{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T17:01:47Z","timestamp":1774630907216,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-024-03104-9","type":"journal-article","created":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T15:03:36Z","timestamp":1722524616000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Enhanced Approach for Security and Privacy Preserving in IoT Devices with Federal Learning Technique"],"prefix":"10.1007","volume":"5","author":[{"given":"Syed Abdul","family":"Moeed","sequence":"first","affiliation":[]},{"given":"Ramesh","family":"Karnati","sequence":"additional","affiliation":[]},{"given":"G.","family":"Ashmitha","sequence":"additional","affiliation":[]},{"given":"Gouse Baig","family":"Mohammad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4939-0797","authenticated-orcid":false,"given":"Sachi Nandan","family":"Mohanty","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,1]]},"reference":[{"key":"3104_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.101015","volume":"25","author":"A Alamer","year":"2024","unstructured":"Alamer A. A privacy-preserving federated learning with a secure collaborative for malware detection models using Internet of Things resources. Internet of Things. 2024;25: 101015.","journal-title":"Internet of Things"},{"issue":"2","key":"3104_CR2","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12636","volume":"40","author":"YC Chen","year":"2024","unstructured":"Chen YC, Hsu SY, Xie X, Kumari S, Kumar S, Rodrigues J, Alzahrani BA. Privacy preserving support vector machine based on federated learning for distributed IoT-enabled data analysis. Comput Intell. 2024;40(2): e12636.","journal-title":"Comput Intell"},{"key":"3104_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103768","volume":"221","author":"R Wang","year":"2024","unstructured":"Wang R, Lai J, Li X, He D, Khan MK. RPIFL: Reliable and Privacy-Preserving Federated Learning for the Internet of Things. J Netw Comput Appl. 2024;221: 103768.","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"3104_CR4","doi-asserted-by":"publisher","first-page":"968","DOI":"10.3390\/s24030968","volume":"24","author":"TM Mengistu","year":"2024","unstructured":"Mengistu TM, Kim T, Lin JW. A survey on heterogeneity taxonomy, security and privacy preservation in the integration of IoT, wireless sensor networks and federated learning. Sensors. 2024;24(3):968.","journal-title":"Sensors"},{"key":"3104_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109139","volume":"116","author":"M Nobakht","year":"2024","unstructured":"Nobakht M, Javidan R, Pourebrahimi A. SIM-FED: Secure IoT malware detection model with federated learning. Comput Electr Eng. 2024;116: 109139.","journal-title":"Comput Electr Eng"},{"key":"3104_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119717","volume":"652","author":"H Batool","year":"2024","unstructured":"Batool H, Anjum A, Khan A, Izzo S, Mazzocca C, Jeon G. A secure and privacy preserved infrastructure for VANETs based on federated learning with local differential privacy. Inf Sci. 2024;652: 119717.","journal-title":"Inf Sci"},{"key":"3104_CR7","doi-asserted-by":"crossref","unstructured":"Bangare JL, Sable NP, Mahalle PN, Shinde G. Privacy-preserving machine learning on non-co-located datasets using federated learning: challenges and opportunities. In: WSN and IoT, 2024; 314\u2013335.","DOI":"10.1201\/9781003437079-14"},{"issue":"1","key":"3104_CR8","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8084","volume":"3","author":"Q Han","year":"2024","unstructured":"Han Q, Lu S, Wang W, Qu H, Li J, Gao Y. Privacy preserving and secure robust federated learning: a survey. Concurr Comput Pract Exp. 2024;3(1):e8084","journal-title":"Concurr Comput Pract Exp."},{"issue":"4","key":"3104_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3633808","volume":"7","author":"F Elhattab","year":"2024","unstructured":"Elhattab F, Bouchenak S, Boscher C. PASTEL: privacy-preserving federated learning in edge computing. Proc ACM Interact Mob Wearable Ubiquit Technol. 