Federated active meta-learning with blockchain for zero-day attack detection in industrial IoT (original) (raw)

References

  1. Kayode SY, Omole AI, Sabit MO (2025) GA-mADAM-IIoT: A new lightweight threats detection in the industrial IoT via genetic algorithm with attention mechanism and LSTM on multivariate time series sensor data. Sensors Int 6:100297
    Google Scholar
  2. Vakili A, Al-Khafaji HMR, Darbandi M, Heidari A, Jafari Navimipour N, Unal M (2024) A new service composition method in the cloud-based internet of things environment using a grey wolf optimization algorithm and MapReduce framework. Concurr Comput Pract Exp 36(16):e8091
    Google Scholar
  3. Heidari A, Shishehlou H, Darbandi M, Navimipour NJ, Yalcin S (2024) A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. Cluster Comput 27(6):7521–7539
    Google Scholar
  4. Khan AA, Yang J, Laghari AA, Baqasah AM, Alroobaea R, Ku CS, Por LY (2025) BAIoT-EMS: consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things. Eng Appl Artif Intell 141:109838
    Google Scholar
  5. Azzedin F, Suwad H, Rahman MM (2022) An asset-based approach to mitigate zero-day ransomware attacks. Comput Mater Contin 73(2):3003
    Google Scholar
  6. Kathole AB, Vhatkar K, Dharmale G, Chiwhane S, Kimbahune VV, Goyal A (2024) A novel approach to IoT security for intrusion detection system using ensemble network and heuristic-assisted feature fusion. J Discrete Math Sci Cryptogr 27(7):2207–2217
    Google Scholar
  7. Ullah I, Deng X, Pei X, Mushtaq H, Uzair M (2025) IoV-SFL: A blockchain-based federated learning framework for secure and efficient data sharing in the internet of vehicles. Peer-to-Peer Netw Appl 18(1):1–20
    Google Scholar
  8. Khan BUI, Goh KW, Mir MS, Mohd Rosely NFL, Mir AA, Chaimanee M (2024) Blockchain-enhanced sensor-as-a-service (SEaaS) in IoT: leveraging blockchain for efficient and secure sensing data transactions. Information 15(4):212
    Google Scholar
  9. Kathole AB, Vhatkar KN, Goyal A, Kaushik S, Mirge AS, Jain P, Islam MT (2024) Secure federated cloud storage protection strategy using hybrid heuristic attribute-based encryption with permissioned blockchain. IEEE Access 12:117154–117169
    Google Scholar
  10. Muthukrishnan G, Kalyani S (2025) Differential privacy with higher utility by exploiting coordinate-wise disparity: laplace mechanism can beat gaussian in high dimensions. IEEE Trans Inform Forensic Secur. https://doi.org/10.1109/TIFS.2025.3536277
  11. Ahmad S, Arif M, Ahmad J, Nazim M, Mehfuz S (2024) Convergent encryption enabled secure data deduplication algorithm for cloud environment. Concurr Comput Pract Exp 36(21):e8205
    Google Scholar
  12. Heidari A, Navimipour NJ, Dag H, Talebi S, Unal M (2024) A novel blockchain-based deepfake detection method using federated and deep learning models. Cogn Comput 16(3):1073–1091
    Google Scholar
  13. Sabah F, Chen Y, Yang Z, Raheem A, Azam M, Ahmad N, Sarwar R (2025) FairDPFL-SCS: fair dynamic personalized federated learning with strategic client selection for improved accuracy and fairness. Inform Fusion 115:102756
    Google Scholar
  14. Al-Qurabat AKM (2022) A lightweight Huffman-based differential encoding lossless compression technique in IoT for smart agriculture. Int J Comput Digit Syst 11(1):1–11
    Google Scholar
  15. Liu X, Zhou Y, Wu D, Hu M, Chen M, Guizani M, Sheng QZ (2025) CPFedAvg: Enhancing hierarchical federated learning via optimized local aggregation and parameter mixing. IEEE Trans Netw. https://doi.org/10.1109/TON.2025.3526866
    Article Google Scholar
  16. Singh N, Adhikari M (2025) SelfFed: Self-adaptive federated learning with non-IID data on heterogeneous edge devices for bias mitigation and enhanced training efficiency. Inform Fusion 118:102932
    Google Scholar
  17. Azzedin F, Suwad H, Alyafeai Z (2017) Countermeasureing zero day attacks: asset-based approach. In 2017 international conference on high performance computing & simulation (HPCS) (pp. 854-857). IEEE, Genoa, Italy, 17-21 July 2017. https://doi.org/10.1109/HPCS.2017.129
  18. Al-Qurabat AKM, Abdulzahra SA, Idrees AK (2022) Two-level energy-efficient data reduction strategies based on SAX-LZW and hierarchical clustering for minimizing the huge data conveyed on the internet of things networks. J Supercomput 78(16):17844–17890
    Google Scholar
