{"id":"https://openalex.org/W4414406088","doi":"https://doi.org/10.1109/iccworkshops67674.2025.11162455","title":"Dynamic Trust Management for Secure Federated Learning in Critical Industrial and IoT Networks","display_name":"Dynamic Trust Management for Secure Federated Learning in Critical Industrial and IoT Networks","publication_year":2025,"publication_date":"2025-06-08","ids":{"openalex":"https://openalex.org/W4414406088","doi":"https://doi.org/10.1109/iccworkshops67674.2025.11162455"},"language":"en","primary_location":{"id":"doi:10.1109/iccworkshops67674.2025.11162455","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccworkshops67674.2025.11162455","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5105008490","display_name":"P.R. Shepherd","orcid":null},"institutions":[{"id":"https://openalex.org/I28257850","display_name":"London South Bank University","ror":"https://ror.org/02vwnat91","country_code":"GB","type":"education","lineage":["https://openalex.org/I28257850"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Paul Shepherd","raw_affiliation_strings":["London South Bank University,London,UK"],"affiliations":[{"raw_affiliation_string":"London South Bank University,London,UK","institution_ids":["https://openalex.org/I28257850"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009483316","display_name":"Tasos Dagiuklas","orcid":"https://orcid.org/0000-0002-8101-1208"},"institutions":[{"id":"https://openalex.org/I28257850","display_name":"London South Bank University","ror":"https://ror.org/02vwnat91","country_code":"GB","type":"education","lineage":["https://openalex.org/I28257850"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tasos Dagiuklas","raw_affiliation_strings":["London South Bank University,London,UK"],"affiliations":[{"raw_affiliation_string":"London South Bank University,London,UK","institution_ids":["https://openalex.org/I28257850"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000439353","display_name":"Bu\u011fra Alkan","orcid":"https://orcid.org/0000-0002-5994-4351"},"institutions":[{"id":"https://openalex.org/I28257850","display_name":"London South Bank University","ror":"https://ror.org/02vwnat91","country_code":"GB","type":"education","lineage":["https://openalex.org/I28257850"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Bugra Alkan","raw_affiliation_strings":["London South Bank University,London,UK"],"affiliations":[{"raw_affiliation_string":"London South Bank University,London,UK","institution_ids":["https://openalex.org/I28257850"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065466622","display_name":"Jonathan Rodr\u0131\u0301guez","orcid":"https://orcid.org/0000-0001-9829-0955"},"institutions":[{"id":"https://openalex.org/I4210120471","display_name":"Instituto de Telecomunica\u00e7\u00f5es","ror":"https://ror.org/02ht4fk33","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210120471"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Jonathan Rodriguez","raw_affiliation_strings":["Instituto de Telecomunica&#x00E7;&#x00F5;es,Aveiro,Portugal"],"affiliations":[{"raw_affiliation_string":"Instituto de Telecomunica&#x00E7;&#x00F5;es,Aveiro,Portugal","institution_ids":["https://openalex.org/I4210120471"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5105008490"],"corresponding_institution_ids":["https://openalex.org/I28257850"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13248344,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"371","last_page":"376"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9865999817848206,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7026000022888184},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.6992999911308289},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.4684000015258789},{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.42590001225471497},{"id":"https://openalex.org/keywords/distributed-learning","display_name":"Distributed learning","score":0.41760000586509705},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.414900004863739},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4016000032424927},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.3887999951839447}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7888000011444092},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7026000022888184},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.6992999911308289},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5026999711990356},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.4684000015258789},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.42590001225471497},{"id":"https://openalex.org/C2779582901","wikidata":"https://www.wikidata.org/wiki/Q21013010","display_name":"Distributed learning","level":2,"score":0.41760000586509705},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.414900004863739},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4016000032424927},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.3887999951839447},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.388700008392334},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3720000088214874},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.36309999227523804},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.3601999878883362},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.3425999879837036},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.33250001072883606},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.31839999556541443},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.31290000677108765},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.3075000047683716},{"id":"https://openalex.org/C51332947","wikidata":"https://www.wikidata.org/wiki/Q1172305","display_name":"Shared resource","level":2,"score":0.28940001130104065},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.2827000021934509},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.2736000120639801},{"id":"https://openalex.org/C132964779","wikidata":"https://www.wikidata.org/wiki/Q2110223","display_name":"Raw data","level":2,"score":0.2705000042915344},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2506999969482422}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccworkshops67674.2025.11162455","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccworkshops67674.2025.11162455","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334322","display_name":"HORIZON EUROPE Framework Programme","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Federated":[0],"Learning":[1],"(FL)":[2],"has":[3],"evolved":[4],"privacy-preserving":[5],"machine":[6],"learning":[7],"by":[8],"enabling":[9,100],"decentralized":[10,56],"devices,":[11],"such":[12,64],"as":[13,65],"Multi-access":[14],"Edge":[15],"Computing":[16],"(MEC)":[17],"nodes,":[18],"to":[19,61,140],"collaboratively":[20],"train":[21],"models":[22],"without":[23],"sharing":[24],"raw":[25],"data.":[26],"This":[27,134],"integration":[28],"leverages":[29],"edge":[30],"computation":[31],"and":[32,40,52,72,91,97,108,121,127,150],"storage":[33],"resources":[34],"for":[35,79,94,147],"real-time":[36,101],"decision-making,":[37],"reducing":[38],"latency":[39],"enhancing":[41],"scalability":[42],"in":[43,153],"critical":[44],"industrial":[45],"networks,":[46],"including":[47],"domains":[48],"like":[49],"healthcare,":[50],"finance,":[51],"IoT.":[53],"However,":[54],"FL\u2019s":[55],"architecture":[57],"makes":[58],"it":[59],"vulnerable":[60],"adversarial":[62,155],"attacks,":[63],"label":[66],"flipping,":[67],"which":[68],"undermine":[69],"its":[70],"sustainability":[71],"resilience.":[73],"These":[74],"vulnerabilities":[75],"emphasize":[76],"the":[77,129],"need":[78],"adaptive":[80,92,115,142],"trust":[81,95],"management":[82],"mechanisms.To":[83],"address":[84],"these":[85,114],"challenges,":[86],"this":[87],"paper":[88],"proposes":[89],"sensitivity":[90],"mechanisms":[93],"thresholds":[96],"smoothing":[98],"parameters,":[99],"adjustments":[102],"based":[103],"on":[104],"client":[105],"performance,":[106],"behaviour,":[107],"variability.":[109],"Comparative":[110],"analyses":[111],"demonstrate":[112],"that":[113],"methods":[116],"significantly":[117],"enhance":[118],"robustness,":[119],"fairness,":[120],"scalability,":[122],"ensuring":[123],"reliable":[124],"model":[125],"aggregation":[126],"mitigating":[128],"impact":[130],"of":[131],"malicious":[132],"clients.":[133],"contribution":[135],"transitions":[136],"FL":[137,152],"from":[138],"static":[139],"more":[141],"frameworks,":[143],"establishing":[144],"a":[145],"benchmark":[146],"secure,":[148],"sustainable,":[149],"efficient":[151],"real-world":[154],"environments.":[156]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
