{"id":"https://openalex.org/W7128430824","doi":"https://doi.org/10.1109/tnse.2026.3663098","title":"SecHeto-FL: A Secure and Resilient Federated Learning Framework for Heterogeneous IoT Networks","display_name":"SecHeto-FL: A Secure and Resilient Federated Learning Framework for Heterogeneous IoT Networks","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7128430824","doi":"https://doi.org/10.1109/tnse.2026.3663098"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2026.3663098","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2026.3663098","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055628928","display_name":"Shehan Edirimannage","orcid":"https://orcid.org/0000-0003-3550-1924"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Shehan Edirimannage","raw_affiliation_strings":["School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ibrahim Khalil","orcid":"https://orcid.org/0000-0001-5512-114X"},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ibrahim Khalil","raw_affiliation_strings":["School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124344495","display_name":"Xun Yi","orcid":null},"institutions":[{"id":"https://openalex.org/I82951845","display_name":"RMIT University","ror":"https://ror.org/04ttjf776","country_code":"AU","type":"education","lineage":["https://openalex.org/I82951845"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xun Yi","raw_affiliation_strings":["School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I82951845"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5125453131","display_name":"Kwok-Yan Lam","orcid":null},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Kwok-Yan Lam","raw_affiliation_strings":["College of Computing and Data Science, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Computing and Data Science, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5055628928"],"corresponding_institution_ids":["https://openalex.org/I82951845"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.34143671,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":null,"first_page":"6772","last_page":"6789"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.6269000172615051,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.6269000172615051,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.1234000027179718,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.050700001418590546,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5885999798774719},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.541100025177002},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.45649999380111694},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.44429999589920044},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.41589999198913574},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.413100004196167},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3952000141143799},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.388700008392334},{"id":"https://openalex.org/keywords/convergence","display_name":"Convergence (economics)","score":0.38350000977516174}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8367000222206116},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5885999798774719},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.541100025177002},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.45649999380111694},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44760000705718994},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.44429999589920044},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4415000081062317},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.41589999198913574},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.413100004196167},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3952000141143799},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.388700008392334},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.38350000977516174},{"id":"https://openalex.org/C81917197","wikidata":"https://www.wikidata.org/wiki/Q628760","display_name":"Selection (genetic algorithm)","level":2,"score":0.3700999915599823},{"id":"https://openalex.org/C158207573","wikidata":"https://www.wikidata.org/wiki/Q5747224","display_name":"Heterogeneous network","level":4,"score":0.34220001101493835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33649998903274536},{"id":"https://openalex.org/C158156997","wikidata":"https://www.wikidata.org/wiki/Q1416645","display_name":"Models of communication","level":2,"score":0.3237999975681305},{"id":"https://openalex.org/C164554305","wikidata":"https://www.wikidata.org/wiki/Q71550","display_name":"Application server","level":2,"score":0.3156000077724457},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.30230000615119934},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2874999940395355},{"id":"https://openalex.org/C152880691","wikidata":"https://www.wikidata.org/wiki/Q146813","display_name":"Client\u2013server model","level":3,"score":0.2791000008583069},{"id":"https://openalex.org/C151423352","wikidata":"https://www.wikidata.org/wiki/Q5154228","display_name":"Communications