  19. Thirupathi L, Akshaya B, Reddy PC, Harsha SS, Reddy ES (2025) Integration of AI and quantum computing in cyber security. In: Mishra BK (ed) Integration of AI, quantum computing, and semiconductor technology. IGI Global, pp 29–56. https://doi.org/10.4018/979-8-3693-7076-6.ch002
  20. Javadpour A, Ja’fari F, Taleb T, Shojafar M, Benzaïd C (2024) A comprehensive survey on cyber deception techniques to improve honeypot performance. Comput Secur 103792:2024
    Google Scholar
  21. Ahmad S, Mehfuz S, Beg J (2023) An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage. Concurr Comput Pract Exp 35(23):e7806
    Google Scholar
  22. Al-hajjar ALN, Al-Qurabat AKM (2023) Epileptic seizure detection using feature importance and ML classifiers. J Educ Pure Sci 13(2). https://doi.org/10.32792/jeps.v13i2.310
  23. Saurabh K, Sharma V, Singh U, Khondoker R, Vyas R, Vyas OP (2025) HMS-IDS: threat intelligence integration for zero-day exploits and advanced persistent threats in IIoT. Arab J Sci Eng 50(2):1307–1327
    Google Scholar
  24. Xu Z, Wang Y, Wu Z, Zheng WX, Hu C (2025) Federated learning-based offset-free distributed control of nonlinear networked systems with application to IIoT. IEEE Trans Netw Sci Eng. https://doi.org/10.1109/TNSE.2025.3540643
  25. Hossain MT, Badsha S, La H, Islam S, Khalil I (2025) Exploiting gaussian noise variance for dynamic differential poisoning in federated learning. IEEE Trans Artif Intell. https://doi.org/10.1109/TAI.2025.3540030
  26. E. Nowroozi, I. Haider, R. Taheri, and M. Conti, "Federated learning under attack: Exposing vulnerabilities through data poisoning attacks in computer networks," IEEE Transactions on Network and Service Management, 2025.
  27. Li B, Gu H, Chen R, Li J, Wu C, Ruan N, Si X, Fan L (2025) Temporal gradient inversion attacks with robust optimization. IEEE Trans Dependable and Secure Comput. https://doi.org/10.1109/TDSC.2025.3532339
  28. Wang B, Tian Z, Liu X, Xia Y, She W, Liu W (2025) A multi-center federated learning mechanism based on consortium blockchain for data secure sharing. Knowl-Based Syst 310:112962
    Google Scholar
  29. Chinnasamy P, Samrin R, Sujitha BB, Augasthega R, Rajagopal M, Nageswaran A (2024) Integrating intelligent breach detection system into 6 g enabled smart grid-based cyber physical systems. Wireless Pers Commun 1-16. https://doi.org/10.1007/s11277-024-11192-2
  30. Karpagavalli C, Kaliappan M (2025) Edge implicit weighting with graph transformers for robust intrusion detection in internet of things network. Comput Secur 150:104299
    Google Scholar
  31. Wang R, Ma F, Tang S, Zhang H, He J, Su Z, Xu C (2025) Parallel Byzantine fault tolerance consensus based on trusted execution environments. Peer-to-Peer Netw Appl 18(1):1–24
    Google Scholar
  32. Khan AA, Dhabi S, Yang J, Alhakami W, Bourouis S, Yee L (2024) B-LPoET: a middleware lightweight proof-of-elapsed time (PoET) for efficient distributed transaction execution and security on blockchain using multithreading technology. Comput Electr Eng 118:109343
    Google Scholar
  33. Majeed A, Hwang SO (2024) Solving the privacy-equity trade-off in data sharing by using homophily, diversity, and t-closeness based anonymity algorithm. IEEE Access. https://doi.org/10.1109/ACCESS.2024.3510332
  34. Ullah I, Deng X, Pei X, Jiang P, Mushtaq H (2023) A verifiable and privacy-preserving blockchain-based federated learning approach. Peer-to-Peer Netw Appl 16(5):2256–2270
    Google Scholar
  35. Zhu M, Li X, Zhang Y, Wang J, Liu Z, Zhang Q (2024) Enhancing collaborative machine learning for security and privacy in federated learning. J Theory Pract Eng Sci 4(2):74–82
    Google Scholar
  36. Javadpour A, Jafari F, Taleb T, Zhao Y, Yang B, Benzaid C (2023) Encryption as a service for IoT: opportunities, challenges, and solutions. IEEE Int Things J 11(5):7525–7558
    Google Scholar
  37. Tiferes RR, Manassero G, Pellini EL, di Santo SG (2024) Biweight midcorrelation based transmission line pilot protection algorithm. IEEE Open Access J Power Energy 11:68–82
    Google Scholar
  38. Tong S, Li J, Fu W (2024) An efficient and scalable Byzantine fault-tolerant consensus mechanism based on credit scoring and aggregated signatures. IEEE Access 12:10393–10410
    Google Scholar
  39. Chinnasamy P, Babu GC, Ayyasamy RK, Amutha S, Sinha K, Balaram A (2024) Blockchain 6G-based wireless network security management with optimization using machine learning techniques. Sensors 24(18):6143
    Google Scholar
