{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T20:34:33Z","timestamp":1769027673032,"version":"3.49.0"},"reference-count":43,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T00:00:00Z","timestamp":1768867200000},"content-version":"vor","delay-in-days":19,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Networks and Communications"],"published-print":{"date-parts":[[2026,1]]},"abstract":"<jats:p>Industrial control systems (ICS) are increasingly vulnerable to cybersecurity threats due to the integration of IoT devices and operational technology networks. Traditional centralized anomaly detection methods face significant challenges, including privacy concerns, bandwidth limitations, and single points of failure. Federated learning (FL) offers a promising alternative by enabling collaborative model training across distributed devices without sharing raw data. However, FL in industrial settings introduces challenges such as communication overhead, resource heterogeneity, and the risk of Byzantine failures. This study proposes a comprehensive framework for efficient and secure FL\u2010based anomaly detection in ICS. We introduce two novel compression techniques, weight clustering with adaptive bit allocation (WC\u2010ABA) and energy\u2010aware knowledge distillation (EA\u2010KD), to reduce communication overhead while maintaining detection accuracy. Additionally, we implement differential delta compression with adaptive clustering and entropy coding, which further minimizes data transmission by sending only the differences between model updates. Our robust aggregation mechanism, SparseVariance Aggregator, filters out suspicious updates and ensures model integrity. The framework also integrates differential privacy techniques to protect against inference attacks. Evaluated on the Secure Water Treatment (SWaT) and Water Distribution Attack Dataset (WADI) datasets, our approach demonstrates superior anomaly detection performance, reduced communication costs, and lower computational demand compared to centralized alternatives. The results highlight the effectiveness of our framework in enhancing the security and efficiency of ICS environments.<\/jats:p>","DOI":"10.1155\/jcnc\/7289868","type":"journal-article","created":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T04:27:53Z","timestamp":1768969673000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Federated Learning Framework for Efficient and Secure Anomaly Detection in Industrial Control Systems"],"prefix":"10.1155","volume":"2026","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3110-9104","authenticated-orcid":false,"given":"Emmanuel","family":"Osei Owusu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6700-7985","authenticated-orcid":false,"given":"Danlard","family":"Iddrisu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2509-6665","authenticated-orcid":false,"given":"Griffith Selorm","family":"Klogo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8765-9889","authenticated-orcid":false,"given":"Kwame Osei","family":"Boateng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5717-0284","authenticated-orcid":false,"given":"Emmanuel Kofi","family":"Akowuah","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2026,1,20]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2018.04.007"},{"key":"e_1_2_11_2_2","article-title":"Guide to Industrial Control Systems (ICS) Security","volume":"800","author":"Stouffer K.","year":"2011","journal-title":"NIST Special Publication"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.70147"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_2_11_5_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.70281"},{"key":"e_1_2_11_6_2","doi-asserted-by":"crossref","first-page":"6481","DOI":"10.1109\/JIOT.2019.2958185","article-title":"Anomaly Detection for IoT time-series Data: a Survey","volume":"7","author":"Cook A. A.","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_2_11_7_2","doi-asserted-by":"crossref","unstructured":"ThodupunuriL. PeesariN. andUtukuruS. Interpretable Anomaly Detection in Industrial Control Systems Using Federated Learning 2024 8th International Conference on Inventive Systems and Control (ICISC) April 2024 687\u2013692 https:\/\/doi.org\/10.1109\/icisc62624.2024.00122.","DOI":"10.1109\/ICISC62624.2024.00122"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.006"},{"key":"e_1_2_11_9_2","unstructured":"McMahanH. B. MooreE. RamageD. HampsonS. andy ArcasB. A. Communication-Efficient Learning of Deep Networks from Decentralized Data International Conference on Artificial Intelligence and Statistics July 2016."},{"key":"e_1_2_11_10_2","doi-asserted-by":"crossref","first-page":"3400","DOI":"10.1109\/TNNLS.2019.2944481","article-title":"Robust and communication-efficient Federated Learning from Non-iid Data","volume":"31","author":"Sattler F.","year":"2019","journal-title":"IEEE Transaction Neural Network Learning System"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2020.2975749"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2942190"},{"key":"e_1_2_11_13_2","article-title":"Federated Optimization: Distributed Machine Learning for on-device Intelligence","author":"Kone\u010dn\u1ef3 J.","year":"2016","journal-title":"ArXiv Prepr. ArXiv161002527"},{"key":"e_1_2_11_14_2","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1109\/SP.2019.00065","volume-title":"2019 IEEE Symposium on Security and Privacy (SP)","author":"Nasr M.","year":"2019"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2020.2988575"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3213650"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2024.3425531"},{"key":"e_1_2_11_18_2","doi-asserted-by":"crossref","unstructured":"WuD. ZouX. ZhangS. JinH. XiaW. andFangB. Smartidx: Reducing Communication Cost in Federated Learning by Exploiting the Cnns Structures 36 Proceedings of the AAAI Conference on Artificial Intelligence August 2022 no. 4 4254\u20134262 https:\/\/doi.org\/10.1609\/aaai.v36i4.20345.","DOI":"10.1609\/aaai.v36i4.20345"},{"key":"e_1_2_11_19_2","article-title":"Personalized Federated Learning with Communication Compression","author":"Bergou E. H.","year":"2022","journal-title":"ArXiv Prepr. ArXiv220905148"},{"key":"e_1_2_11_20_2","doi-asserted-by":"crossref","unstructured":"Kal\u00f8rA. E. MichelsantiD. ChiariottiF. TanZ.