{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,20]],"date-time":"2026-05-20T01:56:50Z","timestamp":1779242210203,"version":"3.51.4"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T00:00:00Z","timestamp":1754611200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T00:00:00Z","timestamp":1754611200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100007414","name":"Qassim University","doi-asserted-by":"publisher","award":["QU-APC-2025"],"award-info":[{"award-number":["QU-APC-2025"]}],"id":[{"id":"10.13039\/501100007414","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The Industrial Internet of Things (IIoT)continues to redefine industrial automation through connected smart devices, yet it remains highly vulnerable to privacy breaches and malicious intrusions. This research introduces ML-DCPP, a Machine Learning-based Dynamic Clustering and Privacy Preservation framework tailored to safeguard IIoT ecosystems. By integrating adaptive clustering via the LEACH protocol, secure key distribution through Public Key Generators (PKGs), and private data aggregation using the Location Privacy Tree (LPT) and Chinese Remainder Theorem (CRT), the framework addresses both communication efficiency and data confidentiality. To enhance security at the edge, differential privacy with Laplace noise is incorporated, and a Random Forest model is employed to detect malicious behavior with 99.89% accuracy, validated by a highly significant t-test (\u20137.87, p\u2009&lt;\u20090.0001). Experimental results reveal notable system improvements, including a reduction in latency to 0.45\u00a0s, an increase in throughput to 280 tps, and an optimized cluster convergence time of 4.91\u00a0s. ML-DCPP not only reinforces privacy and security measures but also demonstrates scalability and low overhead, making it a practical and forward-looking solution for securing industrial IoT infrastructures.<\/jats:p>","DOI":"10.1007\/s10791-025-09689-w","type":"journal-article","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T08:19:32Z","timestamp":1754641172000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Machine learning: enhanced dynamic clustering for privacy preservation and malicious node detection in industrial internet of things"],"prefix":"10.1007","volume":"28","author":[{"given":"Nabeela","family":"Hasan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Saima","family":"Saleem","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mudassir","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Abdulatif","family":"Alabdultif","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mohammad Mazhar","family":"Nezami","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mansaf","family":"Alam","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,8,8]]},"reference":[{"issue":"8","key":"9689_CR1","doi-asserted-by":"publisher","first-page":"3628","DOI":"10.1109\/TII.2017.2773646","volume":"14","author":"C Yin","year":"2017","unstructured":"Yin C, Xi J, Sun R, Wang J. Location privacy protection based on differential privacy strategy for big data in the industrial internet of things. IEEE Trans Ind Inform. 2017;14(8):3628\u201336.","journal-title":"IEEE Trans Ind Inform"},{"issue":"1","key":"9689_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.dcan.2019.07.001","volume":"6","author":"W Qin","year":"2020","unstructured":"Qin W, Chen S, Peng M. Recent advances in industrial internet: insights and challenges. Digit Commun Networks. 2020;6(1):1\u201313.","journal-title":"Digit Commun Networks"},{"key":"9689_CR3","doi-asserted-by":"publisher","first-page":"152351","DOI":"10.1109\/ACCESS.2020.3016937","volume":"8","author":"T Gebremichael","year":"2020","unstructured":"Gebremichael T, Ledwaba LPI, Eldefrawy MH, Hancke GP, Pereira N, Gidlund M, Akerberg J. Security and privacy in the industrial internet of things: current standards and future challenges. IEEE Access. 