  40. Liu A, Chen J, He K, Du R, Xu J, Wu C, Feng Y, Li T, Ma J (2024) Dynashard: secure and adaptive blockchain sharding protocol with hybrid consensus and dynamic shard management. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2024.3490036
  41. Fieblinger R, Alam MT, Rastogi N (2024) Actionable cyber threat intelligence using knowledge graphs and large language models. In 2024 IEEE European symposium on security and privacy workshops (EuroS&PW) (pp. 100-111). IEEE, Vienna, Austria, 08-12 July 2024. https://doi.org/10.1109/EuroSPW61312.2024.00018
  42. Ye Z, Luo W, Zhou Q, Zhu Z, Shi Y, Jia Y (2024) Gradient inversion attacks: impact factors analyses and privacy enhancement. IEEE Trans Pattern Anal Mach Intell. https://doi.org/10.1109/TPAMI.2024.3430533
  43. Huang H, Yang K, Xu H, Li Y (2025) Synthetic data for enhanced privacy: A VAE-GAN approach against membership inference attacks. Knowl-Based Syst 309:112899
    Google Scholar
  44. Yang L, Zhang W, Miao Y, Liang Y, Li X, Choo KKR, Deng RH (2025) Secure and efficient cross-modal retrieval over encrypted multimodal data. IEEE Trans Comput. https://doi.org/10.1109/TC.2025.3525614
  45. Rivas JM, Fernandez-Basso C, Morcillo-Jimenez R, Paños-Basterra J, Ruiz MD, Martin-Bautista MJ (2025) Simulafed: an enhanced federated simulated environment for privacy and security in health. Computing 107(1):3
    Google Scholar
  46. Wu X, Gao J, Bilal M, Dai F, Xu X, Qi L, Dou W (2025) Federated learning-based private medical knowledge graph for epidemic surveillance in internet of things. Expert Syst 42(1):e13372
    Google Scholar
  47. Khan BUI, Goh KW, Khan AR, Zuhairi MF, Chaimanee M (2025) Resource management and secure data exchange for mobile sensors using Ethereum blockchain. Symmetry 17(1):61
    Google Scholar
  48. Usharani C, Selvapandian A (2025) FedLRes: enhancing lung cancer detection using federated learning with convolution neural network (ResNet50). Neural Comput Applic, 1-12. https://doi.org/10.1007/s00521-025-11006-x
  49. Gholami S, Jannat FE, Thompson AC, Ong SSY, Lim JI, Leng T, Alam MN (2025) Distributed training of foundation models for ophthalmic diagnosis. Commun Eng 4(1):6
    Google Scholar
  50. Kaiser J, Mueller T, Kaissis G (2025) Differential privacy in medical imaging applications. In trustworthy AI in medical imaging (pp. 411-424). Academic Press.
  51. Tao Y, Gilad A, Machanavajjhala A, Roy S (2025) Differentially private explanations for aggregate query answers. VLDB J 34(2):20
    Google Scholar
  52. Ahmed A, Asim M, Ullah I, Ateya AA (2024) An optimized ensemble model with advanced feature selection for network intrusion detection. PeerJ Comp Sci 10:e2472
    Google Scholar
  53. Agarwal S, Kamath G, Majid M, Mouzakis A, Silver R, Ullman J (2025) Private mean estimation with person-level differential privacy. In: Proceedings of the 2025 Annual ACM-SIAM symposium on discrete algorithms (SODA). Society for Industrial and Applied Mathematics, pp 2819–2880. https://doi.org/10.1137/1.9781611978322.92
  54. Zheng Z, Li Z, Long S, Guo S, Chen C, Xu K (2025) Pricing Utility vs. location privacy: a differentially private data sharing framework for ride-on-demand services. IEEE Trans Dependable and Secure Comput. https://doi.org/10.1109/TDSC.2025.3532599
  55. Silivery AK, Rao KRM, Solleti R (2025) Dual-path feature extraction-based hybrid intrusion detection in IoT networks. Comput Electr Eng 122:109949
    Google Scholar
  56. Ahmad S, Mehfuz S, Urooj S, Alsubaie N (2024) Machine learning-based intelligent security framework for secure cloud key management. Cluster Comput 27(5):5953–5979
    Google Scholar
  57. Leni AES, Anand R, Mythili N, Pugalenthi R (2025) An improved cyber-attack detection and classification model for the internet of things systems using fine-tuned deep learning model. Int J Sensor Netw 47(1):11–25
    Google Scholar
  58. Ruzafa-Alcázar P, Fernández-Saura P, Mármol-Campos E, González-Vidal A, Hernández-Ramos JL, Bernal-Bernabe J, Skarmeta AF (2023) Intrusion detection based on privacy-preserving federated learning for the industrial IoT. IEEE Trans Industr Inf 19(2):1145–1154
    Google Scholar
  59. Neto N, Martins R, Veiga L (2025) Atlas, a modular and efficient open-source BFT framework. J Syst Softw 222:112317
    Google Scholar
  60. T. J. Shen, "Estimating Shannon’s entropy with incomplete species inventories," Japanese Journal of Statistics and Data Science, pp. 1–27, 2025.
