Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Federated learning for drone authentication

Published: 01 September 2021 Publication History

Abstract

The ever-rising applications of drones in the Internet of Things (IoT) era is offering many opportunities and challenges. Owing to drone abilities (silent flying, capturing photos and videos, etc.), there is widespread concern about drone authentication and which drones allow to fly. In this regard, there are several machine learning (ML) proposals for authentication in IoT networks. Such ML-based models have drawbacks in data security, privacy-preserving, and scalability when applied in drone authentication. ML-based methods collect all data and centrally train the authentication model, exposing the model to adversarial situations. This paper proposes a federated learning-based drone authentication model with drones’ Radio Frequency (RF) features in IoT networks. In the proposed model, the Deep Neural Network (DNN) architecture is implemented for drone authentication with Stochastic Gradient Descent (SGD) optimization performed locally on drones. Also, Homomorphic encryption and the secure aggregation method are applied to secure model parameters. Experimental results show that the federated drone authentication model gains a high true positive rate (TPR) during drone authentication and better performance compared to other ML-based models.

References

[1]
Yazdinejad A., Parizi R.M., Dehghantanha A., Zhang Q., Choo K.-K.R., An energy-efficient SDN controller architecture for IoT networks with blockchain-based security, IEEE Trans. Serv. Comput. 13 (4) (2020) 625–638.
[2]
Yazdinejad A., Srivastava G., Parizi R.M., Dehghantanha A., Choo K.-K.R., Aledhari M., Decentralized authentication of distributed patients in hospital networks using blockchain, IEEE J. Biomed. Health Inf. 24 (8) (2020) 2146–2156.
[3]
Al-Emadi S., Al-Senaid F., Drone detection approach based on radio-frequency using convolutional neural network, in: 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), IEEE, 2020, pp. 29–34.
[4]
Yang S., Qin H., Liang X., Gulliver T.A., An improved unauthorized unmanned aerial vehicle detection algorithm using radiofrequency-based statistical fingerprint analysis, Sensors 19 (2) (2019) 274.
[5]
Shi W., Zhou H., Li J., Xu W., Zhang N., Shen X., Drone assisted vehicular networks: Architecture, challenges and opportunities, IEEE Netw. 32 (3) (2018) 130–137.
[6]
Kumar A., Krishnamurthi R., Nayyar A., Luhach A.K., Khan M.S., Singh A., A novel Software-Defined Drone Network (SDDN)-based collision avoidance strategies for on-road traffic monitoring and management, Veh. Commun. 28 (2021).
[7]
Yazdinejad A., Parizi R.M., Srivastava G., Dehghantanha A., Making sense of blockchain for AI deepfakes technology, in: 2020 IEEE Globecom Workshops (GC Wkshps), IEEE, 2020, pp. 1–6.
[8]
Yazdinejad A., Parizi R.M., Dehghantanha A., Karimipour H., Srivastava G., Aledhari M., Enabling drones in the internet of things with decentralized blockchain-based security, IEEE Internet Things J. 8 (8) (2020) 6406–6415.
[9]
Hosseini H., Yun S., Park H., Louizos C., Soriaga J., Welling M., Federated learning of user authentication models, 2020, arxiv preprint arXiv:2007.04618.
[10]
Hong C.-P., A study of machine learning based face recognition for user authentication, J. Semicond. Disp. Technol. 19 (2) (2020) 96–99.
[11]
Mothukuri V., Parizi R.M., Pouriyeh S., Huang Y., Dehghantanha A., Srivastava G., A survey on security and privacy of federated learning, Future Gener. Comput. Syst. 115 (2021) 619–640.
[12]
Aledhari M., Razzak R., Parizi R.M., Saeed F., Federated learning: A survey on enabling technologies, protocols, and applications, IEEE Access 8 (2020) 140699–140725.
[13]
Yazdinejadna A., Parizi R.M., Dehghantanha A., Khan M.S., A kangaroo-based intrusion detection system on software-defined networks, Comput. Netw. (2020),. URL http://www.sciencedirect.com/science/article/pii/S1389128620312949.
[14]
Bello A., Biswal B., Shetty S., Kamhoua C., Gold K., Radio frequency classification toolbox for drone detection, in: Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, Vol. 11006, International Society for Optics and Photonics, 2019, p. 110061Y.
[15]
Nilsson A., Smith S., Evaluating the Performance of Federated Learning A Case Study of Distributed Machine Learning with Erlang, (Master’s thesis) 2018.
[16]
Huang A., Gao S., Chen J., Xu L., Nathan A., High security user authentication enabled by piezoelectric keystroke dynamics and machine learning, IEEE Sens. J. 20 (21) (2020) 13037–13046.
[17]
Lee K., Esposito C., Lee S.-Y., Vulnerability analysis challenges of the mouse data based on machine learning for image-based user authentication, IEEE Access 7 (2019) 177241–177253.
[18]
Ashibani Y., Mahmoud Q.H., A machine learning-based user authentication model using mobile app data, in: International Conference on Intelligent and Fuzzy Systems, Springer, 2019, pp. 408–415.
[19]
Huang A., Gao S., Chen J., Xu L., Nathan A., High security user authentication enabled by piezoelectric keystroke dynamics and machine learning, IEEE Sens. J. 20 (21) (2020) 13037–13046.
[20]
Hailemariam Y., Yazdinejad A., Parizi R.M., Srivastava G., Dehghantanha A., An empirical evaluation of AI deep explainable tools, in: 2020 IEEE Globecom Workshops (GC Wkshps), IEEE, 2020, pp. 1–6.
[21]
P. Nguyen, H. Truong, M. Ravindranathan, A. Nguyen, R. Han, T. Vu, Matthan: Drone presence detection by identifying physical signatures in the drone’s rf communication, in: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, 2017, pp. 211–224.
[22]
Mothukuri V., Khare P., Parizi R.M., Pouriyeh S., Dehghantanha A., Srivastava G., Federated learning-based anomaly detection for IoT security attacks, IEEE Internet Things J. (2021) 1,.
[23]
K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H.B. McMahan, S. Patel, D. Ramage, A. Segal, K. Seth, Practical secure aggregation for privacy-preserving machine learning, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 1175–1191.
[24]
McMahan B., Moore E., Ramage D., Hampson S., y Arcas B.A., Communication-efficient learning of deep networks from decentralized data, in: Artificial Intelligence and Statistics, PMLR, 2017, pp. 1273–1282.
[25]
Yu F.X., Rawat A.S., Menon A.K., Kumar S., Federated learning with only positive labels, 2020, arxiv preprint arXiv:2004.10342.
[26]
Li Y., Chang T.-H., Chi C.-Y., Secure federated averaging algorithm with differential privacy, in: 2020 IEEE 30th International Workshop on Machine Learning for Signal Processing (MLSP), IEEE, 2020, pp. 1–6.
[27]
PySyft, A library for computing on data, https://github.com/OpenMined/PySyft.
[28]
Yazdinejad A., HaddadPajouh H., Dehghantanha A., Parizi R.M., Srivastava G., Chen M.-Y., Cryptocurrency malware hunting: A deep recurrent neural network approach, Appl. Soft Comput. 96 (2020).
[29]
W. Purwanto, H. Wu, M. Sosonkina, K. Arcaute, DeapSECURE: Empowering students for data-and compute-intensive research in cybersecurity through training, in: Proceedings of the Practice and Experience in Advanced Research Computing on Rise of the Machines (Learning), 2019, pp. 1–8.

