{"id":"https://openalex.org/W4410412826","doi":"https://doi.org/10.32604/cmc.2025.065426","title":"Federated Learning and Blockchain Framework for Scalable and Secure IoT Access Control","display_name":"Federated Learning and Blockchain Framework for Scalable and Secure IoT Access Control","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410412826","doi":"https://doi.org/10.32604/cmc.2025.065426"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.065426","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065426","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.065426","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011909541","display_name":"Ammar Odeh","orcid":"https://orcid.org/0000-0002-9929-2116"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Ammar Odeh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5010717259","display_name":"Anas Abu Taleb","orcid":"https://orcid.org/0000-0002-8286-1829"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anas Abu Taleb","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5011909541"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.6338,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.94223968,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"84","issue":"1","first_page":"447","last_page":"461"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9818999767303467,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9686999917030334,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9878073334693909},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7811123132705688},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7204883098602295},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7183860540390015},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5887168645858765},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41583168506622314},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.413361519575119},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.37038150429725647},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21160084009170532},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.18754547834396362}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9878073334693909},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7811123132705688},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7204883098602295},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7183860540390015},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5887168645858765},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41583168506622314},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.413361519575119},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37038150429725647},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21160084009170532},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.18754547834396362}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.065426","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065426","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.065426","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065426","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2908737503","https://openalex.org/W2978858975","https://openalex.org/W3111635317","https://openalex.org/W3125378014","https://openalex.org/W3197224435","https://openalex.org/W4323925158","https://openalex.org/W4391616701","https://openalex.org/W4391671371","https://openalex.org/W4391816156","https://openalex.org/W4402205672","https://openalex.org/W4403118695","https://openalex.org/W4404592970","https://openalex.org/W4404710376","https://openalex.org/W4406150938","https://openalex.org/W4406727970"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4388131927","https://openalex.org/W1982914007","https://openalex.org/W2159583675","https://openalex.org/W1824242903","https://openalex.org/W1493858311","https://openalex.org/W2155470929","https://openalex.org/W2111125783","https://openalex.org/W2394465510"],"abstract_inverted_index":{"The":[0,80],"increasing":[1],"deployment":[2],"of":[3,5,35],"Internet":[4],"Things":[6],"(IoT)":[7],"devices":[8],"has":[9],"introduced":[10],"significant":[11],"security":[12,24,43,200,228],"challenges,":[13],"including":[14],"identity":[15,91],"spoofing,":[16],"unauthorized":[17],"access,":[18],"and":[19,39,55,71,97,134,185,201,211,235],"data":[20,95],"integrity":[21,74],"breaches.":[22],"Traditional":[23],"mechanisms":[25],"rely":[26],"on":[27,85],"centralized":[28,86],"frameworks":[29,229],"that":[30,112],"suffer":[31],"from":[32],"single":[33],"points":[34],"failure,":[36],"scalability":[37],"issues,":[38],"inefficiencies":[40],"in":[41,157,199],"real-time":[42],"enforcement.":[44],"To":[45],"address":[46],"these":[47],"limitations,":[48],"this":[49],"study":[50,223],"proposes":[51],"the":[52,113,149,195],"Blockchain-Enhanced":[53],"Trust":[54],"Access":[56,172],"Control":[57],"for":[58,219,230,238],"IoT":[59,78,109,215],"Security":[60],"(BETAC-IoT)":[61],"model,":[62],"which":[63],"integrates":[64],"blockchain":[65,151,163,208],"technology,":[66],"smart":[67,102],"contracts,":[68],"federated":[69,146],"learning,":[70],"Merkle":[72],"tree-based":[73],"verification":[75],"to":[76,131,143,167,225],"enhance":[77],"security.":[79],"proposed":[81],"model":[82,115,196],"eliminates":[83],"reliance":[84],"authentication":[87,125],"by":[88,121,127,139],"employing":[89],"decentralized":[90,227],"management,":[92],"ensuring":[93],"tamper-proof":[94],"storage,":[96],"automating":[98],"access":[99,117,191],"control":[100,118,173],"through":[101,178],"contracts.":[103],"Experimental":[104],"evaluation":[105],"using":[106,145],"a":[107,154,233],"synthetic":[108],"dataset":[110],"shows":[111],"BETAC-IoT":[114],"improves":[116],"enforcement":[119,174],"accuracy":[120,175],"92%,":[122],"reduces":[123],"device":[124],"time":[126],"52%":[128],"(from":[129,141],"2.5":[130],"1.2":[132],"s),":[133],"enhances":[135],"threat":[136],"detection":[137],"efficiency":[138],"7%":[140],"85%":[142],"92%)":[144],"learning.":[147],"Additionally,":[148],"hybrid":[150],"architecture":[152],"achieves":[153],"300%":[155],"increase":[156],"transaction":[158],"throughput":[159],"when":[160],"comparing":[161],"private":[162],"performance":[164],"(1200":[165],"TPS)":[166],"public":[168],"chains":[169],"(300":[170],"TPS).":[171],"was":[176],"quantified":[177],"confusion":[179],"matrix":[180],"analysis,":[181],"with":[182,213],"high":[183],"precision":[184],"minimal":[186],"false":[187],"positives":[188],"observed":[189],"across":[190],"decision":[192],"categories.":[193],"Although":[194],"presents":[197],"advantages":[198],"scalability,":[202],"challenges":[203],"such":[204],"as":[205],"computational":[206],"overhead,":[207],"storage":[209],"constraints,":[210],"interoperability":[212],"existing":[214],"systems":[216],"remain":[217],"areas":[218],"future":[220],"research.":[221],"This":[222],"contributes":[224],"advancing":[226],"IoT,":[231],"providing":[232],"resilient":[234],"scalable":[236],"solution":[237],"securing":[239],"connected":[240],"environments.":[241]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
