Bitte benutzen Sie diese Kennung, um auf die Ressource zu verweisen: http://dx.doi.org/10.25673/120997
Titel: Privacy-Aware Machine Learning Techniques for Secure Internet of Things Systems
Autor(en): Bnilam, Ali
Jawad, Murtadha Ahmed
Abed, Hasan
Körperschaft: Hochschule Anhalt
Erscheinungsdatum: 2025-07-26
Umfang: 1 Online-Ressource (7 Seiten)
Sprache: Englisch
Zusammenfassung: The rapid expansion of the Internet of Things (IoT) has enabled numerous industries to benefit from enhanced connectivity and automation. Despite these advancements, IoT devices pose serious privacy and security challenges due to the vast amounts of sensitive data they generate and transmit. The distributed and dynamic nature of IoT environments necessitates more sophisticated security measures. This paper proposes a privacy-aware machine learning (ML) approach for securing IoT systems, aiming to detect and prevent malicious activities without compromising user privacy. By employing privacy-preserving ML techniques such as federated learning and differential privacy, the method supports efficient and adaptive threat detection while ensuring data confidentiality. Comparative results clearly indicate that the proposed approach significantly outperforms existing solutions in terms of both overall performance and privacy protection, thereby offering a more robust and secure framework for safeguarding IoT networks under diverse and sophisticated attack scenarios. This research focuses on developing advanced, privacy-preserving machine learning methods tailored specifically for enhancing IoT security. By strategically combining federated learning techniques with lightweight encryption methods, the framework effectively protects sensitive data at the edge-device level, preventing unauthorized access or misuse. Experimental evaluations demonstrate that our proposed model achieves approximately 12% higher accuracy compared to conventional differential privacy methods, all while maintaining rigorous confidentiality standards and minimal computational overhead. These outcomes suggest promising potential for broad real-world applicability in secure IoT deployments.
URI: https://opendata.uni-halle.de//handle/1981185920/122952
http://dx.doi.org/10.25673/120997
Open-Access: Open-Access-Publikation
Nutzungslizenz: (CC BY-SA 4.0) Creative Commons Namensnennung - Weitergabe unter gleichen Bedingungen 4.0 International(CC BY-SA 4.0) Creative Commons Namensnennung - Weitergabe unter gleichen Bedingungen 4.0 International
Enthalten in den Sammlungen:International Conference on Applied Innovations in IT (ICAIIT)

Dateien zu dieser Ressource:
Datei Beschreibung GrößeFormat 
1-8-ICAIIT_2025_13(3).pdf958.5 kBAdobe PDFMiniaturbild
Öffnen/Anzeigen