{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T17:58:43Z","timestamp":1777658323828,"version":"3.51.4"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:00:00Z","timestamp":1755907200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:00:00Z","timestamp":1755907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"ASPIRE Award for Research Excellence (AARE-2020), Abu Dhabi, United Arab Emirates","award":["AARE20-161"],"award-info":[{"award-number":["AARE20-161"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-025-05188-1","type":"journal-article","created":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T13:58:20Z","timestamp":1755957500000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Reinforcement learning-based drone-client selection for efficient federated learning-based intrusion detection in FANETs"],"prefix":"10.1007","volume":"28","author":[{"given":"Sihem","family":"Benfriha","sequence":"first","affiliation":[]},{"given":"Nabila","family":"Labraoui","sequence":"additional","affiliation":[]},{"given":"Haythem A.","family":"Bany Salameh","sequence":"additional","affiliation":[]},{"given":"Radjaa","family":"Bensaid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,23]]},"reference":[{"issue":"10","key":"5188_CR1","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/MCOM.009.2200559","volume":"61","author":"R Ahmad","year":"2023","unstructured":"Ahmad, R., Ayyash, M., Salameh, H.B., El-Khazali, R., Eigala, H.: Indoor flying networks for 6g: Concepts, challenges, enabling technologies, and opportunities. IEEE Commun. Mag. 61(10), 156\u2013162 (2023)","journal-title":"IEEE Commun. Mag."},{"key":"5188_CR2","doi-asserted-by":"crossref","unstructured":"Banerjee, A., Mahato, G.\u00a0K., Chakraborty, S.\u00a0K.: \u201cSecuring fanet using federated learning through homomorphic matrix factorization,\u201d International Journal of Information Technology, pp. 1\u201320, (2024)","DOI":"10.1007\/s41870-024-02197-y"},{"key":"5188_CR3","unstructured":"Masadeh, A., Alhafnawi, M., Salameh, H.\u00a0A.\u00a0B., Musa, A., Jararweh, Y.: \u201cReinforcement learning-based security\/safety uav system for intrusion detection under dynamic and uncertain target movement,\u201d IEEE Transactions on Engineering Management, (2022)"},{"issue":"3","key":"5188_CR4","doi-asserted-by":"publisher","first-page":"2281","DOI":"10.1007\/s10586-021-03497-9","volume":"25","author":"M Singh","year":"2022","unstructured":"Singh, M., Aujla, G.S., Bali, R.S.: Derived blockchain architecture for security-conscious data dissemination in edge-envisioned internet of drones ecosystem. Clust. Comput. 25(3), 2281\u20132302 (2022)","journal-title":"Clust. Comput."},{"key":"5188_CR5","doi-asserted-by":"publisher","first-page":"9381","DOI":"10.1007\/s10586-024-04452-0","volume":"27","author":"H. Bany Salameh","year":"2024","unstructured":"Salameh, H. Bany., Hussienat, A., Alhafnawi, M., et al.: Autonomous UAv-based surveillance system for multi-target detection using reinforcement learning. Clust. Comp. 27, 9381\u20139394 (2024)","journal-title":"Clust. Comp."},{"key":"5188_CR6","doi-asserted-by":"crossref","unstructured":"Benfriha, S., Labraoui, N., Salameh, H.\u00a0B., Saidi, H.: \u201cA survey on trust management in flying ad hoc networks: Challenges, classifications, and analysis,\u201d in 2023 Tenth International Conference on Software Defined Systems (SDS). IEEE, (2023), pp. 107\u2013114","DOI":"10.1109\/SDS59856.2023.10329156"},{"key":"5188_CR7","doi-asserted-by":"crossref","unstructured":"Benfriha, S., Labraoui, N.: \u201cInsiders detection in the uncertain iod using fuzzy logic,\u201d in 2022 International Arab Conference on Information Technology (ACIT). IEEE, (2022), pp. 1\u20136","DOI":"10.1109\/ACIT57182.2022.9994119"},{"key":"5188_CR8","doi-asserted-by":"crossref","unstructured":"Benadla, S., Merad-Boudia, O.