{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:31:10Z","timestamp":1777890670650,"version":"3.51.4"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10586-024-04711-0","type":"journal-article","created":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T17:02:53Z","timestamp":1730134973000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Securing fog-assisted IoT smart homes: a federated learning-based intrusion detection approach"],"prefix":"10.1007","volume":"28","author":[{"given":"Radjaa","family":"Bensaid","sequence":"first","affiliation":[]},{"given":"Nabila","family":"Labraoui","sequence":"additional","affiliation":[]},{"given":"Hafida","family":"Saidi","sequence":"additional","affiliation":[]},{"given":"Haythem","family":"Bany Salameh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"4711_CR1","doi-asserted-by":"crossref","unstructured":"Zhao, W., Hu, Y., Yan, X.\u00a0e.\u00a0a.:\u201cEnhanced k-nn with bayesian optimization algorithm for predicting energy efficiency of smart grids in iot. cluster comput,\u201d Cluster Computing, (2024)","DOI":"10.21203\/rs.3.rs-3741153\/v1"},{"issue":"2","key":"4711_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3301443","volume":"19","author":"C Puliafito","year":"2019","unstructured":"Puliafito, C., Mingozzi, E., Longo, F., Puliafito, A., Rana, O.: Fog computing for the internet of things: a survey. ACM Trans. Int. Technol.(TOIT) 19(2), 1\u201341 (2019)","journal-title":"ACM Trans. Int. Technol.(TOIT)"},{"issue":"5","key":"4711_CR3","doi-asserted-by":"publisher","first-page":"840","DOI":"10.3390\/su9050840","volume":"9","author":"J Bennett","year":"2017","unstructured":"Bennett, J., Rokas, O., Chen, L.: Healthcare in the smart home: a study of past, present and future. Sustainability 9(5), 840 (2017)","journal-title":"Sustainability"},{"key":"4711_CR4","doi-asserted-by":"crossref","unstructured":"Saini, M., Sengupta, E., Thakur, S.:\u201cCorrection: Artificial intelligence assisted iot-fog based framework for emergency fire response in smart buildings.\u201d Cluster Computing, (2024)","DOI":"10.1007\/s10586-024-04576-3"},{"issue":"4","key":"4711_CR5","doi-asserted-by":"publisher","first-page":"2489","DOI":"10.1109\/COMST.2020.3011208","volume":"22","author":"K Tange","year":"2020","unstructured":"Tange, K., De Donno, M., Fafoutis, X., Dragoni, N.: A systematic survey of industrial internet of things security: requirements and fog computing opportunities. IEEE Commun. Surv. Tutor. 22(4), 2489\u20132520 (2020)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"4711_CR6","doi-asserted-by":"publisher","first-page":"1636","DOI":"10.1109\/COMST.2018.2874978","volume":"21","author":"I Makhdoom","year":"2018","unstructured":"Makhdoom, I., Abolhasan, M., Lipman, J., Liu, R.P., Ni, W.: Anatomy of threats to the internet of things. IEEE Commun. Surv. Tutor. 21(2), 1636\u20131675 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"4711_CR7","doi-asserted-by":"crossref","unstructured":"Bensaid, R., Labraoui, N., Abba\u00a0Ari, A.\u00a0A., Maglaras, L., Saidi,A.M.H., Lwahhab, Abdu, Benfriha, S.: \u201cToward a real-time tcp syn flood ddos mitigation using adaptive neuro-fuzzy classifier and sdn assistance in fog computing,\u201d Security and Communication Networks, vol. 2024, no.\u00a01, p. 6651584, (2024)","DOI":"10.1155\/2024\/6651584"},{"issue":"1","key":"4711_CR8","doi-asserted-by":"publisher","first-page":"65","DOI":"10.13052\/jcsm2245-1439.414","volume":"4","author":"M Abomhara","year":"2015","unstructured":"Abomhara, M., K\u00f8ien, G.M.: Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. J. Cyber Secur. Mobil. 4(1), 65\u201388 (2015)","journal-title":"J. Cyber Secur. Mobil."},{"issue":"7","key":"4711_CR9","first-page":"26","volume":"28","author":"V Jyothsna","year":"2011","unstructured":"Jyothsna, V., Prasad, R., Prasad, K.M.: A review of anomaly based intrusion detection systems. Int. J. Comput. Appl. 28(7), 26\u201335 (2011)","journal-title":"Int. J. Comput. Appl."},{"key":"4711_CR10","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.future.2022.03.001","volume":"133","author":"I Martins","year":"2022","unstructured":"Martins, I., Resende, J.S., Sousa, P.R., Silva, S., Antunes, L., Gama, J.: Host-based ids: a review and open issues of an anomaly detection system in iot. Future Gener. Comput. Syst. 133, 95\u2013113 (2022)","journal-title":"Future Gener. Comput. Syst."