-H. andPopovskiP. Remote Anomaly Detection in Industry 4.0 Using resource-constrained Devices 2021 IEEE 22nd International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) April 2021 251\u2013255.","DOI":"10.1109\/SPAWC51858.2021.9593188"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3011726"},{"key":"e_1_2_11_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2022.09.550"},{"key":"e_1_2_11_23_2","first-page":"1","volume-title":"NOMS 2024-2024 IEEE Network Operations and Management Symposium","author":"Perdig\u00e3o D.","year":"2024"},{"key":"e_1_2_11_24_2","volume-title":"Journal of Physics: Conference Series","author":"Liu F.","year":"2023"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/jstsp.2022.3224597"},{"key":"e_1_2_11_26_2","doi-asserted-by":"crossref","unstructured":"YangZ. ZhangS. LiC. WangH. andZhangM. Resource-Efficient Heterogenous Federated Continual Learning on Edge 2024 Design Automation & Test in Europe Conference & Exhibition (DATE) April 2024 1\u20136 https:\/\/doi.org\/10.23919\/DATE58400.2024.10546889.","DOI":"10.23919\/DATE58400.2024.10546889"},{"key":"e_1_2_11_27_2","doi-asserted-by":"publisher","DOI":"10.22214\/ijraset.2023.55767"},{"key":"e_1_2_11_28_2","doi-asserted-by":"crossref","unstructured":"AroraG.andKaurB. A Machine Learning Framework for Industrial IoT Systems that Helps Preserve Privacy Using Poly1305 Encryption 2023 2nd International Conference on Futuristic Technologies (INCOFT) May 2023 1\u20136 https:\/\/doi.org\/10.1109\/INCOFT60753.2023.10425018.","DOI":"10.1109\/INCOFT60753.2023.10425018"},{"key":"e_1_2_11_29_2","doi-asserted-by":"crossref","DOI":"10.3390\/electronics13040687","article-title":"Enhancing Industrial IoT Network Security Through Blockchain Integration","volume":"13","author":"Bobde Y.","year":"2024","journal-title":"Electronics"},{"key":"e_1_2_11_30_2","doi-asserted-by":"crossref","first-page":"1145","DOI":"10.1109\/TII.2021.3126728","article-title":"Intrusion Detection Based on Privacy-Preserving Federated Learning for the Industrial IoT","volume":"19","author":"Ruzafa-Alc\u00e1zar P.","year":"2021","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_2_11_31_2","doi-asserted-by":"crossref","unstructured":"AhmedC. M. PalletiV. R. andMathurA. P. WADI: a Water Distribution Testbed for Research in the Design of Secure Cyber Physical Systems Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks April 2017 25\u201328 https:\/\/doi.org\/10.1145\/3055366.3055375 2-s2.0-85018754526.","DOI":"10.1145\/3055366.3055375"},{"key":"e_1_2_11_32_2","volume-title":"The Elements of Statistical Learning: Data Mining, Inference, and Prediction","author":"John Lu Z.","year":"2010"},{"key":"e_1_2_11_33_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1805.09767"},{"key":"e_1_2_11_34_2","article-title":"PowerSGD: Practical low-rank Gradient Compression for Distributed Optimization","volume":"32","author":"Vogels T.","year":"2019","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_11_35_2","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_2_11_36_2","doi-asserted-by":"crossref","unstructured":"AbadiM. ChuA. GoodfellowI.et al. Deep Learning with Differential Privacy Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security October 2016 308\u2013318 https:\/\/doi.org\/10.1145\/2976749.2978318 2-s2.0-84995527907.","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_2_11_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2847722"},{"key":"e_1_2_11_38_2","doi-asserted-by":"crossref","unstructured":"AudibertJ. MichiardiP. GuyardF. MartiS. andZuluagaM. A. USAD: Unsupervised Anomaly Detection on Multivariate Time Series Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining Virtual Event CA USA: ACM August 2020 3395\u20133404 https:\/\/doi.org\/10.1145\/3394486.3403392.","DOI":"10.1145\/3394486.3403392"},{"key":"e_1_2_11_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/ojies.2024.3370496"},{"key":"e_1_2_11_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-10354-1"},{"key":"e_1_2_11_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103692"},{"key":"e_1_2_11_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.atech.2024.100727"},{"key":"e_1_2_11_43_2","doi-asserted-by":"crossref","DOI":"10.1002\/eng2.70293","article-title":"Energy-Aware RF Fingerprinting for Device Identification in Ultra-Low-Power IoT Systems","volume":"7","author":"Owusu E. O.","year":"2025","journal-title":"Engineering Reports"}],"container-title":["Journal of Computer Networks and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/jcnc\/7289868","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1155\/jcnc\/7289868","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/jcnc\/7289868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T04:27:57Z","timestamp":1768969677000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/jcnc\/7289868"}},"subtitle":[],"editor":[{"given":"Giovanni","family":"Pau","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2026,1]]},"references-count":43,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["10.1155\/jcnc\/7289868"],"URL":"https:\/\/doi.org\/10.1155\/jcnc\/7289868","archive":["Portico"],"relation":{},"ISSN":["2090-7141","2090-715X"],"issn-type":[{"value":"2090-7141","type":"print"},{"value":"2090-715X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1]]},"assertion":[{"value":"2025-05-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-12-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-01-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7289868"}}