Cited By

View all
  • (2024)Privacy preservation using optimized Federated LearningIntelligent Decision Technologies10.3233/IDT-23010418:1(135-149)Online publication date: 1-Jan-2024
  • (2024)EBDTS: An Efficient BCoT-Based Data Trading System Using PUF for AuthenticationIEEE Transactions on Network and Service Management10.1109/TNSM.2024.340652421:5(5795-5808)Online publication date: 1-Oct-2024
  • (2024)Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of ThingsJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2024.103088148:COnline publication date: 1-Mar-2024
  • Show More Cited By

Index Terms

  1. Federated learning for drone authentication
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Ad Hoc Networks
    Ad Hoc Networks  Volume 120, Issue C
    Sep 2021
    123 pages

    Publisher

    Elsevier Science Publishers B. V.

    Netherlands

    Publication History

    Published: 01 September 2021

    Author Tags

    1. Drones
    2. Privacy-preserving
    3. IoT
    4. Drone authentication
    5. Federated learning
    6. Radio Frequency

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 10 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Privacy preservation using optimized Federated LearningIntelligent Decision Technologies10.3233/IDT-23010418:1(135-149)Online publication date: 1-Jan-2024
    • (2024)EBDTS: An Efficient BCoT-Based Data Trading System Using PUF for AuthenticationIEEE Transactions on Network and Service Management10.1109/TNSM.2024.340652421:5(5795-5808)Online publication date: 1-Oct-2024
    • (2024)Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of ThingsJournal of Systems Architecture: the EUROMICRO Journal10.1016/j.sysarc.2024.103088148:COnline publication date: 1-Mar-2024
    • (2024)Machine learning for enhancing transportation securityEngineering Applications of Artificial Intelligence10.1016/j.engappai.2023.107667129:COnline publication date: 16-May-2024
    • (2024)Exploring privacy measurement in federated learningThe Journal of Supercomputing10.1007/s11227-023-05846-480:8(10511-10551)Online publication date: 1-May-2024
    • (2023)Generative Adversarial Networks for Cyber Threat Hunting in Ethereum BlockchainDistributed Ledger Technologies: Research and Practice10.1145/35846662:2(1-19)Online publication date: 8-Jun-2023
    • (2023)Machine Learning Applications in Internet-of-Drones: Systematic Review, Recent Deployments, and Open IssuesACM Computing Surveys10.1145/357172855:12(1-45)Online publication date: 3-Mar-2023
    • (2023)Modelling of oppositional Aquila Optimizer with machine learning enabled secure access control in Internet of drones environmentTheoretical Computer Science10.1016/j.tcs.2022.08.019941:C(39-54)Online publication date: 4-Jan-2023
    • (2023)A comprehensive survey on security, privacy issues and emerging defence technologies for UAVsJournal of Network and Computer Applications10.1016/j.jnca.2023.103607213:COnline publication date: 1-Apr-2023
    • (2023)A survey on security and privacy issues of UAVsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.109626224:COnline publication date: 1-Apr-2023
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media