},{"key":"4711_CR11","doi-asserted-by":"crossref","unstructured":"Bany\u00a0Salameh, H., Hussienat, A., Alhafnawi, M., et\u00a0al.: Autonomous uav-based surveillance system for multi-target detection using reinforcement learning, Cluster Computing, (2024)","DOI":"10.1007\/s10586-024-04452-0"},{"key":"4711_CR12","doi-asserted-by":"crossref","unstructured":"Manoharan, A., Sarker, M.: Revolutionizing cybersecurity: Unleashing the power of artificial intelligence and machine learning for next-generation threat detection vol. 1, 2023. https:\/\/doi.org\/10.56726\/IRJMETS32644","DOI":"10.56726\/IRJMETS32644"},{"issue":"1","key":"4711_CR13","doi-asserted-by":"publisher","first-page":"3909173","DOI":"10.1155\/2024\/3909173","volume":"2024","author":"S Muneer","year":"2024","unstructured":"Muneer, S., Farooq, U., Athar, A., Ahsan Raza, M., Ghazal, T.M., Sakib, S.: A critical review of artificial intelligence based approaches in intrusion detection: a comprehensive analysis. J. Eng. 2024(1), 3909173 (2024)","journal-title":"J. Eng."},{"issue":"3","key":"4711_CR14","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1109\/COMST.2021.3090430","volume":"23","author":"LU Khan","year":"2021","unstructured":"Khan, L.U., Saad, W., Han, Z., Hossain, E., Hong, C.S.: Federated learning for internet of things: recent advances, taxonomy, and open challenges. IEEE Commun. Surv. Tutor. 23(3), 1759\u20131799 (2021)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"4711_CR15","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1109\/JBHI.2022.3181823","volume":"27","author":"M Ali","year":"2022","unstructured":"Ali, M., Naeem, F., Tariq, M., Kaddoum, G.: Federated learning for privacy preservation in smart healthcare systems: a comprehensive survey. IEEE J. Biomed. Health Inf. 27(2), 778\u2013789 (2022)","journal-title":"IEEE J. Biomed. Health Inf."},{"key":"4711_CR16","doi-asserted-by":"crossref","unstructured":"Radjaa, B., Nabila, L., Salameh, H.\u00a0B.: \u201cFederated deep learning-based intrusion detection approach for enhancing privacy in fog-iot networks,\u201d in 2023 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 156\u2013160 (2023)","DOI":"10.1109\/IOTSMS59855.2023.10325826"},{"key":"4711_CR17","doi-asserted-by":"crossref","unstructured":"Bany Salameh, H., Alhafnawi, M., Masadeh, A., Jararweh, Y.:\u201cFederated reinforcement learning approach for detecting uncertain deceptive target using autonomous dual uav system,\u201d Information Processing & Management, vol.\u00a060, no.\u00a02, p. 103149, (2023). [Online]. Available: https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0306457322002503","DOI":"10.1016\/j.ipm.2022.103149"},{"key":"4711_CR18","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/j.future.2019.05.041","volume":"100","author":"N Koroniotis","year":"2019","unstructured":"Koroniotis, N., Moustafa, N., Sitnikova, E., Turnbull, B.: Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: bot-iot dataset. Future Gener. Comput. Syst. 100, 779\u2013796 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"4711_CR19","unstructured":"Moustafa, N.:\u201cNew generations of internet of things datasets for cybersecurity applications based machine learning: Ton_iot datasets,\u201d in Proceedings of the eResearch Australasia Conference, Brisbane, Australia, (2019), pp. 21\u201325"},{"issue":"22","key":"4711_CR20","doi-asserted-by":"publisher","first-page":"6578","DOI":"10.3390\/s20226578","volume":"20","author":"I Vaccari","year":"2020","unstructured":"Vaccari, I., Chiola, G., Aiello, M., Mongelli, M., Cambiaso, E.: Mqttset, a new dataset for machine learning techniques on mqtt. Sensors 20(22), 6578 (2020)","journal-title":"Sensors"},{"issue":"6","key":"4711_CR21","doi-asserted-by":"publisher","first-page":"4059","DOI":"10.1109\/TII.2021.3088938","volume":"18","author":"J Li","year":"2021","unstructured":"Li, J., Lyu, L., Liu, X., Zhang, X., Lyu, X.: Fleam: a federated learning empowered architecture to mitigate ddos in industrial iot. IEEE Trans. Ind. Inf. 18(6), 4059\u20134068 (2021)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"4711_CR22","doi-asserted-by":"crossref","unstructured":"Al-Marri, N.A.A.