{"id":"https://openalex.org/W4408092440","doi":"https://doi.org/10.1109/ants63515.2024.10898750","title":"Reconnaissance Detection in Decentralised IoT System using Model-Contrastive Federated Learning","display_name":"Reconnaissance Detection in Decentralised IoT System using Model-Contrastive Federated Learning","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4408092440","doi":"https://doi.org/10.1109/ants63515.2024.10898750"},"language":"en","primary_location":{"id":"doi:10.1109/ants63515.2024.10898750","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants63515.2024.10898750","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5000393142","display_name":"Rajdeep Dutta","orcid":"https://orcid.org/0000-0003-0195-2153"},"institutions":[{"id":"https://openalex.org/I4210089896","display_name":"Indian Institute of Information Technology Guwahati","ror":"https://ror.org/00bb9ch64","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089896"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rajdeep Kumar Dutta","raw_affiliation_strings":["Indian Institute of Information Technology,Dept. of Computer Science and Engineering,Guwahati,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology,Dept. of Computer Science and Engineering,Guwahati,India","institution_ids":["https://openalex.org/I4210089896"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116479406","display_name":"Bishal Chhetry","orcid":null},"institutions":[{"id":"https://openalex.org/I4210089896","display_name":"Indian Institute of Information Technology Guwahati","ror":"https://ror.org/00bb9ch64","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089896"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bishal Chhetry","raw_affiliation_strings":["Indian Institute of Information Technology,Dept. of Computer Science and Engineering,Guwahati,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology,Dept. of Computer Science and Engineering,Guwahati,India","institution_ids":["https://openalex.org/I4210089896"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061302597","display_name":"Rakesh Matam","orcid":"https://orcid.org/0000-0002-1825-2914"},"institutions":[{"id":"https://openalex.org/I4210089896","display_name":"Indian Institute of Information Technology Guwahati","ror":"https://ror.org/00bb9ch64","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089896"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rakesh Matam","raw_affiliation_strings":["Indian Institute of Information Technology,Dept. of Computer Science and Engineering,Guwahati,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology,Dept. of Computer Science and Engineering,Guwahati,India","institution_ids":["https://openalex.org/I4210089896"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047753580","display_name":"Ferdous Ahmed Barbhuiya","orcid":"https://orcid.org/0000-0001-8247-9171"},"institutions":[{"id":"https://openalex.org/I4210089896","display_name":"Indian Institute of Information Technology Guwahati","ror":"https://ror.org/00bb9ch64","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089896"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Ferdous Ahmed Barbhuiya","raw_affiliation_strings":["Indian Institute of Information Technology,Dept. of Computer Science and Engineering,Guwahati,India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology,Dept. of Computer Science and Engineering,Guwahati,India","institution_ids":["https://openalex.org/I4210089896"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5000393142"],"corresponding_institution_ids":["https://openalex.org/I4210089896"],"apc_list":null,"apc_paid":null,"fwci":1.4464,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.85964721,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.991100013256073,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9718999862670898,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.96670001745224,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7258245944976807},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.6416488885879517},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.5389649868011475},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35262054204940796},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.262876033782959}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7258245944976807},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.6416488885879517},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.5389649868011475},