Federated active meta-learning with blockchain for zero-day attack detection in industrial IoT (original) (raw)
References
Kayode SY, Omole AI, Sabit MO (2025) GA-mADAM-IIoT: A new lightweight threats detection in the industrial IoT via genetic algorithm with attention mechanism and LSTM on multivariate time series sensor data. Sensors Int 6:100297 Google Scholar
Vakili A, Al-Khafaji HMR, Darbandi M, Heidari A, Jafari Navimipour N, Unal M (2024) A new service composition method in the cloud-based internet of things environment using a grey wolf optimization algorithm and MapReduce framework. Concurr Comput Pract Exp 36(16):e8091 Google Scholar
Heidari A, Shishehlou H, Darbandi M, Navimipour NJ, Yalcin S (2024) A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. Cluster Comput 27(6):7521–7539 Google Scholar
Khan AA, Yang J, Laghari AA, Baqasah AM, Alroobaea R, Ku CS, Por LY (2025) BAIoT-EMS: consortium network for small-medium enterprises management system with blockchain and augmented intelligence of things. Eng Appl Artif Intell 141:109838 Google Scholar
Azzedin F, Suwad H, Rahman MM (2022) An asset-based approach to mitigate zero-day ransomware attacks. Comput Mater Contin 73(2):3003 Google Scholar
Kathole AB, Vhatkar K, Dharmale G, Chiwhane S, Kimbahune VV, Goyal A (2024) A novel approach to IoT security for intrusion detection system using ensemble network and heuristic-assisted feature fusion. J Discrete Math Sci Cryptogr 27(7):2207–2217 Google Scholar
Ullah I, Deng X, Pei X, Mushtaq H, Uzair M (2025) IoV-SFL: A blockchain-based federated learning framework for secure and efficient data sharing in the internet of vehicles. Peer-to-Peer Netw Appl 18(1):1–20 Google Scholar
Khan BUI, Goh KW, Mir MS, Mohd Rosely NFL, Mir AA, Chaimanee M (2024) Blockchain-enhanced sensor-as-a-service (SEaaS) in IoT: leveraging blockchain for efficient and secure sensing data transactions. Information 15(4):212 Google Scholar
Kathole AB, Vhatkar KN, Goyal A, Kaushik S, Mirge AS, Jain P, Islam MT (2024) Secure federated cloud storage protection strategy using hybrid heuristic attribute-based encryption with permissioned blockchain. IEEE Access 12:117154–117169 Google Scholar
Muthukrishnan G, Kalyani S (2025) Differential privacy with higher utility by exploiting coordinate-wise disparity: laplace mechanism can beat gaussian in high dimensions. IEEE Trans Inform Forensic Secur. https://doi.org/10.1109/TIFS.2025.3536277
Ahmad S, Arif M, Ahmad J, Nazim M, Mehfuz S (2024) Convergent encryption enabled secure data deduplication algorithm for cloud environment. Concurr Comput Pract Exp 36(21):e8205 Google Scholar
Heidari A, Navimipour NJ, Dag H, Talebi S, Unal M (2024) A novel blockchain-based deepfake detection method using federated and deep learning models. Cogn Comput 16(3):1073–1091 Google Scholar
Sabah F, Chen Y, Yang Z, Raheem A, Azam M, Ahmad N, Sarwar R (2025) FairDPFL-SCS: fair dynamic personalized federated learning with strategic client selection for improved accuracy and fairness. Inform Fusion 115:102756 Google Scholar
Al-Qurabat AKM (2022) A lightweight Huffman-based differential encoding lossless compression technique in IoT for smart agriculture. Int J Comput Digit Syst 11(1):1–11 Google Scholar
Liu X, Zhou Y, Wu D, Hu M, Chen M, Guizani M, Sheng QZ (2025) CPFedAvg: Enhancing hierarchical federated learning via optimized local aggregation and parameter mixing. IEEE Trans Netw. https://doi.org/10.1109/TON.2025.3526866 Article Google Scholar
Singh N, Adhikari M (2025) SelfFed: Self-adaptive federated learning with non-IID data on heterogeneous edge devices for bias mitigation and enhanced training efficiency. Inform Fusion 118:102932 Google Scholar
Azzedin F, Suwad H, Alyafeai Z (2017) Countermeasureing zero day attacks: asset-based approach. In 2017 international conference on high performance computing & simulation (HPCS) (pp. 854-857). IEEE, Genoa, Italy, 17-21 July 2017. https://doi.org/10.1109/HPCS.2017.129
Al-Qurabat AKM, Abdulzahra SA, Idrees AK (2022) Two-level energy-efficient data reduction strategies based on SAX-LZW and hierarchical clustering for minimizing the huge data conveyed on the internet of things networks. J Supercomput 78(16):17844–17890 Google Scholar