2020;8:152351\u201366.","journal-title":"IEEE Access"},{"issue":"19","key":"9689_CR4","doi-asserted-by":"publisher","DOI":"10.3390\/s21196647","volume":"21","author":"SF Tan","year":"2021","unstructured":"Tan SF, Samsudin A. Recent technologies, security countermeasures and ongoing challenges of Industrial Internet of Things (IIoT): a survey. Sensors (Basel). 2021;21(19): 6647.","journal-title":"Sensors (Basel)"},{"issue":"8","key":"9689_CR5","doi-asserted-by":"publisher","DOI":"10.3390\/a16080378","volume":"16","author":"V Demertzi","year":"2023","unstructured":"Demertzi V, Demertzis S, Demertzis K. An overview of privacy dimensions on the Industrial Internet of Things (IIoT). Algorithms. 2023;16(8): 378.","journal-title":"Algorithms"},{"key":"9689_CR6","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.future.2019.04.020","volume":"99","author":"MH ur Rehman","year":"2019","unstructured":"ur Rehman MH, Yaqoob I, Salah K, Imran M, Jayaraman PP, Perera C. The role of big data analytics in industrial Internet of Things. Fut Gener Comput Syst. 2019;99:247\u201359.","journal-title":"Fut Gener Comput Syst"},{"issue":"1","key":"9689_CR7","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1093\/icc\/dtaa060","volume":"30","author":"A Martinelli","year":"2021","unstructured":"Martinelli A, Mina A, Moggi M. The enabling technologies of industry 4.0: examining the seeds of the fourth industrial revolution. Ind Corp Change. 2021;30(1):161\u201388.","journal-title":"Ind Corp Change"},{"key":"9689_CR8","doi-asserted-by":"crossref","unstructured":"Abikoye OC, Bajeh AO, Awotunde JB, Ameen AO, Mojeed HA, Abdulraheem M, Oladipo ID, Salihu SA. Application of Internet of Things and cyber-physical systems in Industry 4.0 smart manufacturing. In\u00a0Emergence of Cyber Physical System and IoT in Smart Automation and Robotics: Computer Engineering in Automation, pp. 203\u2013217. Cham: Springer International Publishing, 2021.","DOI":"10.1007\/978-3-030-66222-6_14"},{"issue":"3","key":"9689_CR9","doi-asserted-by":"publisher","DOI":"10.3390\/s23031252","volume":"23","author":"E Rodr\u00edguez","year":"2023","unstructured":"Rodr\u00edguez E, Otero B, Canal R. A survey of machine and deep learning methods for privacy protection in the internet of things. Sensors (Basel). 2023;23(3): 1252.","journal-title":"Sensors (Basel)"},{"key":"9689_CR10","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.jmsy.2020.11.017","volume":"58","author":"DG Pivoto","year":"2021","unstructured":"Pivoto DG, De Almeida LF, da Rosa Righi R, Rodrigues JJ, Lugli AB, Alberti AM. Cyber-physical systems architectures for industrial Internet of things applications in Industry 4.0: a literature review. J Manuf Syst. 2021;58:176\u201392.","journal-title":"J Manuf Syst"},{"issue":"5","key":"9689_CR11","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/s42979-023-01820-2","volume":"4","author":"AJP Lazar","year":"2023","unstructured":"Lazar AJP, Soundararaj S, Sonthi VK, Palanisamy VR, Subramaniyan V, Sengan S. Gaussian differential privacy integrated machine learning model for Industrial Internet of Things. SN Comput Sci. 2023;4(5):454.","journal-title":"SN Comput Sci"},{"key":"9689_CR12","doi-asserted-by":"crossref","unstructured":"Ghaffari A, Jelodari N, Pouralish S, Derakhshanfard N, Arasteh B. Securing the Internet of Things using machine and deep learning methods: a survey.\u00a0Cluster Comput. 2024: 1\u201325.","DOI":"10.1007\/s10586-024-04509-0"},{"key":"9689_CR13","doi-asserted-by":"crossref","unstructured":"Ullah I, Adhikari D, Su X, Palmieri F, Wu C, Choi C. Integration of data science with the intelligent IoT (IIoT): current challenges and future perspectives.\u00a0Dig Commun Netw. 2024.","DOI":"10.1016\/j.dcan.2024.02.007"},{"issue":"1","key":"9689_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-024-00951-8","volume":"24","author":"SM Abdullahi","year":"2025","unstructured":"Abdullahi SM, Lazarova-Molnar S. On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances. Int J Inf Secur. 