Detail View

Privacy-Preserving Anomaly Detection with Homomorphic Encryption for Industrial Control Systems in Critical Infrastructure
Citations

WEB OF SCIENCE

Citations

SCOPUS

Metadata Downloads

DC Field Value Language
dc.contributor.author Jeong, Dahoon -
dc.contributor.author Kim, Yooshin -
dc.contributor.author Shin, Donghoon -
dc.date.accessioned 2025-04-16T11:40:15Z -
dc.date.available 2025-04-16T11:40:15Z -
dc.date.created 2025-02-20 -
dc.date.issued 2025-08 -
dc.identifier.issn 1943-0663 -
dc.identifier.uri http://hdl.handle.net/20.500.11750/58292 -
dc.description.abstract Critical infrastructure (CI) is essential for societal and economic stability, making it a prime target for cyber threats. Traditional anomaly detection models like LSTM and Transformers require substantial computational resources, which are often unavailable in CI environments. Cloud computing offers on-demand resources but introduces privacy concerns due to the need to transmit sensitive data to cloud servers. Homomorphic encryption (HE) enables secure processing of encrypted data but is computationally intensive, particularly due to operations like bootstrapping. This paper proposes a bootstrapping-free lightweight anomaly detection model optimized for homomorphically encrypted data, leveraging CI's operational characteristics. The model employs a two-stage data separation process and introduces state-vectors for normal operation detection, forming a whitelist anomaly detection approach. Experimental results on the SWaT and WADI datasets demonstrate the model's competitive performance and efficiency, with significantly reduced training times while maintaining robust security. © IEEE. -
dc.language English -
dc.publisher Institute of Electrical and Electronics Engineers -
dc.title Privacy-Preserving Anomaly Detection with Homomorphic Encryption for Industrial Control Systems in Critical Infrastructure -
dc.type Article -
dc.identifier.doi 10.1109/LES.2025.3538013 -
dc.identifier.wosid 001554326900007 -
dc.identifier.scopusid 2-s2.0-85217647395 -
dc.identifier.bibliographicCitation IEEE Embedded Systems Letters, v.17, no.4, pp.276 - 279 -
dc.description.isOpenAccess FALSE -
dc.subject.keywordAuthor Anomaly detection -
dc.subject.keywordAuthor critical infrastructure (CI) -
dc.subject.keywordAuthor homomorphic encryption (HE) -
dc.subject.keywordAuthor industrial control system (ICS) -
dc.subject.keywordAuthor privacy-preserving machine learning -
dc.citation.endPage 279 -
dc.citation.number 4 -
dc.citation.startPage 276 -
dc.citation.title IEEE Embedded Systems Letters -
dc.citation.volume 17 -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.relation.journalResearchArea Computer Science; Engineering -
dc.relation.journalWebOfScienceCategory Computer Science, Hardware & Architecture; Computer Science, Software Engineering; Engineering, Electrical & Electronic -
dc.type.docType Article -
Show Simple Item Record

File Downloads

  • There are no files associated with this item.

공유

qrcode
공유하기

Related Researcher

신동훈
Shin, Donghoon신동훈

Department of Electrical Engineering and Computer Science

read more

Total Views & Downloads