{"id":"https://openalex.org/W7116894509","doi":"https://doi.org/10.1109/isc266238.2025.11293319","title":"Federated Edge AI for Adaptive Zero-Trust Security in Resource-Constrained IoT Networks","display_name":"Federated Edge AI for Adaptive Zero-Trust Security in Resource-Constrained IoT Networks","publication_year":2025,"publication_date":"2025-10-06","ids":{"openalex":"https://openalex.org/W7116894509","doi":"https://doi.org/10.1109/isc266238.2025.11293319"},"language":null,"primary_location":{"id":"doi:10.1109/isc266238.2025.11293319","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isc266238.2025.11293319","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Smart Cities Conference (ISC2)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121114189","display_name":"Dina Al-Sadi","orcid":null},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Dina Al-Sadi","raw_affiliation_strings":["Jordan University of Science and Technology,Computer Engineering Department,Irbid,Jordan,22110"],"affiliations":[{"raw_affiliation_string":"Jordan University of Science and Technology,Computer Engineering Department,Irbid,Jordan,22110","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020701671","display_name":"Abdoul Rjoub","orcid":"https://orcid.org/0000-0001-8948-8070"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Abdoul Rjoub","raw_affiliation_strings":["Jordan University of Science and Technology,Computer Engineering Department,Irbid,Jordan,22110"],"affiliations":[{"raw_affiliation_string":"Jordan University of Science and Technology,Computer Engineering Department,Irbid,Jordan,22110","institution_ids":["https://openalex.org/I156983542"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5121114189"],"corresponding_institution_ids":["https://openalex.org/I156983542"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.66006666,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.5162000060081482,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.5162000060081482,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.07850000262260437,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13553","display_name":"Age of Information Optimization","score":0.04190000146627426,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.6223000288009644},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5784000158309937},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5547000169754028},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5297999978065491},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5139999985694885},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.505299985408783},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.4652000069618225},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.4440000057220459},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4115000069141388}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7979000210762024},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.6223000288009644},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5784000158309937},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5547000169754028},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5297999978065491},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5139999985694885},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.505299985408783},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.4652000069618225},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4440000057220459},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4345000088214874},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4115000069141388},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.38920000195503235},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3481000065803528},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3280999958515167},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.3278999924659729},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.32109999656677246},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.31130000948905945},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2946000099182129},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.2921000123023987},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.2816999852657318},{"id":"https://openalex.org/C2780202397","wikidata":"https://www.wikidata.org/wiki/Q2294986","display_name":"Smart objects","level":3,"score":0.27959999442100525},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.2782999873161316},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.2745000123977661},{"id":"https://openalex.org/C13540734","wikidata":"https://www.wikidata.org/wiki/Q5318996","display_name":"Dynamic network analysis","level":2,"score":0.2705000042915344},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2653999924659729},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.258899986743927},{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.2565999925136566}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isc266238.2025.11293319","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isc266238.2025.11293319","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Smart Cities Conference (ISC2)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W3047314667","https://openalex.org/W3144404977","https://openalex.org/W3185305249","https://openalex.org/W3193402854","https://openalex.org/W3194453829","https://openalex.org/W3198436571","https://openalex.org/W3202083238","https://openalex.org/W4220963030","https://openalex.org/W4280500134","https://openalex.org/W4285205927","https://openalex.org/W4297120068","https://openalex.org/W4317727238","https://openalex.org/W4318049457","https://openalex.org/W4366415335","https://openalex.org/W4386408881","https://openalex.org/W4387744337","https://openalex.org/W4388419817","https://openalex.org/W4389099839","https://openalex.org/W4400428811","https://openalex.org/W4404413765","https://openalex.org/W4412165317"],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"proposes":[2],"a":[3,106,173],"Federated":[4],"Edge":[5],"AI":[6],"framework":[7,25,80,132],"with":[8,92],"Adaptive":[9],"Zero-Trust":[10],"Security":[11],"designed":[12],"for":[13],"resource":[14,181],"constrained":[15],"IoT":[16,42,168],"networks":[17],"used":[18],"mainly":[19],"in":[20,69,172],"smart":[21,140,158],"cities":[22,141],"applications.":[23],"The":[24,79,130],"harnesses":[26],"and":[27,37,49,65,86,115,121,127,147,161,180],"deploys":[28],"lightweight":[29,50,131],"machine":[30],"learning":[31,61],"models,":[32],"real-time":[33],"anomaly":[34],"detection":[35],"capabilities,":[36],"dynamic":[38],"trust":[39,56],"scoring.":[40],"Each":[41],"device":[43],"can":[44],"also":[45],"deploy":[46],"differential":[47],"privacy":[48,149],"encryption":[51],"as":[52,143],"optional":[53],"features.":[54],"Dynamic":[55],"scoring":[57],"enables":[58],"the":[59],"federated":[60],"process":[62],"to":[63,94,102,118,137],"identify":[64],"mitigate":[66],"malicious":[67,100],"clients":[68,101],"adversarial":[70],"environments,":[71],"while":[72],"trust-weighted":[73],"aggregation":[74],"prioritizes":[75],"reliable":[76],"model":[77],"updates.":[78],"is":[81,133,145],"simulated":[82],"under":[83,176],"both":[84],"IID":[85],"non-IID":[87],"datasets":[88],"from":[89],"IoT-23":[90],"dataset,":[91],"up":[93],"<tex":[95],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[96],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">$\\mathbf{4":[97],"0":[98],"\\%}$</tex>":[99],"ensure":[103],"there":[104],"was":[105],"significant":[107],"amount":[108],"of":[109,163],"anomalous":[110],"client":[111],"behavior,":[112],"control":[113],"groups":[114,117],"dependent":[116],"make":[119],"comparisons":[120],"assess":[122],"precision,":[123],"false":[124],"positive-negative,":[125],"communication":[126],"computational":[128],"load.":[129],"an":[134],"applicable":[135],"idea":[136],"real-world":[138],"like":[139],"applications,":[142],"it":[144],"scalable":[146],"highly":[148],"preserving.":[150],"Use":[151],"Case":[152],"Examples":[153],"include":[154],"intelligent":[155],"traffic":[156],"management,":[157],"energy":[159],"grids,":[160],"security":[162],"UAV":[164],"swarms":[165],"-":[166],"where":[167],"devices":[169],"must":[170],"operate":[171],"secure":[174],"fashion,":[175],"strict":[177],"latencies,":[178],"power,":[179],"limitations.":[182]},"counts_by_year":[],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-12-23T00:00:00"}
