{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:36:00Z","timestamp":1775745360576,"version":"3.50.1"},"reference-count":36,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":242,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066606","type":"journal-article","created":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T07:51:41Z","timestamp":1752652301000},"page":"695-727","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":6,"title":["EdgeGuard-IoT: 6G-Enabled Edge Intelligence for Secure Federated Learning and Adaptive Anomaly Detection in Industry 5.0"],"prefix":"10.32604","volume":"85","author":[{"given":"Mohammed Naif","family":"Alatawi","sequence":"first","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"3094","DOI":"10.1109\/OJCOMS.2024.3449563","article-title":"Federated learning for enhanced cybersecurity and trustworthiness in 5G and 6G networks: a comprehensive survey","volume":"6","author":"Blika","year":"2024","journal-title":"IEEE Open J Commun Soc"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"4850","DOI":"10.1109\/TII.2021.3096672","article-title":"Cybertwin-driven resource provisioning for IoE applications at 6G-enabled edge networks","volume":"18","author":"Adhikari","year":"2022","journal-title":"IEEE Trans Ind Inform"},{"key":"ref3","series-title":"2024 IEEE International Conference on Big Data (BigData); 2024 Dec 15\u201318;","first-page":"4921","article-title":"Ensuring security continuum from edge to cloud: adaptive security for IoT-based critical infrastructures using FL at the edge","volume":"2024","author":"Ari"},{"key":"ref4","series-title":"2024 27th International Symposium on Wireless Personal Multimedia Communications (WPMC); 2024 Nov 17\u201320;","first-page":"1","article-title":"Pre-harvest to post-harvest: a review of AI and IoT applications in smart agriculture and the prospects of 6G-enabled IoT framework","volume":"2024","author":"Bhola"},{"key":"ref5","first-page":"2024014","article-title":"A survey of joint security-safety for function, information and human in industry 5.0","volume":"4","author":"Hong","year":"2025","journal-title":"Secur Saf"},{"key":"ref6","series-title":"2024 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit); 2024 Jun 3\u20136","first-page":"1139","article-title":"Towards 6G: architectural innovations and challenges in the ORIGAMI framework","volume":"2024","author":"Chatzieleftheriou"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.3390\/math13081239","article-title":"Zero-trust mechanisms for securing distributed edge and fog computing in 6G networks","volume":"13","author":"Alnaim","year":"2025","journal-title":"Mathematics"},{"key":"ref8","series-title":"2023 IEEE International Conference on Big Data (BigData); 2023 Dec 15\u201318","first-page":"5770","article-title":"Self-supervised federated learning for anomaly detection","volume":"2023","author":"Eng"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2654","DOI":"10.1109\/COMST.2023.3317242","article-title":"Edge learning for 6G-enabled Internet of Things: a comprehensive survey of vulnerabilities, datasets, and defenses","volume":"25","author":"Ferrag","year":"2023","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref10","series-title":"2023 IEEE International Conference on Communications Workshops (ICC Workshops); 2023 May 28\u2013Jun 1; Rome, Italy","first-page":"1253","article-title":"Poisoning attacks in federated edge learning for digital twin 6G-enabled IoTs: an anticipatory study","volume":"2023","author":"Ferrag"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/MWC.016.220047","article-title":"Trusted explainable AI for 6G-enabled edge cloud ecosystem","volume":"30","author":"Garg","year":"2023","journal-title":"IEEE Wirel Commun"},{"key":"ref12","series-title":"An adaptive blockchain framework for comprehensive attack protection for securing the Internet of medical things; 2024 4th International Conference on Blockchain Technology and Information Security (ICBCTIS); 2024 Aug 17\u201319","first-page":"332","article-title":"An adaptive blockchain framework for comprehensive attack protection for securing the Internet of medical things","volume":"2024","author":"Goel"},{"key":"ref13","series-title":"2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Application (ICAIQSA); 2024 Dec 20\u201321","first-page":"1","article-title":"Design of an improved model for data poisoning detection using AEAD-TL, GARNN, and FL-DPD","volume":"2024","author":"Hatwar"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1364","DOI":"10.1109\/TNSE.2022.3190330","article-title":"AceFL: federated learning accelerating in 6G-enabled mobile edge computing networks","volume":"10","author":"He","year":"2023","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/IOTM.001.2300274","article-title":"Enabling trustworthy federated learning in industrial IoT: bridging the gap between interpretability and robustness","volume":"7","author":"Jagatheesaperumal","year":"2024","journal-title":"IEEE Internet Things Mag"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"7145","DOI":"10.1109\/TII.2021.3052531","article-title":"A survey of computational intelligence for 6G: key technologies, applications and trends","volume":"17","author":"Ji","year":"2021","journal-title":"IEEE Trans Ind Inform"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1109\/TII.2021.3131175","article-title":"Privacy-preserving federated learning for industrial edge computing via hybrid differential privacy and adaptive compression","volume":"19","author":"Jiang","year":"2023","journal-title":"IEEE Trans Ind Inform"},{"key":"ref18","series-title":"2025 3rd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT); 2025 Feb 5\u20137; Bengaluru, India","first-page":"435","article-title":"Privacy