{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T15:54:26Z","timestamp":1769356466088,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2018YFB0803403"],"award-info":[{"award-number":["2018YFB0803403"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s11277-022-10107-3","type":"journal-article","created":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T10:02:30Z","timestamp":1667296950000},"page":"475-500","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Security Issues and Solutions in Federate Learning Under IoT Critical Infrastructure"],"prefix":"10.1007","volume":"129","author":[{"given":"Nasir Ahmad","family":"Jalali","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8159-4984","authenticated-orcid":false,"given":"Hongsong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,1]]},"reference":[{"issue":"4","key":"10107_CR1","first-page":"74","volume":"22","author":"Z Safdar","year":"2017","unstructured":"Safdar, Z. (2017). A security model for iot based systems. Technical Journal, University of Engineering and Technology (UET) Taxila, Pakistan, 22(4), 74\u201384","journal-title":"Technical Journal, University of Engineering and Technology (UET) Taxila, Pakistan"},{"issue":"12","key":"10107_CR2","first-page":"1","volume":"10","author":"L Tawalbeh","year":"2020","unstructured":"Tawalbeh, L. (2020). IoT privacy and security: Challenges and solutions. International Journal for Applied Science, 10(12),1\u201317.","journal-title":"International Journal for Applied Science"},{"key":"10107_CR3","doi-asserted-by":"crossref","unstructured":"Khan, L. U., Saad, W., Han, Z., Hossain, E., &  Hong, C. S. (2021).  Federated Learning for Internet of Things: Recent Advances, Taxonomy, and Open Challenges. IEEE Communications Surveys & Tutorials, 23(3), 1759\u20131799.","DOI":"10.1109\/COMST.2021.3090430"},{"key":"10107_CR4","first-page":"619","volume":"115","author":"RM Parizi","year":"2020","unstructured":"Parizi, R. M., & Mothukuri, V. (2020). A survey on security and privacy of federated learning. Future Generation Computer System, 115, 619\u2013640.","journal-title":"Future Generation Computer System"},{"key":"10107_CR5","doi-asserted-by":"crossref","unstructured":"Hussain, F. (). Machine learning in IoT security: Current solutions and future challenges. IEEE Communications Surveys & Tutorials, 22(3), 1686\u20131721.","DOI":"10.1109\/COMST.2020.2986444"},{"issue":"1","key":"10107_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13748-012-0035-5","volume":"2","author":"D Peteiro-Barral","year":"2013","unstructured":"Peteiro-Barral, D., & Guijarro-Berdina, B. (2013). A survey of methods for distributed machine learning. Progress in Artificial Intelligence, 2(1), 1\u201311.","journal-title":"Progress in Artificial Intelligence"},{"key":"10107_CR7","doi-asserted-by":"publisher","first-page":"140699","DOI":"10.1109\/ACCESS.2020.3013541","volume":"8","author":"M Aledhari","year":"2020","unstructured":"Aledhari, M., & Parizi, R. M. (2020). Federated learning: A survey on enabling technologies, protocols, and applications. IEEE Access Multidisciplinary, 8, 140699\u2013140725.","journal-title":"IEEE Access Multidisciplinary"},{"issue":"15","key":"10107_CR8","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzoria","year":"2010","unstructured":"Atzoria, L., Ierab, A., & Morabito, G. (2010). The inernet of things: A survey. Computer Networks, 54(15), 2787\u20132805.","journal-title":"Computer Networks"},{"key":"10107_CR9","first-page":"464","volume":"7469","author":"S Balandin","year":"2012","unstructured":"Balandin, S., Andreev, S., & Koucheryavy, Y. (2012). Internet of things, smart spaces and next-generation networking. Springer, 7469, 464\u2013471.","journal-title":"Springer"},{"issue":"7","key":"10107_CR10","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of things (IoT): a vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645\u20131660.","journal-title":"Future Generation Computer Systems"},{"key":"10107_CR11","unstructured":"Wu, M., Lu, T.-J., Ling, F.-Y., Sun, J., Du, H.-Y. (2013) Research on the architecture of internet of things. In 3rd International conference on advanced computer theory and engineering ( ICACTE). IEEE."},{"issue":"15","key":"10107_CR12","first-page":"78","volume":"19","author":"E Fili\u010devs","year":"2016","unstructured":"Fili\u010devs, E., Kampars, J., & Aleksandrovics, V. (2016). Internet of things: Structure, feature, and management. Information Technology and Management Science, 19(15), 78\u201384.","journal-title":"Information Technology and Management Science"},{"issue":"1","key":"10107_CR13","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1109\/SURV.2013.042313.00197","volume":"16","author":"AZ Charith Perera","year":"2014","unstructured":"Charith Perera, A. Z. (2014). Context-aware computing for the internet of things: A survey. IEEE Communications Surveys and Tutorials, 16(1), 414\u2013454.