security","level":3,"score":0.27869999408721924},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2705000042915344},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.2667999863624573},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.2526000142097473},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.251800000667572}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tnse.2026.3663098","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2026.3663098","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/212294","is_oa":false,"landing_page_url":"https://hdl.handle.net/10356/212294","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":75,"referenced_works":["https://openalex.org/W2015861736","https://openalex.org/W2798720628","https://openalex.org/W2946666127","https://openalex.org/W2978709794","https://openalex.org/W2990700079","https://openalex.org/W3036791758","https://openalex.org/W3092144916","https://openalex.org/W3095593352","https://openalex.org/W3135347465","https://openalex.org/W3141702517","https://openalex.org/W3155189475","https://openalex.org/W3159295158","https://openalex.org/W3192661977","https://openalex.org/W3196371845","https://openalex.org/W3200022083","https://openalex.org/W3203503583","https://openalex.org/W3210066319","https://openalex.org/W4205597275","https://openalex.org/W4206143364","https://openalex.org/W4211051107","https://openalex.org/W4224250975","https://openalex.org/W4226049484","https://openalex.org/W4244201901","https://openalex.org/W4285185356","https://openalex.org/W4285254453","https://openalex.org/W4285309724","https://openalex.org/W4285506551","https://openalex.org/W4295832541","https://openalex.org/W4316877071","https://openalex.org/W4317926962","https://openalex.org/W4323519261","https://openalex.org/W4366966548","https://openalex.org/W4383503732","https://openalex.org/W4383751256","https://openalex.org/W4385338532","https://openalex.org/W4386233487","https://openalex.org/W4386321897","https://openalex.org/W4386362921","https://openalex.org/W4387105517","https://openalex.org/W4387145983","https://openalex.org/W4387448460","https://openalex.org/W4387448561","https://openalex.org/W4387449166","https://openalex.org/W4387757706","https://openalex.org/W4387831926","https://openalex.org/W4388145554","https://openalex.org/W4388676505","https://openalex.org/W4388756135","https://openalex.org/W4388820152","https://openalex.org/W4389169630","https://openalex.org/W4389988061","https://openalex.org/W4390603618","https://openalex.org/W4391235371","https://openalex.org/W4391468023","https://openalex.org/W4391827207","https://openalex.org/W4392904131","https://openalex.org/W4392910504","https://openalex.org/W4394674799","https://openalex.org/W4401879004","https://openalex.org/W4403918246","https://openalex.org/W4403937562","https://openalex.org/W4404035572","https://openalex.org/W4405600789","https://openalex.org/W4406207607","https://openalex.org/W4406457717","https://openalex.org/W4406728017","https://openalex.org/W4408017202","https://openalex.org/W4409356434","https://openalex.org/W4410582689","https://openalex.org/W4410614229","https://openalex.org/W4412081708","https://openalex.org/W4412985346","https://openalex.org/W4413155587","https://openalex.org/W4415367016","https://openalex.org/W4415593904"],"related_works":[],"abstract_inverted_index":{"This":[0,101,128],"study":[1,20],"introduces":[2],"a":[3,28,61,67,79,85,103,118,148,216],"semi-asynchronous":[4,68,73],"web":[5],"browser-based":[6],"federated":[7],"learning":[8],"(FL)":[9],"framework":[10,173,221],"with":[11,43,136],"secure":[12,228],"communication,":[13],"designed":[14],"for":[15,88,96,107,222],"heterogeneous":[16,32],"IoT":[17,33],"networks.":[18],"The":[19,171],"addresses":[21],"the":[22,44,72,75,97,108,202,230],"complex":[23],"challenges":[24],"of":[25,31,46,192,201,232],"FL":[26,69,105,220],"over":[27],"large":[29],"number":[30],"devices":[34],"connected":[35],"by":[36,83],"insecure":[37],"and":[38,66,90,131,147,205,218],"unstable":[39],"communication":[40,158,169,233],"links":[41],"compounded":[42],"possibility":[45],"client":[47,63,98,109,120,138,152,164,208],"dropout,":[48],"where":[49],"clients":[50,89],"may":[51],"disconnect":[52],"due":[53],"to":[54,155,166,177],"internal":[55],"failures":[56],"or":[57],"external":[58],"reasons,":[59],"using":[60],"model-centric":[62],"selection":[64,99,114,121],"strategy":[65],"protocol.":[70],"In":[71],"process,":[74],"central":[76,144],"server":[77,145],"emulates":[78],"synchronous":[80],"system":[81],"model":[82,126,133,194,204],"setting":[84],"submission":[86],"deadline":[87],"only":[91],"timely":[92],"updates":[93],"are":[94],"considered":[95],"process.":[100],"ensures":[102],"robust":[104],"process":[106],"dropout":[110,209],"problem.":[111],"Unlike":[112],"agnostic":[113],"protocols,":[115],"we":[116,141],"propose":[117],"performance-based":[119],"algorithm":[122],"that":[123,184,226],"evaluates":[124],"local":[125],"quality.":[127],"maintains":[129],"fairness":[130],"global":[132,193,203],"performance":[134],"even":[135],"intermittent":[137],"participation.":[139],"Moreover,":[140],"utilize":[142],"TLS-based":[143],"validation":[146],"public":[149],"key":[150],"cryptography-based":[151],"authentication":[153],"mechanism":[154],"defend":[156],"against":[157,207],"layer":[159],"threats":[160],"(man-in-the-middle":[161],"attacks,":[162],"unauthorized":[163],"access)":[165],"further":[167,198],"strengthen":[168],"security.":[170],"proposed":[172],"is":[174],"hereafter":[175],"referred":[176],"as":[178,215],"SecHeto-FL.":[179],"Extensive":[180],"evaluation":[181],"results":[182],"show":[183],"SecHeto-FL":[185,214],"significantly":[186],"outperforms":[187],"state-of-the-art":[188],"techniques,":[189],"in":[190,229],"terms":[191],"accuracy.":[195],"Theoretical":[196],"analysis":[197],"guarantees":[199],"convergence":[200],"resilience":[206],"attacks.":[210],"These":[211],"findings":[212],"position":[213],"practical":[217],"scalable":[219],"next-generation":[223],"intelligent":[224],"networks":[225],"remains":[227],"face":[231],"security":[234],"risks.":[235]},"counts_by_year":[],"updated_date":"2026-04-04T08:04:53.788161","created_date":"2026-02-10T00:00:00"}
