{"id":"https://openalex.org/W7148640339","doi":"https://doi.org/10.5539/nct.v10n1p1","title":"Federated Learning in Smart Home Intrusion Detection: Securing the Learning Process with Blockchain","display_name":"Federated Learning in Smart Home Intrusion Detection: Securing the Learning Process with Blockchain","publication_year":2026,"publication_date":"2026-03-31","ids":{"openalex":"https://openalex.org/W7148640339","doi":"https://doi.org/10.5539/nct.v10n1p1"},"language":null,"primary_location":{"id":"doi:10.5539/nct.v10n1p1","is_oa":true,"landing_page_url":"https://doi.org/10.5539/nct.v10n1p1","pdf_url":"https://ccsenet.org/journal/index.php/nct/article/download/0/0/53070/57870","source":{"id":"https://openalex.org/S4210171281","display_name":"Network and Communication Technologies","issn_l":"1927-064X","issn":["1927-064X","1927-0658"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network and Communication Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://ccsenet.org/journal/index.php/nct/article/download/0/0/53070/57870","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5132877775","display_name":"Aon Alhinah","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Aon Alhinah","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5132893307","display_name":"Ismail Keshta","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ismail Keshta","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5132877775"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.95255619,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"10","issue":"1","first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.414900004863739,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.414900004863739,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.0828000009059906,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.048700001090765,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6675000190734863},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.607699990272522},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.5756000280380249},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5270000100135803},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.49619999527931213},{"id":"https://openalex.org/keywords/intrusion-tolerance","display_name":"Intrusion tolerance","score":0.41749998927116394},{"id":"https://openalex.org/keywords/home-automation","display_name":"Home automation","score":0.37929999828338623},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.3659999966621399}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6777999997138977},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6675000190734863},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6568999886512756},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.607699990272522},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.5756000280380249},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5270000100135803},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.49619999527931213},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.41749998927116394},{"id":"https://openalex.org/C507571656","wikidata":"https://www.wikidata.org/wiki/Q848436","display_name":"Home automation","level":2,"score":0.37929999828338623},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.3659999966621399},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3652999997138977},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3111000061035156},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.29739999771118164},{"id":"https://openalex.org/C2777826224","wikidata":"https://www.wikidata.org/wiki/Q5250404","display_name":"Deep integration","level":2,"score":0.28279998898506165},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27810001373291016},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.2757999897003174},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.26190000772476196},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.259799987077713},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.257099986076355},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.25529998540878296},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.25200000405311584}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5539/nct.v10n1p1","is_oa":true,"landing_page_url":"https://doi.org/10.5539/nct.v10n1p1","pdf_url":"https://ccsenet.org/journal/index.php/nct/article/download/0/0/53070/57870","source":{"id":"https://openalex.org/S4210171281","display_name":"Network and Communication Technologies","issn_l":"1927-064X","issn":["1927-064X","1927-0658"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network and Communication Technologies","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.5539/nct.v10n1p1","is_oa":true,"landing_page_url":"https://doi.org/10.5539/nct.v10n1p1","pdf_url":"https://ccsenet.org/journal/index.php/nct/article/download/0/0/53070/57870","source":{"id":"https://openalex.org/S4210171281","display_name":"Network and Communication Technologies","issn_l":"1927-064X","issn":["1927-064X","1927-0658"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310322531","host_organization_name":"Canadian Center of Science and Education","host_organization_lineage":["https://openalex.org/P4310322531"],"host_organization_lineage_names":["Canadian Center of Science and Education"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network and Communication Technologies","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320318809","display_name":"AlMaarefa University","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7148640339.pdf","grobid_xml":"https://content.openalex.org/works/W7148640339.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"rapid":[1],"expansion":[2],"of":[3,5,51,69,90,119,165,178,206,217,226],"Internet":[4],"Things":[6],"(IoT)":[7],"devices":[8],"has":[9],"fundamentally":[10],"reshaped":[11],"traditional":[12],"homes":[13],"into":[14],"highly":[15],"interconnected":[16],"smart":[17,38,101,229],"environments,":[18],"driving":[19],"unprecedented":[20],"convenience":[21],"while":[22,200],"simultaneously":[23],"exposing":[24],"critical":[25],"cybersecurity":[26],"vulnerabilities.":[27],"Conventional":[28],"centralized":[29],"Intrusion":[30],"Detection":[31],"Systems":[32],"(IDS)":[33],"are":[34,138,157],"increasingly":[35],"inadequate":[36],"for":[37],"homes,":[39],"owing":[40],"to":[41,48,77,96,145,159],"inherent":[42],"privacy":[43],"issues,":[44],"latency,":[45],"and":[46,80,112,122,141,149,154,163,181,193],"susceptibility":[47],"single":[49],"points":[50],"failure.":[52],"Federated":[53],"Learning":[54],"(FL)":[55],"offers":[56],"a":[57,94],"promising,":[58],"privacy-preserving":[59],"paradigm":[60],"by":[61],"enabling":[62],"collaborative":[63],"model":[64,78],"training":[65],"without":[66],"the":[67,88,117,127,161,202,215,218,224],"exchange":[68],"raw":[70],"user":[71],"data;":[72],"however,":[73],"FL":[74,219],"remains":[75],"vulnerable":[76],"poisoning":[79],"integrity":[81],"attacks.":[82],"This":[83,209],"comprehensive":[84],"review":[85,128],"systematically":[86],"examines":[87],"integration":[89],"blockchain":[91,108,139],"technology":[92],"as":[93],"means":[95],"secure":[97,146,228],"FL-based":[98,147],"IDS":[99],"in":[100],"home":[102,230],"contexts.":[103],"We":[104],"critically":[105],"evaluate":[106],"diverse":[107],"frameworks,":[109],"consensus":[110,142,187],"protocols,":[111],"enhancement":[113,152],"strategies":[114],"that":[115,172],"underpin":[116],"development":[118,225],"trustworthy,":[120],"transparent,":[121],"resilient":[123],"security":[124,199],"architectures.":[125],"Specifically,":[126],"addresses":[129],"two":[130],"core":[131],"research":[132],"questions:":[133],"(1)":[134],"In":[135],"what":[136],"ways":[137],"frameworks":[140],"mechanisms":[143],"leveraged":[144],"IDS?":[148],"(2)":[150],"What":[151],"techniques":[153],"hybrid":[155],"models":[156],"implemented":[158],"optimize":[160],"performance":[162],"efficiency":[164],"these":[166],"integrated":[167],"systems?":[168],"Our":[169],"synthesis":[170],"reveals":[171],"permissioned":[173],"blockchains&amp;mdash;particularly":[174],"those":[175],"employing":[176],"Proof":[177],"Authority":[179],"(PoA)":[180],"Practical":[182],"Byzantine":[183],"Fault":[184],"Tolerance":[185],"(PBFT)":[186],"mechanisms&amp;mdash;when":[188],"combined":[189],"with":[190],"edge":[191],"computing":[192],"lightweight":[194],"architectural":[195],"designs,":[196],"deliver":[197],"robust":[198],"meeting":[201],"resource":[203],"constraints":[204],"characteristic":[205],"IoT":[207],"devices.":[208],"technological":[210],"synergy":[211],"not":[212],"only":[213],"strengthens":[214],"resilience":[216],"process":[220],"but":[221],"also":[222],"advances":[223],"next-generation,":[227],"ecosystems.":[231]},"counts_by_year":[],"updated_date":"2026-04-05T06:14:27.290980","created_date":"2026-04-04T00:00:00"}