-A., Ciftler, B.S., Abdallah, M.M.: Federated mimic learning for privacy preserving intrusion detection,\u201d in,: IEEE international black sea conference on communications and networking (BlackSeaCom). IEEE 2020, 1\u20136 (2020)","DOI":"10.1109\/BlackSeaCom48709.2020.9234959"},{"key":"4711_CR23","doi-asserted-by":"crossref","unstructured":"Khoa, T.V., Saputra, Y.M., Hoang, D.T., Trung, N.L., Nguyen, D., Ha, N.V., Dutkiewicz, E.: \u201cCollaborative learning model for cyberattack detection systems in iot industry 4.0,\u201d in,: IEEE wireless communications and networking conference (WCNC). IEEE 2020, 1\u20136 (2020)","DOI":"10.1109\/WCNC45663.2020.9120761"},{"issue":"8","key":"4711_CR24","doi-asserted-by":"publisher","first-page":"5615","DOI":"10.1109\/TII.2020.3023430","volume":"17","author":"B Li","year":"2020","unstructured":"Li, B., Wu, Y., Song, J., Lu, R., Li, T., Zhao, L.: Deepfed: federated deep learning for intrusion detection in industrial cyber-physical systems. IEEE Trans. Ind. Inf. 17(8), 5615\u20135624 (2020)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"4711_CR25","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.jpdc.2022.03.003","volume":"165","author":"O Friha","year":"2022","unstructured":"Friha, O., Ferrag, M.A., Shu, L., Maglaras, L., Choo, K.-K.R., Nafaa, M.: Felids: federated learning-based intrusion detection system for agricultural internet of things. J. Parallel Distrib. Comp. 165, 17\u201331 (2022)","journal-title":"J. Parallel Distrib. Comp."},{"issue":"6","key":"4711_CR26","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/MNET.011.2000286","volume":"34","author":"SA Rahman","year":"2020","unstructured":"Rahman, S.A., Tout, H., Talhi, C., Mourad, A.: Internet of things intrusion detection: centralized, on-device, or federated learning? IEEE Network 34(6), 310\u2013317 (2020)","journal-title":"IEEE Network"},{"key":"4711_CR27","doi-asserted-by":"publisher","first-page":"1739","DOI":"10.1007\/s10586-017-1105-z","volume":"22","author":"M Gajewski","year":"2019","unstructured":"Gajewski, M., Batalla, J.M., Mastorakis, G., Mavromoustakis, C.X.: A distributed ids architecture model for smart home systems. Cluster Comp. 22, 1739\u20131749 (2019)","journal-title":"Cluster Comp."},{"key":"4711_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2020.101157","volume":"42","author":"R Zhao","year":"2020","unstructured":"Zhao, R., Yin, Y., Shi, Y., Xue, Z.: Intelligent intrusion detection based on federated learning aided long short-term memory. Phys. Commun. 42, 101157 (2020)","journal-title":"Phys. Commun."},{"issue":"21","key":"4711_CR29","doi-asserted-by":"publisher","first-page":"18599","DOI":"10.1109\/JIOT.2023.3288563","volume":"10","author":"D Javeed","year":"2023","unstructured":"Javeed, D., Gao, T., Saeed, M.S., Khan, M.T.: Fog-empowered augmented-intelligence-based proactive defensive mechanism for iot-enabled smart industries. IEEE Int. Things J. 10(21), 18599\u201318608 (2023)","journal-title":"IEEE Int. Things J."},{"key":"4711_CR30","doi-asserted-by":"publisher","first-page":"103540","DOI":"10.1016\/j.adhoc.2024.103540","volume":"162","author":"D Javeed","year":"2024","unstructured":"Javeed, D., Saeed, M.S., Adil, M., Kumar, P., Jolfaei, A.: A federated learning-based zero trust intrusion detection system for internet of things. Ad Hoc Net. 162, 103540 (2024)","journal-title":"Ad Hoc Net."},{"key":"4711_CR31","unstructured":"\u201cKdd cup 1999,\u201d Available online: http:\/\/Kdd.Ics.Uci.Edu\/Databases\/Kddcup99.html, 1999"},{"key":"4711_CR32","unstructured":"\u201cNsl-kdd dataset,\u201d Available online: http:\/\/nsl.cs.unb.ca\/nsl-kdd, 2009"},{"key":"4711_CR33","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: \u201cUnsw-nb15: a comprehensive data set for network intrusion detection systems (unsw-nb15 network data set),\u201d in,: military communications and information systems conference (MilCIS). IEEE 2015, 1\u20136 (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"4711_CR34","doi-asserted-by":"crossref","unstructured":"Diro, A., Reda, H., Chilamkurti, N., Mahmood, A., Zaman, N., Nam, Y.:\u201cLightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication,\u201d IEEE Access, vol.\u00a08, pp. 60\u00a0539\u201360\u00a0551, (2020)","DOI":"10.1109\/ACCESS.2020.2983117"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04711-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04711-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04711-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T15:14:59Z","timestamp":1736522099000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04711-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["4711"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04711-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"22 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 September 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We state that the paper is original and was not published elsewhere.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"50"}}