2024;7(4):1\u201329.","journal-title":"Proc ACM Interact Mob Wearable Ubiquit Technol"},{"issue":"1","key":"3104_CR10","first-page":"1","volume":"1","author":"BSP Thummisetti","year":"2024","unstructured":"Thummisetti BSP, Atluri H. Advancing healthcare informatics for empowering privacy and security through federated learning paradigms. Int J Sustain Dev Comput Sci. 2024;1(1):1\u201316.","journal-title":"Int J Sustain Dev Comput Sci"},{"key":"3104_CR11","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1899","volume":"10","author":"S Abbas","year":"2024","unstructured":"Abbas S, Alsubai S, Sampedro GA, Abisado M, Almadhor A, Kim TH. Privacy preserved and decentralized thermal comfort prediction model for smart buildings using federated learning. PeerJ Comput Sci. 2024;10: e1899.","journal-title":"PeerJ Comput Sci"},{"key":"3104_CR12","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.future.2024.03.016","volume":"156","author":"R Xiong","year":"2024","unstructured":"Xiong R, Ren W, Zhao S, He J, Ren Y, Choo KKR, Min G. CoPiFL: a collusion-resistant and privacy-preserving federated learning crowdsourcing scheme using blockchain and homomorphic encryption. Futur Gener Comput Syst. 2024;156:95\u2013104.","journal-title":"Futur Gener Comput Syst"},{"key":"3104_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2023.103720","volume":"86","author":"AK Nair","year":"2023","unstructured":"Nair AK, Sahoo J, Raj ED. Privacy preserving Federated Learning framework for IoMT based big data analysis using edge computing. Comput Stand Interfaces. 2023;86: 103720.","journal-title":"Comput Stand Interfaces"},{"key":"3104_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100781","volume":"22","author":"BB Sezer","year":"2023","unstructured":"Sezer BB, Turkmen H, Nuriyev U. PPFchain: A novel framework privacy-preserving blockchain-based federated learning method for sensor networks. Internet of Things. 2023;22: 100781.","journal-title":"Internet of Things"},{"issue":"5","key":"3104_CR15","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13103","volume":"40","author":"T Moulahi","year":"2023","unstructured":"Moulahi T, Jabbar R, Alabdulatif A, Abbas S, El Khediri S, Zidi S, Rizwan M. Privacy-preserving federated learning cyber-threat detection for intelligent transport systems with blockchain-based security. Expert Syst. 2023;40(5): e13103.","journal-title":"Expert Syst"},{"key":"3104_CR16","doi-asserted-by":"publisher","first-page":"17079","DOI":"10.1007\/s11227-023-05355-4","volume":"79","author":"B Shilpa","year":"2023","unstructured":"Shilpa B, Kumar PR, Jha RK. LoRa DL: a deep learning model for enhancing the data transmission over LoRa using autoencoder. Supercomput. 2023;79:17079\u201397.","journal-title":"Supercomput"},{"key":"3104_CR17","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.ins.2023.01.130","volume":"628","author":"L Wang","year":"2023","unstructured":"Wang L, Zhao X, Lu Z, Wang L, Zhang S. Enhancing privacy preservation and trustworthiness for decentralized federated learning. Inf Sci. 2023;628:449\u201368.","journal-title":"Inf Sci"},{"issue":"2","key":"3104_CR18","doi-asserted-by":"publisher","first-page":"400","DOI":"10.26599\/TST.2023.9010007","volume":"29","author":"NA Jalali","year":"2023","unstructured":"Jalali NA, Chen H. Federated learning security and privacy-preserving algorithm and experiments research under internet of things critical infrastructure. Tsinghua Sci Technol. 2023;29(2):400\u201314.","journal-title":"Tsinghua Sci Technol"},{"issue":"5","key":"3104_CR19","doi-asserted-by":"publisher","first-page":"3091","DOI":"10.3390\/app13053091","volume":"13","author":"R Ranjan","year":"2023","unstructured":"Ranjan R, Pandey D, Rai AK, Gupta D, Singh P, Kumar PR, Mohanty SN. A manifold-level hybrid deep learning approach for sentiment classification using an autoregressive model. Appl Sci. 2023;13(5):3091.","journal-title":"Appl Sci"},{"issue":"4","key":"3104_CR20","doi-asserted-by":"publisher","first-page":"3179","DOI":"10.1109\/JIOT.2021.3127886","volume":"10","author":"Z Wei","year":"2023","unstructured":"Wei Z, Pei Q, Zhang N, Liu X, Wu C, Taherkordi A. Lightweight federated learning for large-scale IoT devices with privacy guarantee. IEEE Internet Things J. 2023;10(4):3179\u201391.","journal-title":"IEEE Internet Things J"},{"key":"3104_CR21","first-page":"1","volume":"2022","author":"N Arivazhagan","year":"2022","unstructured":"Arivazhagan N, Somasundaram K, Mohammad GB, Kumar PR, et al. Cloud-Internet of Health Things (IOHT) task scheduling using hybrid moth flame optimization with deep neural network algorithm for E healthcare systems. Sci Programm. 