and security concerns in edge-cloud systems: an in-depth analysis","volume":"2025","author":"Kaki"},{"key":"ref19","series-title":"2024 2nd International Conference on Advances in Computation, Communication and Information Technology (ICAICCIT); 2024 Nov 28\u201329","first-page":"949","article-title":"Enhancing network security in cloud-integrated IoT devices","volume":"2024","author":"Kumar"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"5264","DOI":"10.1109\/JIOT.2021.3051031","article-title":"AI-driven collaborative resource allocation for task execution in 6G-enabled massive IoT","volume":"8","author":"Lin","year":"2021","journal-title":"IEEE Internet Things J"},{"key":"ref21","series-title":"2024 International Symposium on Networks, Computers and Communications (ISNCC); 2024 Oct 22\u201325; Washington, DC, USA","first-page":"1","article-title":"Adaptive machine learning for efficient anomaly detection in autonomous UAVs swarm operations","volume":"2024","author":"Luo"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"4619","DOI":"10.1109\/TDSC.2024.3354736","article-title":"Efficient and secure federated learning against backdoor attacks","volume":"21","author":"Miao","year":"2024","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"6909","DOI":"10.1109\/TCE.2024.3440178","article-title":"Advancing security and trust in WSNs: a federated multi-agent deep reinforcement learning approach","volume":"70","author":"Moudoud","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref24","series-title":"2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS); 2022 Jan 4\u20138; Bangalore, India","first-page":"1","article-title":"Transformation from 5G for verticals towards a 6G-enabled Internet of verticals","volume":"2022","author":"Nekovee"},{"key":"ref25","series-title":"2023 IEEE International Conference on ICT in Business Industry & Government (ICTBIG); 2023 Dec 8\u20139; Indore, India","first-page":"1","article-title":"Federated learning paradigms in network security for distributed systems","volume":"2023","author":"Ojha"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"5719","DOI":"10.1109\/TCE.2024.3385015","article-title":"Toward Byzantine-resilient secure AI: a federated learning communication framework for 6G consumer electronics","volume":"70","author":"Pei","year":"2024","journal-title":"IEEE Trans Consum Electron"},{"key":"ref27","series-title":"2024 Second International Conference on Advances in Information Technology (ICAIT); 2024 Jul 24\u201327; Chikkamagaluru, Karnataka, India","first-page":"1","article-title":"Optimizing resource utilization in generative AI ensembles for edge computing","volume":"2024","author":"Rao"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"105887","DOI":"10.1109\/ACCESS.2024.3435920","article-title":"FBMP-IDS: FL-based blockchain-powered lightweight MPC-secured IDS for 6G networks","volume":"12","author":"Sakraoui","year":"2024","journal-title":"IEEE Access"},{"key":"ref29","series-title":"2024 IEEE Intelligent Mobile Computing (MobileCloud); 2024 Jul 15\u201318; Shanghai, China","first-page":"16","article-title":"Safeguarding the smart home: heterogeneous federated deep learning for intrusion defense","volume":"2024","author":"Shalan"},{"key":"ref30","series-title":"2023 IEEE International Conference on Edge Computing and Communications (EDGE); Chicago, IL, USA","first-page":"12","article-title":"Cognit: Challenges and vision for a serverless and multi-provider cognitive cloud-edge continuum","volume":"2023","author":"Townend"},{"key":"ref31","series-title":"2021 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC); 2021 Jun 18\u201320; Chengdu, China","first-page":"566","article-title":"Intelligent task offloading for 6G-enabled maritime IoT based on reinforcement learning","volume":"2021","author":"Wang"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1256","DOI":"10.1109\/TNSE.2022.3154760","article-title":"AI-driven and MEC-empowered confident information coverage hole recovery in 6G-enabled IoT","volume":"10","author":"Xia","year":"2023","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1109\/OJIES.2024.3370496","article-title":"End-edge collaborative lightweight secure federated learning for anomaly detection of wireless industrial control systems","volume":"5","author":"Xu","year":"2024","journal-title":"IEEE Open J Ind Electron Soc"},{"key":"ref34","series-title":"ICC 2023\u2014IEEE International Conference on Communications; 2023 May 28\u2013Jun 1; Rome, Italy","first-page":"5408","article-title":"An improved DBSCAN and multi-agent based task offloading mechanism for 6G-enabled Internet of vehicles","volume":"2023","author":"Yuan"},{"key":"ref35","first-page":"2191","article-title":"Computational optimization of RIS-enhanced backscatter and direct communication for 6G IoT: a DDPG-based approach with physical layer security","volume":"142","author":"Abideen","year":"2025","journal-title":"Comput Model Eng Sci"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"31472","DOI":"10.1109\/ACCESS.2025.3542607","article-title":"Optimizing secure multi-user ISAC systems with STAR-RIS: a deep reinforcement learning approach for 6G networks","volume":"13","author":"Kamal","year":"2025","journal-title":"IEEE Access"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-1\/TSP_CMC_66606\/TSP_CMC_66606.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:08:10Z","timestamp":1763345290000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n1\/63548"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066606","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-26","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-29","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}