{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T17:41:27Z","timestamp":1768585287495,"version":"3.49.0"},"reference-count":84,"publisher":"Association for Computing Machinery (ACM)","issue":"1","funder":[{"name":"University of Castilla-La Mancha through the predoctoral","award":["2024-UNIVERS-12844"],"award-info":[{"award-number":["2024-UNIVERS-12844"]}]},{"name":"European Social Fund Plus (ESF+), by the Regional Government of Castilla-La Mancha","award":["SBPLY\/21\/180501\/000195"],"award-info":[{"award-number":["SBPLY\/21\/180501\/000195"]}]},{"name":"R&D","award":["PID2024-158682OB-C32"],"award-info":[{"award-number":["PID2024-158682OB-C32"]}]},{"name":"Spanish Ministry of Science and Innovation (MCIN) and the European Regional Development Fund: \u201ca way of making Europe\u201d","award":["PID2022-142332OA-I00, TED2021-131115A-I00, and PID2023-151467OA-I00"],"award-info":[{"award-number":["PID2022-142332OA-I00, TED2021-131115A-I00, and PID2023-151467OA-I00"]}]},{"name":"EINA UNIZAR Strategic Cybersecurity Project"},{"name":"Department of University, Industry, and Innovation of the Government of Aragon under the Strategic Projects Program for Research Groups","award":["T21-23R"],"award-info":[{"award-number":["T21-23R"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2026,2,28]]},"abstract":"<jats:p>The rise of distributed architectures in Internet of Things (IoT) environments has significantly advanced both data processing and artificial intelligence. Notably, Multi-access Edge Computing (MEC) represents a distributed form of the Edge Computing paradigm, focussing on heterogeneous protocol management. In contrast, Federated Learning (FL) is an application-level framework designed to enable decentralised Machine Learning (ML) across devices without centralising data. Nevertheless, the combination of both technologies enables the creation of more efficient, scalable, and responsive systems. However, their integration into IoT brings substantial security challenges, including data poisoning, model manipulation, and the insertion of false nodes, all of which threaten the reliability of FL systems. Blockchain technology emerges as a promising solution to these challenges. It offers a decentralised, transparent, and immutable framework that ensures the authenticity and verification of data across the network. Through blockchain, node interactions are automated and secured, enhancing the integrity and trust in the learning process. This article proposes a blockchain-based architecture for FL within MEC-IoT systems, designed to mitigate security threats. The architecture emphasises data integrity, secure node interactions, and transparent audit trails while maintaining optimal model performance and accuracy, even under attack. It highlights the low resource consumption and minimal time overhead of blockchain integration, ensuring efficiency is not compromised. This integrated approach improves data security, supports secure collaborative learning, and fosters a more resilient and trustworthy IoT ecosystem.<\/jats:p>","DOI":"10.1145\/3767740","type":"journal-article","created":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T07:22:57Z","timestamp":1757748177000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Poisoning-Resilient Federated Learning for MEC-IoT Environments Using\u00a0Blockchain"],"prefix":"10.1145","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-3852-6313","authenticated-orcid":false,"given":"Luis Miguel","family":"Garc\u00eda-S\u00e1ez","sequence":"first","affiliation":[{"name":"University of Castilla-La Mancha","place":["Albacete, Spain"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1063-7000","authenticated-orcid":false,"given":"Sergio","family":"Ruiz-Villafranca","sequence":"additional","affiliation":[{"name":"University of Castilla-La Mancha","place":["Albacete, Spain"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5787-1294","authenticated-orcid":false,"given":"Jos\u00e9","family":"Rold\u00e1n-G\u00f3mez","sequence":"additional","affiliation":[{"name":"University of Zaragoza","place":["Zaragoza, Spain"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8371-4305","authenticated-orcid":false,"given":"Javier","family":"Carrillo-Mond\u00e9jar","sequence":"additional","affiliation":[{"name":"University of Zaragoza","place":["Zaragoza, Spain"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5119-2418","authenticated-orcid":false,"given":"Jos\u00e9 Luis","family":"Mart\u00ednez","sequence":"additional","affiliation":[{"name":"University of Castilla-La Mancha","place":["Albacete, Spain"]}]}],"member":"320","published-online":{"date-parts":[[2026,1,14]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"2024. Gas and fees. (Oct.2024). Retrieved from https:\/\/ethereum.org\/en\/developers\/docs\/gas\/Last access: 06\/05\/2025."},{"key":"e_1_3_2_3_2","unstructured":"2024. Internet of Things (IoT): Connected devices in the world 2015-2027. (2024). Retrieved from https:\/\/t.ly\/4xx1WLast access: 06\/05\/2025."},{"key":"e_1_3_2_4_2","unstructured":"2024. TensorFlow - mnist | TensorFlow Datasets. (2024). Retrieved from https:\/\/www.tensorflow.org\/datasets\/catalog\/mnist. Last access: 06\/05\/2025."},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2750180"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3411091"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Anjaneyulu D. Aguru Phani K. Prasad Srikant V. Thampi Vipin Chaudhary and Sudip Misra. 2025. Reliable-RPL: A reliability-aware RPL protocol using trust-based blockchain system for Internet of Things. IEEE Transactions on Reliability 74 3 (September 2025) 3499\u20133513. DOI:10.1109\/TR.2024.3508652","DOI":"10.1109\/TR.2024.3508652"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCME55909.2022.9988067"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","unstructured":"Mohammed Aledhari Rehma Razzak Reza M. Parizi and Fahad Saeed. 