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35262054204940796},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.262876033782959}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ants63515.2024.10898750","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ants63515.2024.10898750","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2503352773","https://openalex.org/W2571907764","https://openalex.org/W2781167622","https://openalex.org/W2799758613","https://openalex.org/W2810443361","https://openalex.org/W2945594226","https://openalex.org/W2951694401","https://openalex.org/W2982838702","https://openalex.org/W2984678057","https://openalex.org/W3086579950","https://openalex.org/W3170494183","https://openalex.org/W3182158470","https://openalex.org/W3184668263","https://openalex.org/W3191470662","https://openalex.org/W3196371845","https://openalex.org/W4206724648","https://openalex.org/W4285818738","https://openalex.org/W4287332481","https://openalex.org/W4289529959","https://openalex.org/W4313646283","https://openalex.org/W4379232043","https://openalex.org/W4382281941","https://openalex.org/W4402035331"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4298221930","https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2390279801","https://openalex.org/W3176937389","https://openalex.org/W4408069290"],"abstract_inverted_index":{"The":[0,106,216],"detection":[1,28,140,214],"of":[2,10,94,187,218,227,236],"reconnaissance":[3,150,179],"attacks":[4],"is":[5],"crucial":[6],"for":[7,148,198,208],"safeguarding":[8],"Internet":[9],"Things":[11],"(IoT)":[12],"environments,":[13],"which":[14,112,168],"are":[15,62,154],"inherently":[16],"more":[17,160],"vulnerable":[18],"and":[19,37,64,102,121,128,145,174,195,211],"resource-constrained":[20],"compared":[21],"to":[22,41,44,117,171,239],"traditional":[23],"computing":[24],"systems.":[25],"Traditional":[26],"centralised":[27],"methods":[29],"face":[30],"significant":[31,172],"challenges,":[32,70],"such":[33,164],"as":[34,165],"privacy":[35,101],"concerns":[36],"limited":[38],"scalability":[39],"due":[40],"the":[42,92,114,138,156,183,205,225,233],"need":[43,207],"aggregate":[45],"raw":[46,96],"data":[47,104,131,228],"on":[48],"a":[49,74,143,193],"central":[50],"server.":[51],"These":[52,152],"issues":[53],"become":[54],"particularly":[55],"pronounced":[56],"in":[57,159,201,220],"IoT":[58,89,188,202,237],"environments":[59],"where":[60],"devices":[61,90],"diverse":[63],"geographically":[65],"distributed.":[66],"To":[67],"address":[68],"these":[69],"we":[71],"propose":[72],"ReconGuard,":[73],"novel":[75],"approach":[76,107],"leveraging":[77],"Model":[78],"Contrastive":[79],"Federated":[80],"Learning":[81],"(MCFL).":[82],"ReconGuard":[83,181,221],"enables":[84],"collaborative":[85],"training":[86],"across":[87],"multiple":[88],"without":[91],"necessity":[93],"sharing":[95],"data,":[97],"thereby":[98],"preserving":[99],"user":[100],"enhancing":[103],"security.":[105],"integrates":[108],"contrastive":[109],"learning":[110],"techniques,":[111],"improve":[113],"model\u2019s":[115],"ability":[116],"discriminate":[118],"between":[119],"benign":[120],"malicious":[122],"activities":[123,153],"by":[124],"contrasting":[125],"positive":[126],"(similar)":[127],"negative":[129],"(dissimilar)":[130],"pairs.":[132],"Our":[133],"experimental":[134],"results":[135],"demonstrate":[136],"that":[137],"ReconGuard-based":[139],"system":[141],"provides":[142],"scalable":[144],"privacy-preserving":[146,212],"solution":[147],"identifying":[149],"activities.":[151],"often":[155],"initial":[157],"step":[158],"severe":[161],"cyber":[162,243],"threats,":[163],"botnet":[166],"attacks,":[167],"can":[169],"lead":[170],"disruption":[173],"damage.":[175],"By":[176],"effectively":[177],"detecting":[178],"activities,":[180],"enhances":[182],"overall":[184],"cybersecurity":[185,200],"framework":[186],"environments.":[189],"This":[190],"research":[191],"presents":[192],"viable":[194],"innovative":[196],"method":[197],"improving":[199],"systems,":[203],"addressing":[204],"critical":[206],"scalable,":[209],"efficient,":[210],"intrusion":[213],"solutions.":[215],"use":[217],"MCFL":[219],"not":[222],"only":[223],"mitigates":[224],"challenges":[226],"centralisation":[229],"but":[230],"also":[231],"leverages":[232],"distributed":[234],"nature":[235],"networks":[238],"enhance":[240],"robustness":[241],"against":[242],"threats.":[244]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2026-03-12T08:34:05.389933","created_date":"2025-10-10T00:00:00"}
