CIVILICA We Respect the Science
(ناشر تخصصی کنفرانسهای کشور / شماره مجوز انتشارات از وزارت فرهنگ و ارشاد اسلامی: ۸۹۷۱)

Blockchain-Enabled Federated Learning to Enhance Security and Privacy in Internet of Medical Things (IoMT)

عنوان مقاله: Blockchain-Enabled Federated Learning to Enhance Security and Privacy in Internet of Medical Things (IoMT)
شناسه ملی مقاله: JR_IJWR-6-1_010
منتشر شده در در سال 1402
مشخصات نویسندگان مقاله:

zahra eskandari - Department of computer engineering , Quchan University of Technology, Quchan, Iran
Mohammad Rezaee - Department of computer engineering, Quchan University of Technology, quchan, Iran

خلاصه مقاله:
Federated learning is a distributed data analysis approach used in many IoT applications, including IoMT, due to its ability to provide acceptable accuracy and privacy. However, a critical issue with Federated learning is the poisoning attack, which has severe consequences on the accuracy of the global model caused by the server's lack of access to raw data. To deal with this problem effectively, a distributed federated learning approach involving blockchain technology is proposed. Using the consensus mechanism based on reputation-based verifier selection, verifiers are selected based on their honest participation in identifying compromised clients. This approach ensures that these clients are correctly identified and their attack is ineffective. The proposed detection mechanism can efficiently resist the data poisoning attack, which significantly improves the accuracy of the global model. Based on evaluation, the accuracy of the global model is compared with and without the proposed detection mechanism that varies with the percentage of poisonous clients and different values for the fraction of poisonous data. In addition to the stable accuracy range of nearly ۹۳%, the accuracy of our proposed detection mechanism is not affected by the increase of α in different values of β.

کلمات کلیدی:
Blockchain, Consensus Algorithm, Federated Learning, Internet of Medical Things, Poisoning Attack

صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/1898857/