Thirupathi L, Akshaya B, Reddy PC, Harsha SS, Reddy ES (2025) Integration of AI and quantum computing in cyber security. In: Mishra BK (ed) Integration of AI, quantum computing, and semiconductor technology. IGI Global, pp 29–56. https://doi.org/10.4018/979-8-3693-7076-6.ch002
Javadpour A, Ja’fari F, Taleb T, Shojafar M, Benzaïd C (2024) A comprehensive survey on cyber deception techniques to improve honeypot performance. Comput Secur 103792:2024 Google Scholar
Ahmad S, Mehfuz S, Beg J (2023) An efficient and secure key management with the extended convolutional neural network for intrusion detection in cloud storage. Concurr Comput Pract Exp 35(23):e7806 Google Scholar
Al-hajjar ALN, Al-Qurabat AKM (2023) Epileptic seizure detection using feature importance and ML classifiers. J Educ Pure Sci 13(2). https://doi.org/10.32792/jeps.v13i2.310
Saurabh K, Sharma V, Singh U, Khondoker R, Vyas R, Vyas OP (2025) HMS-IDS: threat intelligence integration for zero-day exploits and advanced persistent threats in IIoT. Arab J Sci Eng 50(2):1307–1327 Google Scholar
Xu Z, Wang Y, Wu Z, Zheng WX, Hu C (2025) Federated learning-based offset-free distributed control of nonlinear networked systems with application to IIoT. IEEE Trans Netw Sci Eng. https://doi.org/10.1109/TNSE.2025.3540643
Hossain MT, Badsha S, La H, Islam S, Khalil I (2025) Exploiting gaussian noise variance for dynamic differential poisoning in federated learning. IEEE Trans Artif Intell. https://doi.org/10.1109/TAI.2025.3540030
E. Nowroozi, I. Haider, R. Taheri, and M. Conti, "Federated learning under attack: Exposing vulnerabilities through data poisoning attacks in computer networks," IEEE Transactions on Network and Service Management, 2025.
Li B, Gu H, Chen R, Li J, Wu C, Ruan N, Si X, Fan L (2025) Temporal gradient inversion attacks with robust optimization. IEEE Trans Dependable and Secure Comput. https://doi.org/10.1109/TDSC.2025.3532339
Wang B, Tian Z, Liu X, Xia Y, She W, Liu W (2025) A multi-center federated learning mechanism based on consortium blockchain for data secure sharing. Knowl-Based Syst 310:112962 Google Scholar
Chinnasamy P, Samrin R, Sujitha BB, Augasthega R, Rajagopal M, Nageswaran A (2024) Integrating intelligent breach detection system into 6 g enabled smart grid-based cyber physical systems. Wireless Pers Commun 1-16. https://doi.org/10.1007/s11277-024-11192-2
Karpagavalli C, Kaliappan M (2025) Edge implicit weighting with graph transformers for robust intrusion detection in internet of things network. Comput Secur 150:104299 Google Scholar
Wang R, Ma F, Tang S, Zhang H, He J, Su Z, Xu C (2025) Parallel Byzantine fault tolerance consensus based on trusted execution environments. Peer-to-Peer Netw Appl 18(1):1–24 Google Scholar
Khan AA, Dhabi S, Yang J, Alhakami W, Bourouis S, Yee L (2024) B-LPoET: a middleware lightweight proof-of-elapsed time (PoET) for efficient distributed transaction execution and security on blockchain using multithreading technology. Comput Electr Eng 118:109343 Google Scholar
Majeed A, Hwang SO (2024) Solving the privacy-equity trade-off in data sharing by using homophily, diversity, and t-closeness based anonymity algorithm. IEEE Access. https://doi.org/10.1109/ACCESS.2024.3510332
Ullah I, Deng X, Pei X, Jiang P, Mushtaq H (2023) A verifiable and privacy-preserving blockchain-based federated learning approach. Peer-to-Peer Netw Appl 16(5):2256–2270 Google Scholar
Zhu M, Li X, Zhang Y, Wang J, Liu Z, Zhang Q (2024) Enhancing collaborative machine learning for security and privacy in federated learning. J Theory Pract Eng Sci 4(2):74–82 Google Scholar
Javadpour A, Jafari F, Taleb T, Zhao Y, Yang B, Benzaid C (2023) Encryption as a service for IoT: opportunities, challenges, and solutions. IEEE Int Things J 11(5):7525–7558 Google Scholar
Tiferes RR, Manassero G, Pellini EL, di Santo SG (2024) Biweight midcorrelation based transmission line pilot protection algorithm. IEEE Open Access J Power Energy 11:68–82 Google Scholar
Tong S, Li J, Fu W (2024) An efficient and scalable Byzantine fault-tolerant consensus mechanism based on credit scoring and aggregated signatures. IEEE Access 12:10393–10410 Google Scholar
Chinnasamy P, Babu GC, Ayyasamy RK, Amutha S, Sinha K, Balaram A (2024) Blockchain 6G-based wireless network security management with optimization using machine learning techniques. Sensors 24(18):6143 Google Scholar