  61. Luqman M, Zeeshan M, Riaz Q, Hussain M, Tahir H, Mazhar N, Khan MS (2025) Intelligent parameter-based in-network IDS for IoT using UNSW-NB15 and BoT-IoT datasets. J Franklin Inst 362(1):107440
    Google Scholar
  62. Chang J, Shi L, Li Z, Zuo X, Hou B (2025) Security detection algorithm using CNN: Anomaly detection for API call sequence. J Comput Methods Sci Eng 14727978251318812. https://doi.org/10.1177/14727978251318813
  63. Li H, Zhou S, Yuan B, Zhang M (2024) Optimizing intelligent edge computing resource scheduling based on federated learning. J Knowl Learn Sci Technol 3(3):235–260
    Google Scholar
  64. Makhmudov F, Kilichev D, Giyosov U, Akhmedov F (2025) Online machine learning for intrusion detection in electric vehicle charging systems. Mathematics 13(5):712
    Google Scholar
  65. Ahanger AS, Khan SM, Masoodi F, Salau AO (2025) Advanced intrusion detection in internet of things using graph attention networks. Sci Rep 15(1):9831
    Google Scholar
  66. Xu G, Zhou Z, Song X, Huang Y (2025) Research on transaction allocation strategy in blockchain state sharding. Future Gener Comput Syst 107756. https://doi.org/10.1016/j.future.2025.107756
  67. Han-huai P, Lin-wei W, Hao L, Abdollahi M (2025) Identifying influential nodes in complex networks: a semi-local centrality measure based on augmented graph and average shortest path theory. Telecommun Syst 88(1):25
    Google Scholar
  68. Zhang R, Li Y, Fang L (2025) PBTMS: A blockchain-based privacy-preserving system for reliable and efficient e-commerce. Electronics 14(6):1177
    Google Scholar
  69. Bai J, Cao L, Li J, Wan J, Du X (2025) FedWDP: a Wasserstein-distance-based federated learning for privacy and heterogeneous data in IoT. Internet Things 101532. https://doi.org/10.1016/j.iot.2025.101532
  70. Jiang S, Wang X, Que Y, Lin H (2024) Fed-MPS: federated learning with local differential privacy using model parameter selection for resource-constrained CPS. J Syst Archit 150:103108
    Google Scholar
  71. Lu S, Li R, Liu W (2024) FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack. Front Comp Sci 18(2):182307
    Google Scholar
  72. Ye M, Zhang Q, Xue X, Wang Y, Jiang Q, Qiu H (2024) A novel self-supervised learning-based anomalous node detection method based on an autoencoder for wireless sensor networks. IEEE Syst J 18(1):256–267. https://doi.org/10.1109/JSYST.2023.3347435
    Article Google Scholar
  73. Lin L, Zhong Q, Qiu J, Liang Z (2025) E-GRACL: an IoT intrusion detection system based on graph neural networks. J Supercomput 81(1):42
    Google Scholar
  74. Jiang X, Xu L, Yu L, Fang X (2025) MFT: a novel memory flow transformer efficient intrusion detection method. Comput Secur 148:104174
    Google Scholar
  75. Ghazi DS, Hamid HS, Zaiter MJ, Behadili ASG (2024) Snort versus suricata in intrusion detection. Iraqi J ICT 7(2):73–88
    Google Scholar
  76. Deng Y, Zhou W, Haq AU, Ahmad S, Tabassum A (2025) Differentially private recommender framework with dual semi-autoencoder. Expert Syst Appl 260:125447
    Google Scholar
  77. Yu B, Zhao J, Zhang K, Gong J, Qian H (2025) Lightweight and dynamic privacy-preserving federated learning via functional encryption. IEEE Trans Inform Forensic Secur. https://doi.org/10.1109/TIFS.2025.3540312
  78. Bhimanpallewar RN, Khan SI, Raj KB, Gulati K, Bhasin N, Raj R (2025) Federated learning on web browsing data with statistical and machine learning techniques. Int J Pervasive Comput Commun 21(1):144–156
    Google Scholar

Download references