2025;24(1): 53.","journal-title":"Int J Inf Secur"},{"key":"9689_CR15","doi-asserted-by":"crossref","unstructured":"Cheng PC, Eykholt K, Gu Z, Jamjoom H, Jayaram KR, Valdez E, Verma A. DeTA: minimizing data leaks in federated learning via decentralized and trustworthy aggregation. In\u00a0Proceedings of the Nineteenth European Conference on Computer Systems, 2024; pp. 219\u2013235.","DOI":"10.1145\/3627703.3650082"},{"issue":"8","key":"9689_CR16","doi-asserted-by":"publisher","first-page":"6769","DOI":"10.1109\/JIOT.2022.3147186","volume":"10","author":"Z Rahman","year":"2022","unstructured":"Rahman Z, Yi X, Khalil I. Blockchain-based AI-enabled Industry 4.0 CPS protection against advanced persistent threat. IEEE Internet Things J. 2022;10(8):6769\u201378.","journal-title":"IEEE Internet Things J"},{"key":"9689_CR17","unstructured":"Jebreel, Najeeb Moharram, Josep Domingo-Ferrer, Alberto Blanco-Justicia, and David S\u00e1nchez. \"Enhanced security and privacy via fragmented federated learning.\"\u00a0IEEE Transactions on Neural Networks and Learning Systems\u00a0(2022)."},{"issue":"1","key":"9689_CR18","doi-asserted-by":"publisher","first-page":"157","DOI":"10.3390\/electronics11010157","volume":"11","author":"ND Kathamuthu","year":"2022","unstructured":"Kathamuthu ND, Chinnamuthu A, Iruthayanathan N, Ramachandran M, Gandomi AH. Deep Q-learning-based neural network with privacy preservation method for secure data transmission in Internet of Things (IoT) healthcare application. Electronics. 2022;11(1):157.","journal-title":"Electronics"},{"issue":"9","key":"9689_CR19","doi-asserted-by":"publisher","first-page":"4641","DOI":"10.3390\/app12094641","volume":"12","author":"H Mrabet","year":"2022","unstructured":"Mrabet H, Alhomoud A, Jemai A, Trentesaux D. A secured industrial internet-of-things architecture based on blockchain technology and machine learning for sensor access control systems in smart manufacturing. Appl Sci. 2022;12(9):4641.","journal-title":"Appl Sci"},{"key":"9689_CR20","unstructured":"Olaoye G.\u00a0Privacy-preserving machine learning models for Industrial IoT Devices. No. 13620. EasyChair, 2024."},{"issue":"no. 9","key":"9689_CR21","doi-asserted-by":"publisher","first-page":"6092","DOI":"10.1109\/TII.2020.2974555","volume":"16","author":"PCM Arachchige","year":"2020","unstructured":"Arachchige PCM, Bertok P, Khalil I, Liu D, Camtepe S, Atiquzzaman M. A trustworthy privacy-preserving framework for machine learning in industrial IoT systems. IEEE Trans Ind Inform. 2020;16(9):6092\u2013102.","journal-title":"IEEE Trans Ind Inform"},{"issue":"1","key":"9689_CR22","doi-asserted-by":"publisher","first-page":"16","DOI":"10.33545\/27076571.2023.v4.i1a.60","volume":"4","author":"JP Bharadiya","year":"2023","unstructured":"Bharadiya JP. The role of machine learning in transforming business intelligence. Int J Comput Artif Intell. 2023;4(1):16\u201324.","journal-title":"Int J Comput Artif Intell"},{"key":"9689_CR23","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.aej.2023.09.023","volume":"81","author":"S Soliman","year":"2023","unstructured":"Soliman S, Oudah W, Aljuhani A. Deep learning-based intrusion detection approach for securing industrial internet of things. Alexandria Eng J. 2023;81:371\u201383.","journal-title":"Alexandria Eng J"},{"issue":"21","key":"9689_CR24","doi-asserted-by":"publisher","first-page":"21958","DOI":"10.1109\/JIOT.2022.3181665","volume":"9","author":"Y Chen","year":"2022","unstructured":"Chen Y, He S, Wang B, Duan Pu, Zhang B, Hong Z, Ping Y. Cryptanalysis and improvement of DeepPAR: privacy-preserving and asynchronous deep learning for industrial IoT. IEEE Internet Things J. 2022;9(21):21958\u201370.","journal-title":"IEEE Internet Things J"},{"key":"9689_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.sintl.2021.100129","volume":"2","author":"M Javaid","year":"2021","unstructured":"Javaid M, Haleem A, Singh RP, Rab S, Suman R. Upgrading the manufacturing sector via applications of Industrial Internet of Things (IIoT). Sensors Int. 2021;2: 100129.","journal-title":"Sensors Int"},{"issue":"1","key":"9689_CR26","doi-asserted-by":"publisher","first-page":"32","DOI":"10.3390\/fi16010032","volume":"16","author":"H Khazane","year":"2024","unstructured":"Khazane H, Ridouani M, Salahdine F, Kaabouch N. A holistic review of machine learning adversarial attacks in IoT networks. Future Internet. 