\u00a0R., Lehsaini, M.: \u201cBlockchain-based conditional privacy-preserving authentication mechanism for vehicular fog networks,\u201d in 2022 3rd International Conference on Embedded & Distributed Systems (EDiS). IEEE, pp. 81\u201386 (2022)","DOI":"10.1109\/EDiS57230.2022.9996473"},{"key":"5188_CR9","doi-asserted-by":"crossref","unstructured":"Benfriha, S., Labraoui, N., Bensaid, R., Salameh, H.\u00a0Bany, Saidi, H.: \u201cFuba: A fuzzy-based unmanned aerial vehicle behaviour analytics for trust management in flying ad-hoc networks,\u201d IET Networks, (2023)","DOI":"10.1049\/ntw2.12108"},{"key":"5188_CR10","doi-asserted-by":"crossref","unstructured":"Danesh, S., Torkestani, J.\u00a0Akbari: \u201cClara: clustered learning automata-based routing algorithm for efficient fanet communication,\u201d Cluster Computing, pp. 1\u201317, (2024)","DOI":"10.1007\/s10586-024-04299-5"},{"key":"5188_CR11","doi-asserted-by":"crossref","unstructured":"Rahman, K., Aziz, M.\u00a0A., Usman, N., Kiren, T., Cheema, T.\u00a0A., Shoukat, H., Bhatia, T.\u00a0K., Abdollahi, A., Sajid, A., et\u00a0al.: \u201cCognitive lightweight logistic regression-based ids for iot-enabled fanet to detect cyberattacks,\u201d Mobile Information Systems, vol. 2023, (2023)","DOI":"10.1155\/2023\/7690322"},{"key":"5188_CR12","doi-asserted-by":"crossref","unstructured":"Ouiazzane, S., Addou, M., Barramou, F.: \u201cA multiagent and machine learning based denial of service intrusion detection system for drone networks,\u201d Geospatial Intelligence: Applications and Future Trends, pp. 51\u201365, (2022)","DOI":"10.1007\/978-3-030-80458-9_5"},{"issue":"21","key":"5188_CR13","doi-asserted-by":"publisher","first-page":"2633","DOI":"10.3390\/electronics10212633","volume":"10","author":"RA Ramadan","year":"2021","unstructured":"Ramadan, R.A., Emara, A.-H., Al-Sarem, M., Elhamahmy, M.: Internet of drones intrusion detection using deep learning. Electronics 10(21), 2633 (2021)","journal-title":"Electronics"},{"issue":"4","key":"5188_CR14","first-page":"0072","volume":"4","author":"AM Abdulghani","year":"2022","unstructured":"Abdulghani, A.M., Abdulghani, M.M., Walters, W.L., Abed, K.H.: Improving intrusion detection in uav communication using an lstm-smote classification method\u2019\u2019. J. Cybersec. 4(4), 0072\u20132579 (2022)","journal-title":"J. Cybersec."},{"key":"5188_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108704","volume":"108","author":"J Escorcia-Gutierrez","year":"2023","unstructured":"Escorcia-Gutierrez, J., Gamarra, M., Leal, E., Madera, N., Soto, C., Mansour, R.F., Alharbi, M., Alkhayyat, A., Gupta, D.: Sea turtle foraging algorithm with hybrid deep learning-based intrusion detection for the internet of drones environment. Comput. Electr. Eng. 108, 108704 (2023)","journal-title":"Comput. Electr. Eng."},{"key":"5188_CR16","doi-asserted-by":"crossref","unstructured":"Nidhi and Grover, J.: \u201cFederated learning analysis for vehicular traffic flow prediction: evaluation of learning algorithms and aggregation approaches,\u201d Cluster Computing, pp. 1\u201317, (2024)","DOI":"10.1007\/s10586-023-04235-z"},{"key":"5188_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04711-0","author":"R Bensaid","year":"2025","unstructured":"Bensaid, R., Labraoui, N., Saidi, H., et al.: Securing fog-assisted iot smart homes: a federated learning-based intrusion detection approach\u2019\u2019. Cluster Comp. (2025). https:\/\/doi.org\/10.1007\/s10586-024-04711-0","journal-title":"Cluster Comp."