2020. Federated learning: A survey on enabling technologies protocols and applications. IEEE Access 8 (2020) 140699\u2013140725. DOI:10.1109\/ACCESS.2020.3013541","DOI":"10.1109\/ACCESS.2020.3013541"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","unstructured":"Saier Alharbi Yifan Guo and Wei Yu. 2024. Collusive backdoor attacks in federated learning frameworks for IoT systems. IEEE Internet of Things Journal 11 11 (June 2024) 19694\u201319707. DOI:10.1109\/JIOT.2024.3368754","DOI":"10.1109\/JIOT.2024.3368754"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-97951-5_3"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","unstructured":"Erukala Suresh Babu Amogh Barthwal and Rajesh Kaluri. 2023. Sec-edge: Trusted blockchain system for enabling the identification and authentication of edge based 5G networks. Computer Communications 199 C (February 2023) 10\u201329. DOI:10.1016\/j.comcom.2022.12.001","DOI":"10.1016\/j.comcom.2022.12.001"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOT.2018.00015"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e17602"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3072849"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","unstructured":"Parimala Boobalan Swarna Priya Ramu Quoc-Viet Pham Kapal Dev Sharnil Pandya Praveen Kumar Reddy Maddikunta Thippa Reddy Gadekallu and Thien Huynh-The. 2022. Fusion of federated learning and industrial internet of things: A survey. Computer Networks 212 C (July 2022) 109048. DOI:10.1016\/j.comnet.2022.109048","DOI":"10.1016\/j.comnet.2022.109048"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3075203"},{"key":"e_1_3_2_18_2","unstructured":"Hang Chen Syed Ali Asif Jihong Park Chien-Chung Shen and Mehdi Bennis. 2021. Robust blockchained federated learning with model validation and proof-of-stake inspired consensus. arXiv:2101.03300. Retrieved from https:\/\/arxiv.org\/abs\/2101.03300"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","unstructured":"Shweta Kumari Choudhary Arpan Kumar Kar and Yogesh K. Dwivedi. 2024. How does Federated learning impact decision-making in firms: A systematic literature review. Communications of the Association for Information Systems 54 519\u2013546 (2024). DOI:10.17705\/1CAIS.05419","DOI":"10.17705\/1CAIS.05419"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD61410.2024.10580415"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3072033"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","unstructured":"Mohamed Amine Ferrag Burak Kantarci Lucas C. Cordeiro M\u00e9rouane Debbah and Kim-Kwang Raymond Choo. 2023. Poisoning attacks in federated edge learning for digital twin 6G-enabled IoTs: An anticipatory study. In Proceedings of the 2023 IEEE International Conference on Communications Workshops (ICC Workshops). IEEE 1253\u20131258. DOI:10.1109\/ICCWorkshops57953.2023.10283797","DOI":"10.1109\/ICCWorkshops57953.2023.10283797"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3034136"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.03.003"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT49239.2020.9225676"},{"key":"e_1_3_2_27_2","unstructured":"Woorim Han Yungi Cho and Yunheung Paek. 2023. A survey on threats to federated learning. (2023). https:\/\/koreascience.kr\/article\/CFKO202319360811307.pdf"},{"key":"e_1_3_2_28_2","unstructured":"Masahiro Hayashitani Junki Mori and Isamu Teranishi. 2024. Survey of Privacy Threats and Countermeasures in Federated Learning. 3rd IEEE International Conference on Federated Learning Technologies and Applications (FLTA25)."},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3194113.3194119"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3560816"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00062"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3249568"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","unstructured":"Aditya Pribadi Kalapaaking Ibrahim Khalil Xuan Yi Kevin-Yau Lam Guo-Bin Huang Ning Wang. 2025. Auditable and verifiable federated learning based on blockchain-enabled decentralization. IEEE Transactions on Neural Networks and Learning Systems 36 1 (January 2025) 102\u2013115. DOI:10.1109\/TNNLS.2024.3407670","DOI":"10.1109\/TNNLS.2024.3407670"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.001.1900119"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","unstructured":"Harsh Kasyap and Somanath Tripathy. 2024. Privacy-preserving and Byzantine-robust federated learning framework using permissioned blockchain. Expert Systems with Applications 238 PE (March 2024) 122210. DOI:10.1016\/j.eswa.2023.122210","DOI":"10.1016\/j.eswa.2023.122210"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.17762\/ijritcc.v11i11.10075"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6693731"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6679"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","unstructured":"Rajeshree Khande Shubhangee Ramaswami Chaitanya Naidu and Nidhi Patel. 2021. An effective mechanism for securing and managing password using AES-256 encryption and PBKDF2. International Journal of Electrical Engineering and Technology 12 5 (2021) 1\u20137. DOI:10.34218\/IJEET.12.5.2021.001","DOI":"10.34218\/IJEET.12.5.2021.001"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26896-5_7"},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.7921019"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.3390\/ai4030028"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487449"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.01.050"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2019.2959108"},{"key":"e_1_3_2_46_2","unstructured":"Junchuan Lianga Rong Wang Chaosheng Feng and Chin-Chen Chang. 