2024;16(1):32.","journal-title":"Future Internet"},{"issue":"4","key":"9689_CR27","doi-asserted-by":"publisher","first-page":"6822","DOI":"10.1109\/JIOT.2019.2912022","volume":"6","author":"M Zolanvari","year":"2019","unstructured":"Zolanvari M, Teixeira MA, Gupta L, Khan KM, Jain R. Machine learning-based network vulnerability analysis of industrial internet of things. IEEE Internet Things J. 2019;6(4):6822\u201334.","journal-title":"IEEE Internet Things J"},{"key":"9689_CR28","doi-asserted-by":"publisher","first-page":"1402745","DOI":"10.3389\/fdata.2024.1402745","volume":"7","author":"P Radanliev","year":"2024","unstructured":"Radanliev P, De Roure D, Maple C, Nurse JRC, Nicolescu R, Ani U. AI security and cyber risk in IoT systems. Front Big Data. 2024;7:1402745.","journal-title":"Front Big Data."},{"issue":"13","key":"9689_CR29","doi-asserted-by":"publisher","first-page":"10430","DOI":"10.1109\/JIOT.2021.3057419","volume":"8","author":"B Jiang","year":"2021","unstructured":"Jiang B, Li J, Yue G, Song H. Differential privacy for industrial internet of things: opportunities, applications, and challenges. IEEE Internet Things J. 2021;8(13):10430\u201351.","journal-title":"IEEE Internet Things J"},{"key":"9689_CR30","doi-asserted-by":"crossref","unstructured":"Chalapathi GS, Chamola V, Vaish A, Buyya R. Industrial Internet of Things (iiot) applications of edge and fog computing: a review and future directions.\u00a0Fog\/edge computing for security, privacy, and applications.\u00a02021: 293\u2013325.","DOI":"10.1007\/978-3-030-57328-7_12"},{"issue":"9","key":"9689_CR31","doi-asserted-by":"publisher","first-page":"121","DOI":"10.3390\/bdcc8090121","volume":"8","author":"SO Ajakwe","year":"2024","unstructured":"Ajakwe SO, Saviour II, Ihekoronye VU, Nwankwo OU, Dini MA, Uchechi IU, Kim DS, Lee JM. Medical IoT Record Security and Blockchain: Systematic Review of Milieu, Milestones, and Momentum. Big Data Cogn Comput. 2024;8(9):121.","journal-title":"Big Data Cogn Comput"},{"issue":"18","key":"9689_CR32","doi-asserted-by":"publisher","first-page":"17089","DOI":"10.1109\/JIOT.2021.3128531","volume":"9","author":"C Huang","year":"2021","unstructured":"Huang C, Chen S, Zhang Y, Zhou W, Rodrigues JJ, De Albuquerque VH. A robust approach for privacy data protection: IoT security assurance using generative adversarial imitation learning. IEEE Internet of Things J. 2021;9(18):17089\u201397.","journal-title":"IEEE Internet of Things J"},{"key":"9689_CR33","doi-asserted-by":"crossref","unstructured":"Sivaranjani R, Muralidhara Rao P, Saraswathi P. ECC-based privacy-preserving mechanisms using deep learning for industrial IoT: a State-of-the-Art approaches. In Deep Learning for Internet of Things Infrastructure, pp. 25\u201359. CRC Press, 2021.","DOI":"10.1201\/9781003032175-2"},{"issue":"1","key":"9689_CR34","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MIE.2017.2648857","volume":"11","author":"AW Colombo","year":"2017","unstructured":"Colombo AW, Karnouskos S, Kaynak O, Shi Y, Yin S. Industrial cyberphysical systems: a backbone of the fourth industrial revolution. IEEE Ind Electron Mag. 2017;11(1):6\u201316.","journal-title":"IEEE Ind Electron Mag"},{"issue":"13","key":"9689_CR35","doi-asserted-by":"publisher","DOI":"10.3390\/app12136395","volume":"12","author":"I Ogrezeanu","year":"2022","unstructured":"Ogrezeanu I, Vizitiu A, Ciu\u0219del C, Puiu A, Coman S, Boldi\u0219or C, Itu A, et al. Privacy-preserving and explainable AI in industrial applications. Appl Sci. 2022;12(13): 6395.","journal-title":"Appl Sci"},{"key":"9689_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100891","volume":"29","author":"AK Pandey","year":"2023","unstructured":"Pandey AK, Saxena R, Awasthi A, Sunil MP. Privacy-preserved data sharing using blockchain and support vector machine for industrial IOT applications. Meas Sensors. 