{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T22:20:07Z","timestamp":1775082007710,"version":"3.50.1"},"reference-count":28,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T00:00:00Z","timestamp":1766102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Federated learning (FL) is a promising privacy-preserving paradigm for machine learning in distributed environments. Although FL reduces communication overhead, it does not itself provide low-latency guarantees. In IIoT environments, real-time responsiveness is primarily enabled by edge computing and local inference, while FL contributes indirectly by minimizing the need to transmit raw data across the network. This paper explores the use of FL for intrusion detection in IIoT networks and compares its performance with traditional centralized machine learning approaches. A simulated IIoT environment was developed in which each node locally trains a model on synthetic normal and attack traffic data, sharing only model parameters with a central server. The Flower framework was employed to coordinate training and model aggregation across multiple clients without exposing raw data. Experimental results show that FL achieves detection accuracy comparable to centralized models while significantly reducing privacy risks and network transmission overhead. These results demonstrate the feasibility of FL as a secure and scalable solution for IIoT intrusion detection. Future work will validate the approach on real-world datasets and heterogeneous edge devices to further assess its robustness and effectiveness.<\/jats:p>","DOI":"10.3390\/fi18010002","type":"journal-article","created":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T14:27:16Z","timestamp":1766154436000},"page":"2","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Federated Learning-Based Intrusion Detection in Industrial IoT Networks"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0855-5727","authenticated-orcid":false,"given":"George Dominic","family":"Pecherle","sequence":"first","affiliation":[{"name":"Faculty of Electrical Engineering and Information Technology, Department of Computers and Information Technology, University of Oradea, 410087 Oradea, Romania"}]},{"given":"Robert \u0218tefan","family":"Gy\u0151r\u00f6di","sequence":"additional","affiliation":[{"name":"Faculty of Electrical Engineering and Information Technology, Department of Computers and Information Technology, University of Oradea, 410087 Oradea, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7815-4355","authenticated-orcid":false,"given":"Cornelia Aurora","family":"Gy\u0151r\u00f6di","sequence":"additional","affiliation":[{"name":"Faculty of Electrical Engineering and Information Technology, Department of Computers and Information Technology, University of Oradea, 410087 Oradea, Romania"}]}],"member":"1968","published-online":{"date-parts":[[2025,12,19]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","article-title":"The Internet of Things (IoT): Applications, investments, and challenges for enterprises","volume":"58","author":"Lee","year":"2015","journal-title":"Bus. Horiz."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","article-title":"Security, privacy and trust in Internet of Things: The road ahead","volume":"76","author":"Sicari","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P.L., Iorkyase, E., Tachtatzis, C., and Atkinson, R. (2016, January 11\u201313). Threat analysis of IoT networks using artificial neural network intrusion detection system. Proceedings of the IEEE International Symposium on Networks, Computers and Communications (ISNCC), Yasmine Hammamet, Tunisia.","DOI":"10.1109\/ISNCC.2016.7746067"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"3347","DOI":"10.1109\/TKDE.2021.3124599","article-title":"A survey on federated learning systems: Vision, hype and reality for data privacy and protection","volume":"35","author":"Li","year":"2021","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_5","unstructured":"Bonawitz, K., Eichner, H., Grieskamp, W., Huba, D., Ingerman, A., Ivanov, V., Kiddon, C., Kone\u010dn\u00fd, J., Mazzocchi, S., and McMahan, H.B. (April, January 31). Towards federated learning at scale: System design. Proceedings of the 2nd SysML Conference, Stanford, CA, USA."},{"key":"ref_6","unstructured":"Flower (2025, September 27). A Friendly Federated Learning Framework. Available online: https:\/\/flower.dev\/."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"12598","DOI":"10.1038\/s41598-020-69250-1","article-title":"Federated learning in medicine: Facilitating multi-institutional collaborations without sharing patient data","volume":"10","author":"Sheller","year":"2020","journal-title":"Sci. Rep."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., and Ghorbani, A.A. (2009, January 8\u201310). A Detailed Analysis of the KDD CUP 99 Data Set. Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), Ottawa, ON, Canada.","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1690","DOI":"10.1016\/j.eswa.2013.08.066","article-title":"A Novel Hybrid Intrusion Detection Method Integrating Anomaly Detection with Misuse Detection","volume":"41","author":"Kim","year":"2014","journal-title":"Expert Syst. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Moustafa, N., and Slay, J. (2015, January 10\u201312). UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Net-work Data Set). Proceedings of the Military Communications and Information Systems Conference (MilCIS), Canberra, Australia.","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"ref_11","first-page":"2653","article-title":"N-BaIoT: Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders","volume":"5","author":"Meidan","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., and Ghorbani, A.A. (2018, January 22\u201324). Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization. Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP), Funchal, Portugal.","DOI":"10.5220\/0006639801080116"},{"key":"ref_13","unstructured":"McMahan, H.B., Moore, E., Ramage, D., Hampson, S., and y Arcas, B.A. (2017, January 20\u201322). Communication-efficient learning of deep networks from decentralized data. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS), Fort Lauderdale, FL, USA."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/2200000083","article-title":"Advances and Open Problems in Federated Learning","volume":"14","author":"Kairouz","year":"2021","journal-title":"Found. Trends\u00ae Mach. Learn."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1622","DOI":"10.1109\/COMST.2021.3075439","article-title":"Federated Learning for Internet of Things: A Comprehensive Survey","volume":"23","author":"Nguyen","year":"2021","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_16","unstructured":"Khan, M.A., Junejo, K.N., and Felemban, E. (2023). Federated Learning-Based Intrusion Detection in IoT: A Comprehensive Survey and Performance Evaluation. Sensors, 23."},{"key":"ref_17","first-page":"104213","article-title":"Hierarchical Federated Learning for Intrusion Detection in IoT Networks","volume":"10","author":"Li","year":"2022","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MNET.011.1900317","article-title":"Federated Learning for Data Privacy Preservation in Vehicular Cyber-Physical Systems","volume":"34","author":"Lu","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Yadav, P., Rajasegarar, S., Leckie, C., and Kumar, M. (2023). A Comparative Analysis of Federated and Centralized Learning for Network Intrusion Detection. Future Internet, 15.","DOI":"10.3390\/fi15070243"},{"key":"ref_20","first-page":"5092","article-title":"Federated Learning with Non-IID Data","volume":"66","author":"Zhao","year":"2018","journal-title":"IEEE Trans. Signal Process."},{"key":"ref_21","first-page":"563","article-title":"Robust Federated Learning Against Poisoning Attacks in Industrial IoT","volume":"152","author":"Zhang","year":"2024","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_22","unstructured":"(2025, October 15). WUSTL-IIoT-2021 Dataset. Washington University in St. Louis. Available online: https:\/\/www.cse.wustl.edu\/~jain\/iiot2\/index.html."},{"key":"ref_23","unstructured":"(2025, October 17). CIC-APT-IIoT Dataset. Canadian Institute for Cybersecurity, University of New Brunswick. Available online: https:\/\/www.unb.ca\/cic\/datasets\/iiot-dataset-2024.html."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"18401","DOI":"10.1007\/s00521-025-11385-1","article-title":"GRAF-IDS: Graph-Based Clustering as Aggregation for Federated Intrusion Detection System in IoT Network","volume":"37","author":"Rezaei","year":"2025","journal-title":"Neural Comput. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/s10922-025-09963-8","article-title":"Federated RNN for Intrusion Detection System in IoT Environment Under Adversarial Attack","volume":"33","author":"Rezaei","year":"2025","journal-title":"J. Netw. Syst. Manag."},{"key":"ref_26","first-page":"37","article-title":"Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness & Correlation","volume":"2","author":"Powers","year":"2011","journal-title":"J. Mach. Learn. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1016\/j.ipm.2009.03.002","article-title":"A systematic analysis of performance measures for classification tasks","volume":"45","author":"Sokolova","year":"2009","journal-title":"Inf. Process. Manag."},{"key":"ref_28","unstructured":"Han, J., Kamber, M., and Pei, J. (2011). Data Mining: Concepts and Techniques, Morgan Kaufmann. [3rd ed.]."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/18\/1\/2\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T00:00:12Z","timestamp":1766707212000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/18\/1\/2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,19]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["fi18010002"],"URL":"https:\/\/doi.org\/10.3390\/fi18010002","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,19]]}}}