2004.10342.
[26]
Li Y., Chang T.-H., Chi C.-Y., Secure federated averaging algorithm with differential privacy, in: 2020 IEEE 30th International Workshop on Machine Learning for Signal Processing (MLSP), IEEE, 2020, pp. 1–6.
[27]
PySyft, A library for computing on data, https://github.com/OpenMined/PySyft.
[28]
Yazdinejad A., HaddadPajouh H., Dehghantanha A., Parizi R.M., Srivastava G., Chen M.-Y., Cryptocurrency malware hunting: A deep recurrent neural network approach, Appl. Soft Comput. 96 (2020).
[29]
W. Purwanto, H. Wu, M. Sosonkina, K. Arcaute, DeapSECURE: Empowering students for data-and compute-intensive research in cybersecurity through training, in: Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (Learning), 2019, pp. 1–8.

Cited By

View all
  • (2025)Toward Enhancing Privacy Preservation of a Federated Learning CNN Intrusion Detection System in IoT: Method and Empirical StudyACM Transactions on Software Engineering and Methodology10.1145/369599834:2(1-48)Online publication date: 25-Jan-2025
  • (2024)Privacy preservation using optimized Federated LearningIntelligent Decision Technologies10.3233/IDT-23010418:1(135-149)Online publication date: 1-Jan-2024
  • (2024)EBDTS: An Efficient BCoT-Based Data Trading System Using PUF for AuthenticationIEEE Transactions on Network and Service Management10.1109/TNSM.2024.340652421:5(5795-5808)Online publication date: 1-Oct-2024
  • Show More Cited By

Index Terms

  1. Federated learning for drone authentication
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Ad Hoc Networks
        Ad Hoc Networks  Volume 120, Issue C
        Sep 2021
        123 pages

        Publisher

        Elsevier Science Publishers B. V.

        Netherlands

        Publication History

        Published: 01 September 2021

        Author Tags

        1. Drones
        2. Privacy-preserving
        3. IoT
        4. Drone authentication
        5. Federated learning
        6. Radio Frequency

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 05 Mar 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2025)Toward Enhancing Privacy Preservation of a Federated Learning CNN Intrusion Detection System in IoT: Method and Empirical StudyACM Transactions on Software Engineering and Methodology10.1145/369599834:2(1-48)Online publication date: 25-Jan-2025
        • (2024)Privacy preservation using optimized Federated LearningIntelligent Decision Technologies10.3233/IDT-23010418:1(135-149)Online publication date: 1-Jan-2024
        • (2024)EBDTS: An Efficient BCoT-Based Data Trading System Using PUF for AuthenticationIEEE Transactions on Network and Service Management10.1109/TNSM.2024.340652421:5(5795-5808)Online publication date: 1-Oct-2024
        • (2024)Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of ThingsJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2024.103088148:COnline publication date: 1-Mar-2024
        • (2024)CRSFLJournal of Network and Computer Applications10.1016/j.jnca.2024.103987231:COnline publication date: 1-Nov-2024
        • (2024)Machine learning for enhancing transportation securityEngineering Applications of Artificial Intelligence10.1016/j.engappai.2023.107667129:COnline publication date: 16-May-2024
        • (2024)Surveying cybersecurity vulnerabilities and countermeasures for enhancing UAV securityComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2024.110695252:COnline publication date: 1-Oct-2024
        • (2024)A survey on security of UAV and deep reinforcement learningAd Hoc Networks10.1016/j.adhoc.2024.103642164:COnline publication date: 21-Nov-2024
        • (2024)Exploring privacy measurement in federated learningThe Journal of Supercomputing10.1007/s11227-023-05846-480:8(10511-10551)Online publication date: 1-May-2024
        • (2023)Generative Adversarial Networks for Cyber Threat Hunting in Ethereum BlockchainDistributed Ledger Technologies: Research and Practice10.1145/35846662:2(1-19)Online publication date: 8-Jun-2023
        • Show More Cited By

        View Options

        View options

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media