},{"issue":"2","key":"5188_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.103149","volume":"60","author":"H. Bany Salameh","year":"2023","unstructured":"Salameh, H. Bany., Alhafnawi, M., Masadeh, A., Jararweh, Y.: Federated reinforcement learning approach for detecting uncertain deceptive target using autonomous dual uav system\u2019\u2019. Inf. Process. Manag. 60(2), 103149 (2023)","journal-title":"Inf. Process. Manag."},{"issue":"2","key":"5188_CR19","doi-asserted-by":"publisher","first-page":"1055","DOI":"10.1109\/TNSE.2020.3014385","volume":"8","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Su, Z., Zhang, N., Benslimane, A.: Learning in the air: secure federated learning for uav-assisted crowdsensing. IEEE Trans. Netw. Sci. Eng. 8(2), 1055\u20131069 (2020)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"19","key":"5188_CR20","doi-asserted-by":"publisher","first-page":"8077","DOI":"10.3390\/s23198077","volume":"23","author":"E Ntizikira","year":"2023","unstructured":"Ntizikira, E., Lei, W., Alblehai, F., Saleem, K., Lodhi, M.A.: Secure and privacy-preserving intrusion detection and prevention in the internet of unmanned aerial vehicles. Sensors 23(19), 8077 (2023)","journal-title":"Sensors"},{"key":"5188_CR21","doi-asserted-by":"crossref","unstructured":"Bensaid, R., Labraoui, N., Ari, A.\u00a0A. Abba, Maglaras, L., Saidi, H., Lwahhab, A.\u00a0M. Abdu, Benfriha, S.: et\u00a0al., \u201cToward a real-time tcp syn flood ddos mitigation using adaptive neuro-fuzzy classifier and sdn assistance in fog computing,\u201d Security and Communication Networks, vol. 2024, (2023)","DOI":"10.1155\/2024\/6651584"},{"key":"5188_CR22","first-page":"1032","volume":"2021","author":"O Bouhamed","year":"2021","unstructured":"Bouhamed, O., Bouachir, O., Aloqaily, M., Al Ridhawi, I.: Lightweight ids for uav networks: a periodic deep reinforcement learning-based approach,\u2019\u2019 in: IFIP\/IEEE International Symposium on Integrated Network Management (IM). IEEE 2021, 1032\u20131037 (2021)","journal-title":"IEEE"},{"issue":"4","key":"5188_CR23","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MNET.011.2100068","volume":"35","author":"J Tao","year":"2021","unstructured":"Tao, J., Han, T., Li, R.: Deep-reinforcement-learning-based intrusion detection in aerial computing networks. IEEE Netw. 35(4), 66\u201372 (2021)","journal-title":"IEEE Netw."},{"key":"5188_CR24","doi-asserted-by":"crossref","unstructured":"Heidari, A., Navimipour, N.\u00a0J., Unal, M.: \u201cA secure intrusion detection platform using blockchain and radial basis function neural networks for internet of drones,\u201d IEEE Internet of Things Journal, (2023)","DOI":"10.1109\/JIOT.2023.3237661"},{"key":"5188_CR25","doi-asserted-by":"crossref","unstructured":"Sorkhpour, M., Yazdinejad, A., Dehghantanha, A.: \u201cAuto-cids: An autonomous intrusion detection system for vehicular networks,\u201d in Proceedings of the Workshop on Autonomous Cybersecurity, (2023), pp. 45\u201355","DOI":"10.1145\/3689933.3690837"},{"key":"5188_CR26","doi-asserted-by":"publisher","first-page":"4338","DOI":"10.1109\/ACCESS.2019.2962873","volume":"8","author":"NI Mowla","year":"2019","unstructured":"Mowla, N.I., Tran, N.H., Doh, I., Chae, K.: Federated learning-based cognitive detection of jamming attack in flying ad-hoc network. IEEE Access 8, 4338\u20134350 (2019)","journal-title":"IEEE Access"},{"key":"5188_CR27","doi-asserted-by":"crossref","unstructured":"Namakshenas, D., Yazdinejad, A., Dehghantanha, A., Parizi, R.\u00a0M., Srivastava, G.: \u201cIp2fl: interpretation-based privacy-preserving federated learning for industrial cyber-physical systems,\u201d IEEE Transactions on Industrial Cyber-Physical Systems, (2024)","DOI":"10.1109\/TICPS.2024.3435178"},{"key":"5188_CR28","doi-asserted-by":"crossref","unstructured":"Yazdinejad, A., Dehghantanha, A., Karimipour, H., Srivastava, G., Parizi, R.