Liu A, Chen J, He K, Du R, Xu J, Wu C, Feng Y, Li T, Ma J (2024) Dynashard: secure and adaptive blockchain sharding protocol with hybrid consensus and dynamic shard management. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2024.3490036
Fieblinger R, Alam MT, Rastogi N (2024) Actionable cyber threat intelligence using knowledge graphs and large language models. In 2024 IEEE European symposium on security and privacy workshops (EuroS&PW) (pp. 100-111). IEEE, Vienna, Austria, 08-12 July 2024. https://doi.org/10.1109/EuroSPW61312.2024.00018
Ye Z, Luo W, Zhou Q, Zhu Z, Shi Y, Jia Y (2024) Gradient inversion attacks: impact factors analyses and privacy enhancement. IEEE Trans Pattern Anal Mach Intell. https://doi.org/10.1109/TPAMI.2024.3430533
Huang H, Yang K, Xu H, Li Y (2025) Synthetic data for enhanced privacy: A VAE-GAN approach against membership inference attacks. Knowl-Based Syst 309:112899 Google Scholar
Yang L, Zhang W, Miao Y, Liang Y, Li X, Choo KKR, Deng RH (2025) Secure and efficient cross-modal retrieval over encrypted multimodal data. IEEE Trans Comput. https://doi.org/10.1109/TC.2025.3525614
Rivas JM, Fernandez-Basso C, Morcillo-Jimenez R, Paños-Basterra J, Ruiz MD, Martin-Bautista MJ (2025) Simulafed: an enhanced federated simulated environment for privacy and security in health. Computing 107(1):3 Google Scholar
Wu X, Gao J, Bilal M, Dai F, Xu X, Qi L, Dou W (2025) Federated learning-based private medical knowledge graph for epidemic surveillance in internet of things. Expert Syst 42(1):e13372 Google Scholar
Khan BUI, Goh KW, Khan AR, Zuhairi MF, Chaimanee M (2025) Resource management and secure data exchange for mobile sensors using Ethereum blockchain. Symmetry 17(1):61 Google Scholar
Usharani C, Selvapandian A (2025) FedLRes: enhancing lung cancer detection using federated learning with convolution neural network (ResNet50). Neural Comput Applic, 1-12. https://doi.org/10.1007/s00521-025-11006-x
Gholami S, Jannat FE, Thompson AC, Ong SSY, Lim JI, Leng T, Alam MN (2025) Distributed training of foundation models for ophthalmic diagnosis. Commun Eng 4(1):6 Google Scholar
Kaiser J, Mueller T, Kaissis G (2025) Differential privacy in medical imaging applications. In trustworthy AI in medical imaging (pp. 411-424). Academic Press.
Tao Y, Gilad A, Machanavajjhala A, Roy S (2025) Differentially private explanations for aggregate query answers. VLDB J 34(2):20 Google Scholar
Ahmed A, Asim M, Ullah I, Ateya AA (2024) An optimized ensemble model with advanced feature selection for network intrusion detection. PeerJ Comp Sci 10:e2472 Google Scholar
Agarwal S, Kamath G, Majid M, Mouzakis A, Silver R, Ullman J (2025) Private mean estimation with person-level differential privacy. In: Proceedings of the 2025 Annual ACM-SIAM symposium on discrete algorithms (SODA). Society for Industrial and Applied Mathematics, pp 2819–2880. https://doi.org/10.1137/1.9781611978322.92
Zheng Z, Li Z, Long S, Guo S, Chen C, Xu K (2025) Pricing Utility vs. location privacy: a differentially private data sharing framework for ride-on-demand services. IEEE Trans Dependable and Secure Comput. https://doi.org/10.1109/TDSC.2025.3532599
Silivery AK, Rao KRM, Solleti R (2025) Dual-path feature extraction-based hybrid intrusion detection in IoT networks. Comput Electr Eng 122:109949 Google Scholar
Ahmad S, Mehfuz S, Urooj S, Alsubaie N (2024) Machine learning-based intelligent security framework for secure cloud key management. Cluster Comput 27(5):5953–5979 Google Scholar
Leni AES, Anand R, Mythili N, Pugalenthi R (2025) An improved cyber-attack detection and classification model for the internet of things systems using fine-tuned deep learning model. Int J Sensor Netw 47(1):11–25 Google Scholar
Ruzafa-Alcázar P, Fernández-Saura P, Mármol-Campos E, González-Vidal A, Hernández-Ramos JL, Bernal-Bernabe J, Skarmeta AF (2023) Intrusion detection based on privacy-preserving federated learning for the industrial IoT. IEEE Trans Industr Inf 19(2):1145–1154 Google Scholar
Neto N, Martins R, Veiga L (2025) Atlas, a modular and efficient open-source BFT framework. J Syst Softw 222:112317 Google Scholar
T. J. Shen, "Estimating Shannon’s entropy with incomplete species inventories," Japanese Journal of Statistics and Data Science, pp. 1–27, 2025.