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"10107_CR14","unstructured":"Maple, C., Hongmei, H. E. (2016) The security challenges in the iot enabled cyber-physical systems and opportunities for evolutionary computing and other computational intelligence. In IEEE congress on evolutionary computing (CEC) (pp. 1015\u20131021)."},{"key":"10107_CR15","doi-asserted-by":"publisher","first-page":"29","DOI":"10.4236\/ait.2014.43005","volume":"4","author":"S Tyagi","year":"2014","unstructured":"Tyagi, S., Darwish, A., & Khan, M. Y. (2014). Managing computing infrastructure for IoT data. Scientific Research publishing Advances in Internet of Things, 4, 29\u201335.","journal-title":"Scientific Research publishing Advances in Internet of Things"},{"key":"10107_CR16","doi-asserted-by":"crossref","unstructured":"Tawalbdh, L. (2017). Lightweight crypto and security. In Security and privacy in cyber-physical system: Foundation, principle and applications (pp. 243\u2013261). West Sussex, Wiley.","DOI":"10.1002\/9781119226079.ch12"},{"issue":"3","key":"10107_CR17","first-page":"1","volume":"53","author":"N Waheed","year":"2020","unstructured":"Waheed, N., He, X., Ikram, M., Usman, M., Hashmi, S. S., & Usman, M. (2020). Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures. ACM Comput Servey, 53(3), 1\u201335.","journal-title":"ACM Comput Servey"},{"issue":"8","key":"10107_CR18","first-page":"456","volume":"14","author":"I Ali","year":"2016","unstructured":"Ali, I., Sabir, S., & Ullah, Z. (2016). Internet of things security, device authentication and access control: A Review. International Journal of Computer Science and Information Security (IJCSIS), 14(8), 456\u2013466.","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"10107_CR19","unstructured":"Brendan McMahan, H., Moore, E., Ramage, D., Hampson, S., Arcas, B. A. (2017) Communication-efficient learning of deep networks from decentralized data. In Proceedings fo the 20th international conference on artificial intelligence and statistics, USA."},{"issue":"5","key":"10107_CR20","doi-asserted-by":"publisher","first-page":"3241","DOI":"10.1109\/TWC.2020.2971981","volume":"19","author":"SR Pandey","year":"2020","unstructured":"Pandey, S. R., Tran, N. H., Bennis, M., Tun, Y. K., Manzoor, A., & Hong, C. S. (2020). A Crowdsourcing framework for on-device federated learning. IEEE Transaction on Wireless Communication, 19(5), 3241\u20133256.","journal-title":"IEEE Transaction on Wireless Communication"},{"key":"10107_CR21","first-page":"14099","volume":"8","author":"M Aledhari","year":"2020","unstructured":"Aledhari, M., Razzak, R., Parizi, R. M., & Saeed, F. (2020). Federated learning: A survey on enabling technologies, protocols, and applications. IEEE Access Multidisciplinary Journal, 8, 14099\u201314725.","journal-title":"IEEE Access Multidisciplinary Journal"},{"issue":"3","key":"10107_CR22","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MCE.2019.2959108","volume":"9","author":"Z Li","year":"2020","unstructured":"Li, Z., Sharma, V., & Mohanty, S. P. (2020). Preserving data privacy via federated learning: Challenges and solutions. IEEE Consumer Electronics Magazin, 9(3), 8\u201316.","journal-title":"IEEE Consumer Electronics Magazin"},{"key":"10107_CR23","unstructured":"Yang, S., Ren, B., Zhou, X., Liu, L. (2019). Parallel distributed logistic regression for vertical federated learning without a third-party coordinator. ArXiv Preprint, 2019."},{"key":"10107_CR24","unstructured":"Abdulrahman, S., Tout, H., Ould-Slimane, H., Mourad, A., Talhi, C., Guizani, M. (). A survey on federated learning: the journey from centralized to distributed on-site learning and beyond. IEEE Internet of Things Journal, 0(0), 1\u201334."},{"issue":"2","key":"10107_CR25","first-page":"121","volume":"10","author":"YLTC Qiang Yang","year":"2019","unstructured":"Qiang Yang, Y. L. T. C. (2019). Federated machine learning: Concept and application. ACM Transactions on Intelligent System and Technology, 10(2), 121\u20131219.","journal-title":"ACM Transactions on Intelligent System and Technology"},{"key":"10107_CR26","unstructured":"Brendan McMahan, H., Moore, E., Ramage, D., Hampson, S., Arcas, B. A. (2017). Communication-efficient learning of deep networks from decentralized data. In Proceeding of the 20th international conference on artificial intelligence and statistics (AISTATS), Florida, USA."},{"key":"10107_CR27","doi-asserted-by":"crossref","unstructured":"Truex, S., Baracaldo, N., Anwar, A., Steinke, T., Ludwig, H., Zhang, R., Zhou, Y. (2019). A hybrid approach to privacy-preserving federated learning. Association for Computing Machinery (ACM).","DOI":"10.1145\/3338501.3357370"},{"key":"10107_CR28","doi-asserted-by":"crossref","unstructured":"Milad Nasr, R. S. A. H. (2019). Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning. In IEEE symposium on security and privacy (pp. 739\u2013753).","DOI":"10.1109\/SP.2019.00065"},{"key":"10107_CR29","unstructured":"Mao, J., Cao, C., Juan Wang, L., Ye, J., Zhong, W. (). Research on the security technology of federated learning privacy-preserving. In Journal of physics: Conference series, Haikou, China."},{"issue":"11","key":"10107_CR30","first-page":"868","volume":"4","author":"RL Rivest","year":"2012","unstructured":"Rivest, R. L., Adleman, L., & Dertouzos, M. L. (2012). On data banks and privacy homomorphisms. Advance in Cryptology-crypto, 4(11), 868\u2013886.","journal-title":"Advance in Cryptology-crypto"},{"key":"10107_CR31","unstructured":"David Evans, V. K. (). A pragmatic introduction to secure multi-party computation. Journal of Cryptology, Verlage, New York"},{"key":"10107_CR32","unstructured":"Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., Shmatikov, V. (). How to backdoor federated learning. In 23rd international conference on artificial intelligence and statistics (AISTATS), Palermo, Italy."},{"key":"10107_CR33","unstructured":"Truex, S., Liu, L., Gursoy, M. E., Yu, L., Wei, W., et al. (2019). Demystifying membership inference attacks in machine learning as a service. In IEEE transactions on services computing (pp. 1\u201317)."},{"issue":"5","key":"10107_CR34","first-page":"1","volume":"13","author":"X Zhou","year":"2021","unstructured":"Zhou, X., Ming, Xu., Yiming, Wu., & Zheng, N. (2021). Deep model poisoning attack on federated learning. Journal of Future Internet, 13(5), 1\u201314.","journal-title":"Journal of Future Internet"},{"key":"10107_CR35","doi-asserted-by":"crossref","unstructured":"Hongsong, C., Yongpeng, Z., Yongrui, C., et al. (2021). Security threats and defensive approaches in machine learning system under big data environment (p. 21). Springer.","DOI":"10.1007\/s11277-021-08284-8"},{"key":"10107_CR36","unstructured":"Brendan McMahan, H., Moore, E., Ramage, D., Hampson, S., Ag\u00fcera Arcas, B. (2017). Communication-efficient learning of deep networks from decentralized data. In 20th international conference on artificial intelligence and statistics (AISTATS), Florida, USA."},{"key":"10107_CR37","unstructured":"Ateniese, G., Perez-Cruz, F., Hitaj, B. (2017). Depp models under the GAN: information leakage from collaborative deep learning. In the 2017 ACM SIGSAC conference on computer and communications security, New York, USA."},{"key":"10107_CR38","unstructured":"Santos, B., et al. (). Improving cellular IoT security with identity federation and anomaly detection. In 5th international conference on computer and communication systems, Shanghai, China."},{"key":"10107_CR39","unstructured":"Liu, D., Miller, T., Sayeed, R., Mandl, K. D. (2018). FADL: federated-autonomous depp learning for distributed electronic health record. In Machine learning for health (ML4H), Boston, USA."},{"key":"10107_CR40","unstructured":"Kone\u010dn\u00fd, J., Brendan McMahan, H., Yu, F. X., Richt\u00e1rik, P., Theertha Suresh, A., Bacon, D. (2017). Federated learning: Strategies for improving communication efficiency. University of Edinburgh."},{"key":"10107_CR41","first-page":"1","volume":"21","author":"I Kholod","year":"2020","unstructured":"Kholod, I., Yanaki, E., Fomichev, D., Shalugin, E., Novikova, E., Filippov, E., & Nordlund, M. (2020). Open-source federated learning frameworks for IoT: A comparative review and analysis. MDPI, 21, 1.","journal-title":"MDPI"},{"key":"10107_CR42","unstructured":"Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., Brendan McMahan, H., Patel, S., Ramage, D., Segal, A., Seth, K. (2016). Practical secure aggregation for federated learning on user-held data. In 30th Conference on neural information processing system (NIPS 2016), Barcelona, Spain."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-10107-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-10107-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-10107-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,7]],"date-time":"2023-03-07T10:27:18Z","timestamp":1678184838000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-10107-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["10107"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-10107-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,1]]},"assertion":[{"value":"15 October 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 November 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Hereby I declare, this academic paper is my achievement and the result of an original investigation. I further state that this paper has not been previously submitted for any other academic degree. Authors can confirm that all relevant data are included in the article and we do not use any type of code. The manuscript has written by Nasir Ahmad Jalali and professor Chen Hongsong gives him necessary directs. As the authors declared, that they have no conflicts of interest to this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}