\u00a0M.: \u201cA robust privacy-preserving federated learning model against model poisoning attacks,\u201d IEEE Transactions on Information Forensics and Security, (2024)","DOI":"10.1109\/TIFS.2024.3420126"},{"key":"5188_CR29","doi-asserted-by":"crossref","unstructured":"Namakshenas, D., Yazdinejad, A., Dehghantanha, A., Srivastava, G.: \u201cFederated quantum-based privacy-preserving threat detection model for consumer internet of things,\u201d IEEE Transactions on Consumer Electronics, (2024)","DOI":"10.1109\/TCE.2024.3377550"},{"issue":"10","key":"5188_CR30","doi-asserted-by":"publisher","first-page":"7110","DOI":"10.1109\/JIOT.2021.3074382","volume":"9","author":"X Wang","year":"2022","unstructured":"Wang, X., Garg, S., Lin, H., Hu, J., Kaddoum, G., Piran, M. Jalil., Hossain, M.S.: Toward accurate anomaly detection in industrial internet of things using hierarchical federated learning\u2019\u2019. IEEE Internet Things J. 9(10), 7110\u20137119 (2022)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"5188_CR31","first-page":"2074","volume":"24","author":"X Wang","year":"2023","unstructured":"Wang, X., Garg, S., Lin, H., Kaddoum, G., Hu, J., Hassan, M.M.: Heterogeneous blockchain and ai-driven hierarchical trust evaluation for 5g-enabled intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. 24(2), 2074\u20132083 (2023)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"16","key":"5188_CR32","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1109\/JIOT.2020.3023588","volume":"9","author":"X Wang","year":"2022","unstructured":"Wang, X., Garg, S., Lin, H., Kaddoum, G., Hu, J., Hossain, M.S.: A secure data aggregation strategy in edge computing and blockchain-empowered internet of things\u2019\u2019. IEEE Internet Things J. 9(16), 237\u2013246 (2022)","journal-title":"IEEE Internet Things J."},{"key":"5188_CR33","doi-asserted-by":"crossref","unstructured":"Chen, X., Qiu, W., Chen, L., Ma, Y., Ma, J.: \u201cFast and practical intrusion detection system based on federated learning for vanet,\u201d Computers & Security, p. 103881, (2024)","DOI":"10.1016\/j.cose.2024.103881"},{"issue":"10","key":"5188_CR34","doi-asserted-by":"publisher","first-page":"852","DOI":"10.1109\/TITS.2022.3145823","volume":"23","author":"Y Li","year":"2022","unstructured":"Li, Y., Guo, Y., Alazab, M., Chen, S., Shen, C., Yu, K.: Joint optimal quantization and aggregation of federated learning scheme in vanets\u2019\u2019. IEEE Trans. Intell. Trans. Syst. 23(10), 852\u2013863 (2022)","journal-title":"IEEE Trans. Intell. Trans. Syst."},{"key":"5188_CR35","first-page":"89","volume-title":"Security and Privacy in Federated Learning","author":"S Yu","year":"2022","unstructured":"Yu, S., Cui, L.: Secure multi-party computation in federated learning\u2019\u2019. In: Security and Privacy in Federated Learning, pp. 89\u201398. Springer, Cham (2022)"},{"key":"5188_CR36","first-page":"3","volume-title":"International Conference on Ad Hoc Networks","author":"O Ceviz","year":"2021","unstructured":"Ceviz, O., Sadioglu, P., Sen, S.: Analysis of routing attacks in fanets\u2019\u2019. In: International Conference on Ad Hoc Networks, pp. 3\u201317. Springer, Cham (2021)"},{"issue":"17","key":"5188_CR37","doi-asserted-by":"publisher","first-page":"e16","DOI":"10.4108\/eai.10-4-2018.155884","volume":"5","author":"IA Sumra","year":"2018","unstructured":"Sumra, I.A., Sellappan, P., Abdullah, A., Ali, A.: Security issues and challenges in manet-vanet-fanet: a survey. EAI Endorsed Trans. Energy Web 5(17), e16\u2013e16 (2018)","journal-title":"EAI Endorsed Trans. Energy Web"},{"key":"5188_CR38","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1109\/ACCESS.2021.3133850","volume":"9","author":"C Pu","year":"2021","unstructured":"Pu, C., Ahmed, I., Allen, E., Choo, K.