2022;2022:1\u201312 (Article ID 4100352).","journal-title":"Sci Programm"},{"key":"3104_CR22","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1109\/TIFS.2022.3221899","volume":"18","author":"Z Zhang","year":"2023","unstructured":"Zhang Z, Wu L, Ma C, Li J, Wang J, Wang Q, et al. LSFL: a lightweight and secure federated learning scheme for edge computing. IEEE Trans Inf Forensic Secur. 2023;18:365\u201379.","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"3104_CR23","doi-asserted-by":"publisher","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","volume":"15","author":"G Xu","year":"2020","unstructured":"Xu G, Li H, Liu S, Yang K, Lin X. VerifyNet: secure and verifiable federated learning. IEEE Trans Inf Forensic Secur. 2020;15:911\u201326.","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"3104_CR24","doi-asserted-by":"publisher","first-page":"1736","DOI":"10.1109\/TIFS.2020.3043139","volume":"16","author":"X Guo","year":"2021","unstructured":"Guo X, Liu Z, Li J, Gao J, Hou B, Dong C, et al. VeriFL: communication-efficient and fast verifiable aggregation for federated learning. IEEE Trans Inf Forensic Secur. 2021;16:1736\u201351.","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"1","key":"3104_CR25","first-page":"513","volume":"14","author":"GB Mohammad","year":"2021","unstructured":"Mohammad GB, Shitharth S, Kumar PR. Integrated machine learning model for an URL phishing detection. Int J Grid Distrib Comput. 2021;14(1):513\u201329.","journal-title":"Int J Grid Distrib Comput"},{"issue":"5","key":"3104_CR26","doi-asserted-by":"publisher","first-page":"4641","DOI":"10.1109\/JIOT.2020.2964162","volume":"7","author":"S Savazzi","year":"2020","unstructured":"Savazzi S, Nicoli M, Rampa V. Federated learning with cooperating devices: a consensus approach for massive IoT networks. IEEE Internet Things J. 2020;7(5):4641\u201354.","journal-title":"IEEE Internet Things J"},{"key":"3104_CR27","doi-asserted-by":"crossref","unstructured":"Wu X, Hu Z, Pei J, Huang H. Serverless federated auprc optimization for multi-party collaborative imbalanced data mining. In: Proceedings of the 29th ACM SIGKDD Conf. Knowl. Discovery and Data Mining, 2023; pp. 2648\u20132659.","DOI":"10.1145\/3580305.3599499"},{"issue":"3","key":"3104_CR28","doi-asserted-by":"publisher","first-page":"2134","DOI":"10.1109\/TII.2019.2942179","volume":"16","author":"Y Lu","year":"2020","unstructured":"Lu Y, Huang X, Dai Y, Maharjan S, Zhang Y. Differentially private asynchronous federated learning for mobile edge computing in urban informatics. IEEE Trans Ind Inform. 2020;16(3):2134\u201343.","journal-title":"IEEE Trans Ind Inform"},{"issue":"10","key":"3104_CR29","first-page":"40","volume":"5","author":"PR Kumar","year":"2018","unstructured":"Kumar PR. Wireless mobile charger using inductive coupling. J Emerg Technol Innov Res (JETIR). 2018;5(10):40\u20134.","journal-title":"J Emerg Technol Innov Res (JETIR)"},{"key":"3104_CR30","doi-asserted-by":"crossref","unstructured":"Shilpa B, Kumar PR, Jha RK. Spreading factor optimization for interference mitigation in dense indoor LoRa networks. In: IEEE IAS Global Conference on emerging technologies (GlobConET), 2023; pp. 1\u20135.","DOI":"10.1109\/GlobConET56651.2023.10149925"},{"issue":"11","key":"3104_CR31","doi-asserted-by":"publisher","first-page":"7843","DOI":"10.1109\/TII.2021.3126883","volume":"18","author":"P Singh","year":"2022","unstructured":"Singh P, Masud M, Hossain MS, Kaur A, Muhammad G, Ghoneim A. Privacy-preserving serverless computing using federated learning for smart grids. IEEE Trans Ind Inform. 2022;18(11):7843\u201352.","journal-title":"IEEE Trans Ind Inform"},{"key":"3104_CR32","doi-asserted-by":"crossref","unstructured":"Zhong L, Zhang L, Xu L, Wang L. MPC-based privacy- preserving serverless federated learning. In: 3rd Int. Conf. Big Data, Artif. Intell. Int. Things Eng. (ICBAIE), Xian, China, 2022; pp. 493\u2013497.","DOI":"10.1109\/ICBAIE56435.2022.9985933"},{"issue":"4","key":"3104_CR33","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TDSC.2015.2413415","volume":"13","author":"A Castiglione","year":"2016","unstructured":"Castiglione A, De Santis A, Masucci B. Key indistinguishability versus strong key indistinguishability for hierarchical key assignment schemes. IEEE Trans Depend Secur Comput. 