REVIEW ON THE USE OF FEDERATED LEARNING MODELS FOR THE SECURITY OF CYBER-PHYSICAL SYSTEMS

被引:0
|
作者
War, Muhammed rafeeq [1 ]
Singh, Yashwant [2 ]
Sheikh, Zakir ahmad [3 ]
Singh, Pradeep kumar [4 ]
机构
[1] Cent Univ Jammu, Bagla Suchani, Jammu & Kashmir, India
[2] Cent Univ Jammu, Dept Comp Sci & Informat Technol, Bagla Suchani 181143, Jammu & Kashmir, India
[3] Cent Univ Jammu, Dept Comp Sci & Informat Technol, Bagla Suchani 181143, Jammu & Kashmir, India
[4] Cent Univ Jammu, Dept Comp Sci & Engn, Bagla Suchani, Jammu & Kashmir, India
来源
SCALABLE COMPUTING-PRACTICE AND EXPERIENCE | 2025年 / 26卷 / 01期
关键词
Constraint CPS; CPS Security; Cyber Security; Distributed Learning; Federated Learning; Intelligent Security; PROTOCOLS; THREATS;
D O I
10.12694/scpe.v26i1.3438
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The field of critical infrastructure has undergone significant expansion over the past three decades, spurred by global economic liberalization and the pursuit of development, industrialization, and privatization by nations worldwide. This rapid growth has led to a proliferation of critical infrastructure across various sectors, necessitating decentralization efforts to manage the associated burdens effectively. With the advent of artificial intelligence and machine learning, computer scientists have sought innovative approaches to detect and respond to the evolving landscape of cyber threats. Despite efforts to subscribe to these changes, attackers continually devise new methods to evade detection, requiring constant vigilance and adaptation from cybersecurity professionals. Traditional centralized models of machine and deep learning demand substantial data and computational resources, making them susceptible to single-point failures. To address these challenges, scientists have introduced federated learning-a decentralized technique that minimizes computational costs while prioritizing data privacy and preservation. This review article delves into recent research and review papers concerning critical infrastructure security and federated learning, exploring various architectures, threats, vulnerabilities, and attack vectors. Through our analysis, we provide a comprehensive overview of federated learning, cyber-physical systems security, and the advantages of integrating federated learning into critical infrastructure environments. By synthesizing insights from diverse sources, our study contributes to a deeper understanding of federated learning's applications and implications in safeguarding critical infrastructures. We highlight the potential of federated learning to enhance cybersecurity measures while addressing the unique challenges posed by modern-day threats. As organizations and nations navigate the complexities of securing their critical assets, the adoption of federated learning emerges as a promising strategy to bolster resilience and protect against emerging cyber risks.
引用
收藏
页码:16 / 33
页数:18
相关论文
共 50 条
  • [21] Cyber-physical systems and their security issues
    Alguliyev, Rasim
    Imamverdiyev, Yadigar
    Sukhostat, Lyudmila
    COMPUTERS IN INDUSTRY, 2018, 100 : 212 - 223
  • [22] Safety and security of cyber-physical systems
    Biro, Miklos
    Mashkoor, Atif
    Sametinger, Johannes
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2023, 35 (07)
  • [23] Analysis of security in cyber-physical systems
    CHEN Jie
    ZHANG Fan
    SUN Jian
    Science China(Technological Sciences), 2017, (12) : 1975 - 1977
  • [24] Cyber-Physical Systems: A Security Perspective
    Konstantinou, Charalambos
    Maniatakos, Michail
    Saqib, Fareena
    Hu, Shiyan
    Plusquellic, Jim
    Jin, Yier
    2015 20TH IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2015,
  • [25] Cyber-Physical Systems Security and Privacy
    Henkel, Jorg
    IEEE DESIGN & TEST, 2017, 34 (04) : 4 - 4
  • [26] A Survey on Cyber-Physical Systems Security
    Yu, Zhenhua
    Gao, Hongxia
    Cong, Xuya
    Wu, Naiqi
    Song, Houbing Herbert
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (24) : 21670 - 21686
  • [27] Security Enumerations for Cyber-Physical Systems
    Schlette, Daniel
    Menges, Florian
    Baumer, Thomas
    Pernul, Guenther
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIV, DBSEC 2020, 2020, 12122 : 64 - 76
  • [28] Modeling security in cyber-physical systems
    Burmester, Mike
    Magkos, Ernmanouil
    Chrissikopoulos, Vassilis
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2012, 5 (3-4) : 118 - 126
  • [29] Security Games for Cyber-Physical Systems
    Vigo, Roberto
    Bruni, Alessandro
    Yuksel, Ender
    SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 17 - 32
  • [30] Analysis of security in cyber-physical systems
    CHEN Jie
    ZHANG Fan
    SUN Jian
    Science China(Technological Sciences), 2017, 60 (12) : 1975 - 1977