2023;29: 100891.","journal-title":"Meas Sensors"},{"issue":"1","key":"9689_CR37","doi-asserted-by":"publisher","first-page":"213","DOI":"10.3390\/s25010213","volume":"25","author":"T Zhukabayeva","year":"2025","unstructured":"Zhukabayeva T, Zholshiyeva L, Karabayev N, Khan S, Alnazzawi N. Cybersecurity solutions for industrial internet of things-edge computing integration: challenges, threats, and future directions. Sensors (Basel). 2025;25(1):213.","journal-title":"Sensors (Basel)"},{"key":"9689_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-025-02544-w","author":"Q Gulzar","year":"2025","unstructured":"Gulzar Q, Mustafa K. Enhancing network security in industrial IoT environments: a DeepCLG hybrid learning model for cyberattack detection. Int J Mach Learn Cybern. 2025. https:\/\/doi.org\/10.1007\/s13042-025-02544-w.","journal-title":"Int J Mach Learn Cybern"},{"key":"9689_CR39","doi-asserted-by":"crossref","unstructured":"Islam U, Alatawi MN, Alamro S, Alwageed HS, Ullah H, Khan N. SecureGuard-IIoMT: A Novel Adaptive Physical Security Framework for Enhancing Industrial Internet of Medical Things (IIoMT) Device Hardening.\u00a0Internet of Things.\u00a02025: 101653.","DOI":"10.1016\/j.iot.2025.101653"},{"issue":"10","key":"9689_CR40","doi-asserted-by":"publisher","first-page":"4109","DOI":"10.3390\/app14104109","volume":"14","author":"AA Wardana","year":"2024","unstructured":"Wardana AA, Ko\u0142aczek G, Sukarno P. Lightweight, trust-managing, and privacy-preserving collaborative intrusion detection for internet of things. Appl Sci. 2024;14(10):4109.","journal-title":"Appl Sci"},{"key":"9689_CR41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3449630","author":"AH Farea","year":"2024","unstructured":"Farea AH, Alhazmi OH, Samet R, Guzel MS. AI-powered integrated with encoding mechanism enhancing privacy, security, and performance for IoT ecosystem. IEEE Access. 2024. https:\/\/doi.org\/10.1109\/ACCESS.2024.3449630.","journal-title":"IEEE Access"},{"key":"9689_CR42","doi-asserted-by":"publisher","first-page":"112189","DOI":"10.1109\/ACCESS.2023.3318866","volume":"11","author":"S Abbas","year":"2023","unstructured":"Abbas S, Al Hejaili A, Sampedro GA, Abisado M, Almadhor AS, Shahzad T, Ouahada K. A novel federated edge learning approach for detecting cyberattacks in IoT infrastructures. IEEE Access. 2023;11:112189\u201398.","journal-title":"IEEE Access"},{"key":"9689_CR43","doi-asserted-by":"crossref","unstructured":"Ren H, Anicic D, Runkler TA. The synergy of complex event processing and tiny machine learning in industrial IoT. In\u00a0Proceedings of the 15th ACM International Conference on Distributed and Event-based Systems, pp. 126\u2013135. 2021","DOI":"10.1145\/3465480.3466928"},{"issue":"4","key":"9689_CR44","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MWC.301.2000478","volume":"28","author":"H Zhou","year":"2021","unstructured":"Zhou H, She C, Deng Y, Dohler M, Nallanathan A. Machine learning for massive industrial Internet of Things. IEEE Wirel Commun. 2021;28(4):81\u20137.","journal-title":"IEEE Wirel Commun"},{"key":"9689_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108004","volume":"191","author":"Y Wu","year":"2021","unstructured":"Wu Y, Wang Z, Ma Y, Leung VCM. Deep reinforcement learning for blockchain in industrial IoT: a survey. Comput Networks. 