2016;13(4):451\u201360.","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"3104_CR34","doi-asserted-by":"crossref","unstructured":"Cohn-Gordon K, Cremers C, Garratt L. On post-compromise security. In: IEEE 29th Comput. Secur. Foundations Symp. (CSF), Lisbon, Portugal, 2016; pp. 164\u2013178.","DOI":"10.1109\/CSF.2016.19"},{"key":"3104_CR35","doi-asserted-by":"crossref","unstructured":"Kumar PR. Position control of a stepper motor using LabVIEW. In: 3rd International Conference on recent trends in electronics, information communication technology (RTEICT), pp. 15511554, May 2018.","DOI":"10.1109\/RTEICT42901.2018.9012597"},{"key":"3104_CR36","doi-asserted-by":"crossref","unstructured":"Blum M, Micali S. How to generate cryptographically strong sequences of pseudo random bits. In: Providing sound foundations for cryptography: on the Work of Shafi Goldwasser and Silvio Micali, 2019.","DOI":"10.1145\/3335741.3335751"},{"key":"3104_CR37","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1201\/9781003401841-5","volume-title":"Reconnoitering the landscape of edge intelligence in healthcare","author":"PR Kumar","year":"2024","unstructured":"Kumar PR, Shilpa B. An IoT-based smart healthcare system with edge intelligence computing. Reconnoitering the landscape of edge intelligence in healthcare. CRC Press; 2024. p. 31\u201346."},{"issue":"1","key":"3104_CR38","first-page":"277","volume":"2","author":"Y Lindell","year":"2017","unstructured":"Lindell Y. How to simulate it\u2013a tutorial on the simulation proof technique. In: Tutorials on the foundations of cryptography vol 2, issue 2, 2017; pp. 277\u2013346.","journal-title":"In: Tutorials on the foundations of cryptography"},{"key":"3104_CR39","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/j.procs.2022.12.227","volume":"217","author":"M Khan","year":"2023","unstructured":"Khan M, Glavin FG, Nickles M. Federated learning as a privacy solution-an overview. Proc Comput Sci. 2023;217:316\u201325.","journal-title":"Proc Comput Sci"},{"issue":"1","key":"3104_CR40","doi-asserted-by":"publisher","first-page":"27","DOI":"10.61552\/JEMIT.2023.01.004","volume":"1","author":"M Sakthivel","year":"2023","unstructured":"Sakthivel M, Buvisa D, Gokula Vani B, Jeyapriya M, Nithya Sri R. Food products defilement analyzer using IoT. J Eng Manag Inform Technol. 2023;1(1):27\u201331. https:\/\/doi.org\/10.61552\/JEMIT.2023.01.004.","journal-title":"J Eng Manag Inform Technol"},{"issue":"3","key":"3104_CR41","doi-asserted-by":"publisher","first-page":"163","DOI":"10.61552\/JEMIT.2025.03.006","volume":"3","author":"S Patil","year":"2024","unstructured":"Patil S, Jawale A, Korade A, Dhandar Y. Data acquisition system for iot frameworks with monitor and control using saas technology. J Eng Manag Inform Technol. 2024;3(3):163\u20138. https:\/\/doi.org\/10.61552\/JEMIT.2025.03.006.","journal-title":"J Eng Manag Inform Technol"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03104-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-024-03104-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-024-03104-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T15:23:06Z","timestamp":1722525786000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-024-03104-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,1]]},"references-count":41,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2024,8]]}},"alternative-id":["3104"],"URL":"https:\/\/doi.org\/10.1007\/s42979-024-03104-9","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8,1]]},"assertion":[{"value":"23 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no competing of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"In this research no human involving.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research Involving Human and \/or Animals"}},{"value":"All authors are informed.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}}],"article-number":"750"}}