{"id":"https://openalex.org/W4409649464","doi":"https://doi.org/10.32604/cmc.2025.063734","title":"Securing Internet of Things Devices with Federated Learning: A Privacy-Preserving Approach for Distributed Intrusion Detection","display_name":"Securing Internet of Things Devices with Federated Learning: A Privacy-Preserving Approach for Distributed Intrusion Detection","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4409649464","doi":"https://doi.org/10.32604/cmc.2025.063734"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.063734","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063734","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.063734","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079575812","display_name":"Sulaiman Al Amro","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sulaiman Al Amro","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5079575812"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":8.6528,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.97065912,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"83","issue":"3","first_page":"4623","last_page":"4658"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9699000120162964,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.8066911697387695},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7004207372665405},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6074405312538147},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5502403974533081},{"id":"https://openalex.org/keywords/intrusion","display_name":"Intrusion","score":0.502863347530365},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4969845116138458},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4767542779445648},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3666958212852478}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.8066911697387695},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7004207372665405},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6074405312538147},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5502403974533081},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.502863347530365},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4969845116138458},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4767542779445648},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3666958212852478},{"id":"https://openalex.org/C17409809","wikidata":"https://www.wikidata.org/wiki/Q161764","display_name":"Geochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.063734","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063734","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.063734","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.063734","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2995191368","https://openalex.org/W3082551002","https://openalex.org/W4314446179","https://openalex.org/W4318486183","https://openalex.org/W4381786205","https://openalex.org/W4385650327","https://openalex.org/W4402483954"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W4311097251","https://openalex.org/W2586548817","https://openalex.org/W2625093826","https://openalex.org/W4200598720","https://openalex.org/W2921026492","https://openalex.org/W4247463117","https://openalex.org/W4361251261","https://openalex.org/W3031181660","https://openalex.org/W2133389611"],"abstract_inverted_index":{"The":[0,159,218],"rapid":[1],"proliferation":[2],"of":[3,5,39,97,103,131,215],"Internet":[4],"Things":[6],"(IoT)":[7],"devices":[8,79],"has":[9],"heightened":[10],"security":[11],"concerns,":[12],"making":[13],"intrusion":[14,59],"detection":[15,93,111],"a":[16,71,116,204],"pivotal":[17],"challenge":[18],"in":[19,254],"safeguarding":[20],"these":[21,45],"networks.":[22],"Traditional":[23],"centralized":[24,193],"Intrusion":[25],"Detection":[26],"Systems":[27],"(IDS)":[28],"often":[29],"fail":[30],"to":[31,119,176,199,211,223,232],"meet":[32],"the":[33,64,101,121,171,200,212,242],"privacy":[34,88],"requirements":[35],"and":[36,80,89,115,134,155,162,185,207,225,245],"scalability":[37,90],"demands":[38],"large-scale":[40],"IoT":[41,78,142,216],"ecosystems.":[42],"To":[43],"address":[44],"challenges,":[46],"we":[47],"propose":[48],"an":[49],"innovative":[50],"privacy-preserving":[51,208],"approach":[52],"leveraging":[53],"Federated":[54],"Learning":[55],"(FL)":[56],"for":[57,66,108,164,179,183,188],"distributed":[58],"detection.":[60],"Our":[61,137],"model":[62,84,118,251],"eliminates":[63],"need":[65],"aggregating":[67],"sensitive":[68],"data":[69],"on":[70,77,139,150,153,157,240],"central":[72],"server":[73],"by":[74,202],"training":[75],"locally":[76],"sharing":[81],"only":[82],"encrypted":[83],"updates,":[85],"ensuring":[86],"enhanced":[87],"without":[91],"compromising":[92],"accuracy.":[94],"Key":[95],"innovations":[96],"this":[98],"research":[99],"include":[100],"integration":[102],"advanced":[104],"deep":[105],"learning":[106],"techniques":[107],"real-time":[109],"threat":[110],"with":[112,228],"minimal":[113],"latency":[114],"novel":[117],"fortify":[120],"system\u2019s":[122,243],"resilience":[123],"against":[124],"diverse":[125],"cyber-attacks":[126],"such":[127,249],"as":[128,250],"Distributed":[129],"Denial":[130],"Service":[132],"(DDoS)":[133],"malware":[135],"injections.":[136],"evaluation":[138],"three":[140],"benchmark":[141],"datasets":[143,166],"demonstrates":[144],"significant":[145],"improvements:":[146],"achieving":[147],"92.78%":[148],"accuracy":[149],"NSL-KDD,":[151,180],"91.47%":[152],"BoT-IoT,":[154,184],"92.05%":[156],"UNSW-NB15.":[158],"precision,":[160],"recall,":[161],"F1-scores":[163],"all":[165],"consistently":[167],"exceed":[168],"91%.":[169],"Furthermore,":[170],"communication":[172],"overhead":[173],"was":[174],"reduced":[175],"85":[177],"MB":[178,182,187],"105":[181],"95":[186],"UNSW-NB15\u2014substantially":[189],"lower":[190],"than":[191],"traditional":[192],"IDS":[194],"approaches.":[195],"This":[196],"study":[197],"contributes":[198],"domain":[201],"presenting":[203],"scalable,":[205],"secure,":[206],"solution":[209],"tailored":[210],"unique":[213],"characteristics":[214],"environments.":[217,256],"proposed":[219],"framework":[220],"is":[221],"adaptable":[222],"dynamic":[224],"heterogeneous":[226],"settings,":[227],"potential":[229],"applications":[230],"extending":[231],"other":[233],"privacy-sensitive":[234],"domains.":[235],"Future":[236],"work":[237],"will":[238],"focus":[239],"enhancing":[241],"efficiency":[244],"addressing":[246],"emerging":[247],"challenges":[248],"poisoning":[252],"attacks":[253],"federated":[255]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
