{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T19:43:09Z","timestamp":1773517389577,"version":"3.50.1"},"reference-count":29,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T00:00:00Z","timestamp":1708560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["BDCC"],"abstract":"<jats:p>The swift proliferation of the Internet of Things (IoT) devices in smart city infrastructures has created an urgent demand for robust cybersecurity measures. These devices are susceptible to various cyberattacks that can jeopardize the security and functionality of urban systems. This research presents an innovative approach to identifying anomalies caused by IoT cyberattacks in smart cities. The proposed method harnesses federated and split learning and addresses the dual challenge of enhancing IoT network security while preserving data privacy. This study conducts extensive experiments using authentic datasets from smart cities. To compare the performance of classical machine learning algorithms and deep learning models for detecting anomalies, model effectiveness is assessed using precision, recall, F-1 score, accuracy, and training\/deployment time. The findings demonstrate that federated learning and split learning have the potential to balance data privacy concerns with competitive performance, providing robust solutions for detecting IoT cyberattacks. This study contributes to the ongoing discussion about securing IoT deployments in urban settings. It lays the groundwork for scalable and privacy-conscious cybersecurity strategies. The results underscore the vital role of these techniques in fortifying smart cities and promoting the development of adaptable and resilient cybersecurity measures in the IoT era.<\/jats:p>","DOI":"10.3390\/bdcc8030021","type":"journal-article","created":{"date-parts":[[2024,2,22]],"date-time":"2024-02-22T11:28:47Z","timestamp":1708601327000},"page":"21","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":47,"title":["Anomaly Detection of IoT Cyberattacks in Smart Cities Using Federated Learning and Split Learning"],"prefix":"10.3390","volume":"8","author":[{"given":"Ishaani","family":"Priyadarshini","sequence":"first","affiliation":[{"name":"School of Information, University of California, Berkeley 94720, CA, USA"}]}],"member":"1968","published-online":{"date-parts":[[2024,2,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"102783","DOI":"10.1016\/j.cose.2022.102783","article-title":"Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications","volume":"120","author":"Rashid","year":"2022","journal-title":"Comput. Secur."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"108193","DOI":"10.1016\/j.compeleceng.2022.108193","article-title":"Time series analysis and anomaly detection for trustworthy smart homes","volume":"102","author":"Priyadarshini","year":"2022","journal-title":"Comput. Electr. Eng."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"e4758","DOI":"10.1002\/ett.4758","article-title":"SDN and application layer DDoS attacks detection in IoT devices by attention-based Bi-LSTM-CNN","volume":"34","author":"Priyadarshini","year":"2023","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Thapa, C., Chamikara MA, P., and Camtepe, S.A. (2021). Advancements of federated learning towards privacy preservation: From federated learning to split learning. Fed. Learn. Syst. Towards Next Gener. AI, 79\u2013109.","DOI":"10.1007\/978-3-030-70604-3_4"},{"key":"ref_5","first-page":"200216","article-title":"Secure edge computing vulnerabilities in smart cities sustainability using petri net and genetic algorithm-based reinforcement learning","volume":"18","author":"Ajao","year":"2023","journal-title":"Intell. Syst. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Rashid, M.M., Kamruzzaman, J., Hassan, M.M., Imam, T., and Gordon, S. (2020). Cyberattacks detection in iot-based smart city applications using machine learning techniques. Int. J. Environ. Res. Public Health, 17.","DOI":"10.3390\/ijerph17249347"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"104475","DOI":"10.1016\/j.scs.2023.104475","article-title":"Detection of data-driven blind cyber-attacks on smart grid: A deep learning approach","volume":"92","author":"Mukherjee","year":"2023","journal-title":"Sustain. Cities Soc."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Almuqren, L., Aljameel, S.S., Alqahtani, H., Alotaibi, S.S., Hamza, M.A., and Salama, A.S. (2023). A White Shark Equilibrium Optimizer with a Hybrid Deep-Learning-Based Cybersecurity Solution for a Smart City Environment. Sensors, 23.","DOI":"10.3390\/s23177370"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Alsaade, F.W., and Al-Adhaileh, M.H. (2023). Cyber attack detection for self-driving vehicle networks using deep autoencoder algorithms. Sensors, 23.","DOI":"10.3390\/s23084086"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/j.ins.2023.03.052","article-title":"DeepAK-IoT: An effective deep learning model for cyberattack detection in IoT networks","volume":"634","author":"Ding","year":"2023","journal-title":"Inf. Sci."