2023. A Survey on Federated Learning Poisoning Attacks and Defenses. arXiv:2306.03397. Retrieved from https:\/\/arxiv.org\/abs\/2306.03397"},{"key":"e_1_3_2_47_2","unstructured":"Jiahuan Luo Xueyang Wu Yun Luo Anbu Huang Yunfeng Huang Yang Liu and Qiang Yang. 2021. Real-World Image Datasets for Federated Learning. arXiv:1910.11089. Retrieved from https:\/\/arxiv.org\/abs\/1910.11089"},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/ETCCE51779.2020.9350909"},{"key":"e_1_3_2_49_2","unstructured":"Brendan McMahan Eider Moore Daniel Ramage Seth Hampson and Blaise Ag\u00fcera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS 2017). PMLR 1273\u20131282. Available at: https:\/\/proceedings.mlr.press\/v54\/mcmahan17a\/mcmahan17a.pdf"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-3728-5_28"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-4075-5_7"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIOT.2024.10644021"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3075439"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/IDEA49133.2020.9170699"},{"key":"e_1_3_2_55_2","volume-title":"Advances in Neural Information Processing Systems","author":"Park Younghyun","year":"2021","unstructured":"Younghyun Park, Dong-Jun Han, Do-Yeon Kim, Jun Seo, and Jaekyun Moon. 2021. Few-round learning for federated learning. In Advances in Neural Information Processing Systems. Curran Associates, Inc., Virtual. Retrieved from https:\/\/proceedings.neurips.cc\/paper\/2021\/hash\/f065d878ccfb4cc4f4265a4ff8bafa9a-Abstract.html"},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.54254\/2755-2721\/16\/20230853"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.3390\/app8122663"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","unstructured":"R. A. Fisher. 1936. Iris (dataset). UCI Machine Learning Repository University of California Irvine. (1936). DOI:10.24432\/C56C76","DOI":"10.24432\/C56C76"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2021.3062546"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE60900.2024.10611769"},{"key":"e_1_3_2_61_2","unstructured":"Margaret Rouse. 2023. Merkle Tree (Blockchain Hash Tree). (Sept.2023). Retrieved from https:\/\/www.techopedia.com\/definition\/32919\/merkle-tree. Last access: 06\/05\/2025."},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05098-2"},{"key":"e_1_3_2_63_2","unstructured":"Subhash Sagar Chang-Sun Li Seng W. Loke and Jinho Choi. 2023. Poisoning Attacks and Defenses in Federated Learning: A Survey. arXiv:2301.05795. Retrieved from https:\/\/arxiv.org\/abs\/2301.05795"},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME55016.2022.00034"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833647"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom56396.2022.00030"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-06348-2"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/SIU61531.2024.10600786"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.103996"},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_24"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-49190-1_2"},{"key":"e_1_3_2_72_2","unstructured":"Dr Gavin Wood. 2024. Ethereum: A secure decentralised generalised transaction ledger. (Nov.2024). Retrieved from https:\/\/ethereum.github.io\/yellowpaper\/paper.pdfLast access: 06\/05\/2025."},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3238823"},{"key":"e_1_3_2_74_2","unstructured":"Han Xiao Kashif Rasul and Roland Vollgraf. 2017. Fashion-MNIST: A Novel Image Dataset for Benchmarking Machine Learning Algorithms. arXiv:1708.07747. Retrieved from https:\/\/arxiv.org\/abs\/1708.07747"},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.26599\/TST.2020.9010025"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3138693"},{"key":"e_1_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.13161"},{"key":"e_1_3_2_78_2","unstructured":"Binhang Yuan Song Ge and Wenhui Xing. 2020. A federated learning framework for healthcare IoT devices. arXiv:2005.05083. Retrieved from https:\/\/arxiv.org\/abs\/2005.05083"},{"key":"e_1_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/DDCLS58216.2023.10166254"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.106775"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.12.042"},{"key":"e_1_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.004.2100182"},{"key":"e_1_3_2_83_2","doi-asserted-by":"publisher","unstructured":"Zhao Zhang Yong Zhang Da Guo Lei Yao and Zhao Li. 2022. SecFedNIDS: Robust defense for poisoning attack against federated learning-based network intrusion detection system. Future Generation Computer Systems 134 C (September 2022) 154\u2013169. DOI:10.1016\/j.future.2022.04.010","DOI":"10.1016\/j.future.2022.04.010"},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCSS.2019.2960824"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2023788"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3767740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T05:09:37Z","timestamp":1768540177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3767740"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,14]]},"references-count":84,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2,28]]}},"alternative-id":["10.1145\/3767740"],"URL":"https:\/\/doi.org\/10.1145\/3767740","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,14]]},"assertion":[{"value":"2025-01-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-01-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}