Luqman M, Zeeshan M, Riaz Q, Hussain M, Tahir H, Mazhar N, Khan MS (2025) Intelligent parameter-based in-network IDS for IoT using UNSW-NB15 and BoT-IoT datasets. J Franklin Inst 362(1):107440 Google Scholar
Chang J, Shi L, Li Z, Zuo X, Hou B (2025) Security detection algorithm using CNN: Anomaly detection for API call sequence. J Comput Methods Sci Eng 14727978251318812. https://doi.org/10.1177/14727978251318813
Li H, Zhou S, Yuan B, Zhang M (2024) Optimizing intelligent edge computing resource scheduling based on federated learning. J Knowl Learn Sci Technol 3(3):235–260 Google Scholar
Makhmudov F, Kilichev D, Giyosov U, Akhmedov F (2025) Online machine learning for intrusion detection in electric vehicle charging systems. Mathematics 13(5):712 Google Scholar
Ahanger AS, Khan SM, Masoodi F, Salau AO (2025) Advanced intrusion detection in internet of things using graph attention networks. Sci Rep 15(1):9831 Google Scholar
Xu G, Zhou Z, Song X, Huang Y (2025) Research on transaction allocation strategy in blockchain state sharding. Future Gener Comput Syst 107756. https://doi.org/10.1016/j.future.2025.107756
Han-huai P, Lin-wei W, Hao L, Abdollahi M (2025) Identifying influential nodes in complex networks: a semi-local centrality measure based on augmented graph and average shortest path theory. Telecommun Syst 88(1):25 Google Scholar
Zhang R, Li Y, Fang L (2025) PBTMS: A blockchain-based privacy-preserving system for reliable and efficient e-commerce. Electronics 14(6):1177 Google Scholar
Bai J, Cao L, Li J, Wan J, Du X (2025) FedWDP: a Wasserstein-distance-based federated learning for privacy and heterogeneous data in IoT. Internet Things 101532. https://doi.org/10.1016/j.iot.2025.101532
Jiang S, Wang X, Que Y, Lin H (2024) Fed-MPS: federated learning with local differential privacy using model parameter selection for resource-constrained CPS. J Syst Archit 150:103108 Google Scholar
Lu S, Li R, Liu W (2024) FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack. Front Comp Sci 18(2):182307 Google Scholar
Ye M, Zhang Q, Xue X, Wang Y, Jiang Q, Qiu H (2024) A novel self-supervised learning-based anomalous node detection method based on an autoencoder for wireless sensor networks. IEEE Syst J 18(1):256–267. https://doi.org/10.1109/JSYST.2023.3347435 Article Google Scholar
Lin L, Zhong Q, Qiu J, Liang Z (2025) E-GRACL: an IoT intrusion detection system based on graph neural networks. J Supercomput 81(1):42 Google Scholar
Jiang X, Xu L, Yu L, Fang X (2025) MFT: a novel memory flow transformer efficient intrusion detection method. Comput Secur 148:104174 Google Scholar
Ghazi DS, Hamid HS, Zaiter MJ, Behadili ASG (2024) Snort versus suricata in intrusion detection. Iraqi J ICT 7(2):73–88 Google Scholar
Deng Y, Zhou W, Haq AU, Ahmad S, Tabassum A (2025) Differentially private recommender framework with dual semi-autoencoder. Expert Syst Appl 260:125447 Google Scholar
Yu B, Zhao J, Zhang K, Gong J, Qian H (2025) Lightweight and dynamic privacy-preserving federated learning via functional encryption. IEEE Trans Inform Forensic Secur. https://doi.org/10.1109/TIFS.2025.3540312
Bhimanpallewar RN, Khan SI, Raj KB, Gulati K, Bhasin N, Raj R (2025) Federated learning on web browsing data with statistical and machine learning techniques. Int J Pervasive Comput Commun 21(1):144–156 Google Scholar