-K.R.: A stochastic packet forwarding algorithm in flying ad hoc networks: design, analysis, and evaluation\u2019\u2019. IEEE Access 9, 614\u2013632 (2021)","journal-title":"IEEE Access"},{"issue":"10","key":"5188_CR39","doi-asserted-by":"publisher","first-page":"7110","DOI":"10.1109\/JIOT.2021.3074382","volume":"9","author":"X Wang","year":"2021","unstructured":"Wang, X., Garg, S., Lin, H., Hu, J., Kaddoum, G., Piran, M.J., Hossain, M.S.: Toward accurate anomaly detection in industrial internet of things using hierarchical federated learning. IEEE Internet Things J. 9(10), 7110\u20137119 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"16","key":"5188_CR40","first-page":"237","volume":"9","author":"X Wang","year":"2020","unstructured":"Wang, X., Garg, S., Lin, H., Kaddoum, G., Hu, J., Hossain, M.S.: A secure data aggregation strategy in edge computing and blockchain-empowered internet of things\u2019\u2019. IEEE Internet Things J. 9(16), 237\u2013246 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"5188_CR41","first-page":"2074","volume":"24","author":"X Wang","year":"2021","unstructured":"Wang, X., Garg, S., Lin, H., Kaddoum, G., Hu, J., Hassan, M.M.: Heterogeneous blockchain and ai-driven hierarchical trust evaluation for 5g-enabled intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. 24(2), 2074\u20132083 (2021)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"1","key":"5188_CR42","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s10586-024-04751-6","volume":"28","author":"N Baharvand","year":"2025","unstructured":"Baharvand, N., Shameli-Sendi, A.: Optimizing service function chaining and scheduling with deep q-learning for enhanced quality of experience in edge networks. Clust. Comput. 28(1), 27 (2025)","journal-title":"Clust. Comput."},{"key":"5188_CR43","unstructured":"Wang, J., Wang, Z., Zhu, D., Yang, S., Wang, J., Li, D.: \u201cReinforcement learning marine predators algorithm for global optimization,\u201d Cluster Computing, pp. 1\u201354, (2024)"},{"key":"5188_CR44","unstructured":"Gimelfarb, M., Sanner, S., Lee, C.-G.:\u201c$$\\{$$$$\\backslash$$epsilon$$\\}$$-bmc: A bayesian ensemble approach to epsilon-greedy exploration in model-free reinforcement learning,\u201d arXiv preprint[SPACE]arXiv:2007.00869, (2020)"},{"key":"5188_CR45","first-page":"436","volume":"34","author":"Y Fei","year":"2021","unstructured":"Fei, Y., Yang, Z., Chen, Y., Wang, Z.: Exponential bellman equation and improved regret bounds for risk-sensitive reinforcement learning. Adv. Neur. Inf. Process. Syst. 34, 436\u2013446 (2021)","journal-title":"Adv. Neur. Inf. Process. Syst."},{"key":"5188_CR46","doi-asserted-by":"crossref","unstructured":"Dener, M., Okur, C., Al, S., Orman, A.: \u201cWsn-bfsf: A new dataset for attacks detection in wireless sensor networks,\u201d IEEE Internet of Things Journal, (2023)","DOI":"10.1109\/JIOT.2023.3292209"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05188-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05188-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05188-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T19:07:58Z","timestamp":1757963278000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05188-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,23]]},"references-count":46,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5188"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05188-1","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,23]]},"assertion":[{"value":"14 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have not disclosed any competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"We state that the paper is original and was not published elsewhere.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"549"}}