2021;191: 108004.","journal-title":"Comput Networks"},{"key":"9689_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102685","volume":"123","author":"P Sharma","year":"2021","unstructured":"Sharma P, Jain S, Gupta S, Chamola V. Role of machine learning and deep learning in securing 5G-driven industrial IoT applications. Ad Hoc Netw. 2021;123: 102685.","journal-title":"Ad Hoc Netw"},{"issue":"4","key":"9689_CR47","doi-asserted-by":"publisher","first-page":"2943","DOI":"10.1109\/JIOT.2020.3022323","volume":"8","author":"B Qolomany","year":"2020","unstructured":"Qolomany B, Mohammed I, Al-Fuqaha A, Guizani M, Qadir J. Trust-based cloud machine learning model selection for industrial IoT and smart city services. IEEE Internet Things J. 2020;8(4):2943\u201358.","journal-title":"IEEE Internet Things J"},{"key":"9689_CR48","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.procs.2020.03.127","volume":"170","author":"AI Khan","year":"2020","unstructured":"Khan AI, Al-Badi A. Open-source machine learning frameworks for the industrial internet of things. Proc Comput Sci. 2020;170:571\u20137.","journal-title":"Proc Comput Sci"},{"issue":"6","key":"9689_CR49","doi-asserted-by":"publisher","first-page":"4177","DOI":"10.1109\/TII.2019.2942190","volume":"16","author":"Y Lu","year":"2019","unstructured":"Lu Y, Huang X, Dai Y, Maharjan S, Zhang Y. Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans Ind Inform. 2019;16(6):4177\u201386.","journal-title":"IEEE Trans Ind Inform"},{"issue":"1","key":"9689_CR50","first-page":"3872214","volume":"2022","author":"Y Zhao","year":"2022","unstructured":"Zhao Y, Akter F. [Retracted] Adaptive clustering algorithm for IIoT based mobile opportunistic networks. Secur Commun Netw. 2022;2022(1):3872214.","journal-title":"Secur Commun Netw"},{"issue":"3","key":"9689_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3178582","volume":"51","author":"PAA Resende","year":"2018","unstructured":"Resende PAA, Costa Drummond A. A survey of random forest-based methods for intrusion detection systems. ACM Comput Surv (CSUR). 2018;51(3):1\u201336.","journal-title":"ACM Comput Surv (CSUR)"},{"key":"9689_CR52","doi-asserted-by":"publisher","first-page":"142","DOI":"10.37394\/23204.2023.22.14","volume":"22","author":"AD Oluwashola","year":"2023","unstructured":"Oluwashola AD, Azeez BA. Effect of energy-efficient routing for packet splitting using chinese remainder theorem (CRT) for wireless sensor networks (WSNS). WSEAS Trans Commun. 2023;22:142\u201351.","journal-title":"WSEAS Trans Commun"},{"key":"9689_CR53","doi-asserted-by":"crossref","unstructured":"Vidhya S, Kalaivani V. Secured health data transmission using lagrange interpolation and artificial neural network.\u00a0Comput Syst Sci Eng. 2023;46(1).","DOI":"10.32604\/csse.2023.027724"},{"key":"9689_CR54","unstructured":"https:\/\/www.kaggle.com\/datasets\/akashdogra\/cic-iot-2023."},{"key":"9689_CR55","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.3390\/s23135941","volume":"23","author":"ECP Neto","year":"2023","unstructured":"Neto ECP, Dadkhah S, Ferreira R, Zohourian A, Lu R, Ghorbani AA. CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors (Basel). 2023;23:5941.","journal-title":"Sensors (Basel)"}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09689-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09689-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09689-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T20:08:11Z","timestamp":1757362091000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09689-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,8]]},"references-count":55,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9689"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09689-w","relation":{},"ISSN":["2948-2992"],"issn-type":[{"value":"2948-2992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,8]]},"assertion":[{"value":"3 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"166"}}