Communities & Collections
Researchers & Labs
Titles
DGIST
LIBRARY
DGIST R&D
Detail View
Department of Electrical Engineering and Computer Science
Computational Theory and Applications Laboratory
1. Journal Articles
Privacy-Preserving Anomaly Detection with Homomorphic Encryption for Industrial Control Systems in Critical Infrastructure
Jeong, Dahoon
;
Kim, Yooshin
;
Shin, Donghoon
Department of Electrical Engineering and Computer Science
Computational Theory and Applications Laboratory
1. Journal Articles
Citations
WEB OF SCIENCE
Citations
SCOPUS
Metadata Downloads
XML
Excel
Title
Privacy-Preserving Anomaly Detection with Homomorphic Encryption for Industrial Control Systems in Critical Infrastructure
Issued Date
2025-08
Citation
IEEE Embedded Systems Letters, v.17, no.4, pp.276 - 279
Type
Article
Author Keywords
Anomaly detection
;
critical infrastructure (CI)
;
homomorphic encryption (HE)
;
industrial control system (ICS)
;
privacy-preserving machine learning
ISSN
1943-0663
Abstract
Critical infrastructure (CI) is essential for societal and economic stability, making it a prime target for cyber threats. Traditional anomaly detection models like LSTM and Transformers require substantial computational resources, which are often unavailable in CI environments. Cloud computing offers on-demand resources but introduces privacy concerns due to the need to transmit sensitive data to cloud servers. Homomorphic encryption (HE) enables secure processing of encrypted data but is computationally intensive, particularly due to operations like bootstrapping. This paper proposes a bootstrapping-free lightweight anomaly detection model optimized for homomorphically encrypted data, leveraging CI's operational characteristics. The model employs a two-stage data separation process and introduces state-vectors for normal operation detection, forming a whitelist anomaly detection approach. Experimental results on the SWaT and WADI datasets demonstrate the model's competitive performance and efficiency, with significantly reduced training times while maintaining robust security. © IEEE.
URI
http://hdl.handle.net/20.500.11750/58292
DOI
10.1109/LES.2025.3538013
Publisher
Institute of Electrical and Electronics Engineers
Show Full Item Record
File Downloads
There are no files associated with this item.
공유
공유하기
Related Researcher
Shin, Donghoon
신동훈
Department of Electrical Engineering and Computer Science
read more
Total Views & Downloads