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Sharma, A., and Babbar, H. (2023, January 1\u20133). BoT-IoT: Detection of Attacks in IoT-Cybersecurity for Smart Transportation. Proceedings of the 2023 8th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India.","DOI":"10.1109\/ICCES57224.2023.10192814"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Ajao, L.A., and Apeh, S.T. (, January 23\u201325). Blockchain Integration with Machine Learning for Securing Fog Computing Vulnerability in Smart City Sustainability. Proceedings of the 2023 1st International Conference on Advanced Innovations in Smart Cities (ICAISC), Jeddah, Saudi Arabia.","DOI":"10.1109\/ICAISC56366.2023.10085192"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Alrayes, F.S., Asiri, M.M., Maashi, M., Salama, A.S., Hamza, M.A., Ibrahim, S.S., Zamani, A.S., and Alsaid, M.I. (2023). Intrusion Detection Using Chaotic Poor and Rich Optimization with Deep Learning Model for Smart City Environment. Sustainability, 15.","DOI":"10.3390\/su15086902"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Al-Taleb, N., and Saqib, N.A. (2022). Towards a hybrid machine learning model for intelligent cyber threat identification in smart city environments. Appl. Sci., 12.","DOI":"10.3390\/app12041863"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Bilakanti, H., Pasam, S., Palakollu, V., and Utukuru, S. (2024). Anomaly detection in IoT environment using machine learning. Secur. Priv., e366.","DOI":"10.1002\/spy2.366"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Lin, C., Du, B., Sun, L., and Li, L. (2024). Hierarchical Context Representation and Self-adaptive Thresholding for Multivariate Anomaly Detection. IEEE Trans. Knowl. Data Eng., 1\u201312.","DOI":"10.1109\/TKDE.2024.3360640"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1007\/s10723-023-09727-1","article-title":"Anomaly Detection in Cloud Computing using Knowledge Graph Embedding and Machine Learning Mechanisms","volume":"22","author":"Mitropoulou","year":"2024","journal-title":"J. Grid Comput."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"7157","DOI":"10.1109\/ACCESS.2023.3237554","article-title":"Distributed Anomaly Detection in Smart Grids: A Federated Learning-Based Approach","volume":"11","author":"Jithish","year":"2023","journal-title":"IEEE Access"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"15468","DOI":"10.1109\/JIOT.2021.3073705","article-title":"Monotone split and conquer for anomaly detection in IoT sensory data","volume":"8","author":"Dang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"78658","DOI":"10.1109\/ACCESS.2021.3083060","article-title":"Machine learning for anomaly detection: A systematic review","volume":"9","author":"Nassif","year":"2021","journal-title":"IEEE Access"},{"key":"ref_21","first-page":"V005T05A027","article-title":"Split Training Method to Generate Data Driven Model for Gas Turbine Engine Anomaly Detection. In Turbo Expo: Power for Land, Sea, and Air","volume":"84140","author":"Takiguchi","year":"2020","journal-title":"Am. Soc. Mech. Eng."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Nixon, C., Sedky, M., and Hassan, M. (2021). SALAD: An Exploration of Split Active Learning based Unsupervised Network Data Stream Anomaly Detection using Autoencoders. TechRxiv.","DOI":"10.36227\/techrxiv.14896773"},{"key":"ref_23","first-page":"32854","article-title":"AnoShift: A distribution shift benchmark for unsupervised anomaly detection","volume":"35","author":"Dragoi","year":"2022","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"20445","DOI":"10.1007\/s11227-023-05474-y","article-title":"A network anomaly detection algorithm based on semi-supervised learning and adaptive multiclass balancing","volume":"79","author":"Zhang","year":"2023","journal-title":"J. Supercomput."},{"key":"ref_25","unstructured":"(2023, November 30). NSL-KDD Dataset. Available online: http:\/\/nsl.cs.unb.ca\/nsl-kdd\/."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Moustafa, N., and Slay, J. (2015, January 10\u201312). UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, Australia.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.comcom.2022.12.010","article-title":"A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework","volume":"199","author":"Kasongo","year":"2023","journal-title":"Comput. Commun."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.comcom.2022.11.009","article-title":"An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things","volume":"198","author":"Jahromi","year":"2023","journal-title":"Comput. Commun."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Alazab, A., Khraisat, A., Singh, S., and Jan, T. (2023). Enhancing Privacy-Preserving Intrusion Detection through Federated Learning. Electronics, 12.","DOI":"10.3390\/electronics12163382"}],"container-title":["Big Data and Cognitive Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2504-2289\/8\/3\/21\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:03:26Z","timestamp":1760105006000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2504-2289\/8\/3\/21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,22]]},"references-count":29,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["bdcc8030021"],"URL":"https:\/\/doi.org\/10.3390\/bdcc8030021","relation":{},"ISSN":["2504-2289"],"issn-type":[{"value":"2504-2289","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,22]]}}}