{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:19:11Z","timestamp":1776442751179,"version":"3.51.2"},"reference-count":37,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T00:00:00Z","timestamp":1751587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"European Union","award":["PE00000001"],"award-info":[{"award-number":["PE00000001"]}]},{"name":"European Union","award":["CUP F83C22001690001"],"award-info":[{"award-number":["CUP F83C22001690001"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Informatics"],"abstract":"<jats:p>The rapid expansion of the Internet of Things (IoT) ecosystem has transformed industries but also exposed significant cybersecurity vulnerabilities. Traditional centralized methods for securing IoT networks struggle to balance privacy preservation with real-time threat detection. This study presents a Federated Learning-Driven Cybersecurity Framework designed for IoT environments, enabling decentralized data processing through local model training on edge devices to ensure data privacy. Secure aggregation using homomorphic encryption supports collaborative learning without exposing sensitive information. The framework employs GRU-based recurrent neural networks (RNNs) for anomaly detection, optimized for resource-constrained IoT networks. Experimental results demonstrate over 98% accuracy in detecting threats such as distributed denial-of-service (DDoS) attacks, with a 20% reduction in energy consumption and a 30% reduction in communication overhead, showcasing the framework\u2019s efficiency over traditional centralized approaches. This work addresses critical gaps in IoT cybersecurity by integrating federated learning with advanced threat detection techniques. It offers a scalable, privacy-preserving solution for diverse IoT applications, with future directions including blockchain integration for model aggregation traceability and quantum-resistant cryptography to enhance security.<\/jats:p>","DOI":"10.3390\/informatics12030062","type":"journal-article","created":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:54:52Z","timestamp":1751608492000},"page":"62","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["Federated Learning-Driven Cybersecurity Framework for IoT Networks with Privacy Preserving and Real-Time Threat Detection Capabilities"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-8471-0969","authenticated-orcid":false,"given":"Milad","family":"Rahmati","sequence":"first","affiliation":[{"name":"Independent Researcher, Los Angeles, CA 90018, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0342-4760","authenticated-orcid":false,"given":"Antonino","family":"Pagano","sequence":"additional","affiliation":[{"name":"Department of Engineering, University of Palermo, 90128 Palermo, Italy"},{"name":"CNIT, Consorzio Nazionale Interuniversitario per le Telecomunicazioni, 43124 Parma, Italy"}]}],"member":"1968","published-online":{"date-parts":[[2025,7,4]]},"reference":[{"key":"ref_1","unstructured":"IoT Analytics (2025, July 01). The State of IoT: 2021 Edition. IoT Analytics Report., Available online: https:\/\/iot-analytics.com\/product\/state-of-iot-summer-2021\/."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"103787","DOI":"10.1016\/j.rineng.2024.103787","article-title":"Transformative Impacts of the Internet of Medical Things on Modern Healthcare","volume":"25","author":"Ahmed","year":"2024","journal-title":"Results Eng."},{"key":"ref_3","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., and Arcas, B.A. (2017, January 20\u201322). Communication-Efficient Learning of Deep Networks from Decentralized Data. Proceedings of the Artificial Intelligence and Statistics, Fort Lauderdale, FL, USA."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H.B., Patel, S., Ramage, D., Segal, A., and Seth, K. (2019, January 11\u201315). Practical Secure Aggregation for Privacy-Preserving Machine Learning. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, London, UK.","DOI":"10.1145\/3133956.3133982"},{"key":"ref_5","first-page":"2908","article-title":"A Blockchain and AI-Driven Security Framework for Cognitive Cities","volume":"4","author":"Himdi","year":"2024","journal-title":"Adv. Artif. Intell. Mach. Learn."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"16525","DOI":"10.1007\/s11042-024-19688-6","article-title":"A Hybrid Optimization Approach for Securing Cloud-Based E-Health Systems","volume":"84","author":"Altherwi","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Shafique, M., Marchisio, A., Putra, R.V.W., and Hanif, M.A. (November, January 1). Towards energy-efficient and secure edge AI: A cross-layer framework. ICCAD special session paper. Proceedings of the 2021 IEEE\/ACM International Conference On Computer Aided Design (ICCAD), IEEE, Virtual.","DOI":"10.1109\/ICCAD51958.2021.9643539"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Sinha, A., Sharma, N., Kumar, S., Lande, A., and Iqbal, M.I. (2024, January 2\u20133). AI-Enhanced Living: The Future of Smart Homes. Proceedings of the 2023 International Conference on Smart Devices (ICSD), Dehradun, India.","DOI":"10.1109\/ICSD60021.2024.10751168"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Mehta, S., Khurana, M., Dogra, A., and Hariharan, S. (2024, January 5\u20137). Advancing IoT Security through Federated Learning: A Comprehensive Approach. Proceedings of the 2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC), IEEE, Salem, India.","DOI":"10.1109\/ICAAIC60222.2024.10575903"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"64551","DOI":"10.1109\/ACCESS.2024.3394528","article-title":"Transparency and privacy: The role of explainable ai and federated learning in financial fraud detection","volume":"12","author":"Awosika","year":"2024","journal-title":"IEEE Access"},{"key":"ref_11","unstructured":"Iacob, A., Sani, L., Marino, B., Aleksandrov, P., Shen, W.F., and Lane, N.D. (2024). Worldwide federated training of language models. arXiv."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"3388","DOI":"10.1109\/TMC.2021.3056991","article-title":"User-level privacy-preserving federated learning: Analysis and performance optimization","volume":"21","author":"Wei","year":"2021","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Anelli, V.W., Deldjoo, Y., Di Noia, T., and Ferrara, A. (2019, January 19\u201322). Towards effective device-aware federated learning. Proceedings of the AI* IA 2019\u2013Advances in Artificial Intelligence: XVIIIth International Conference of the Italian Association for Artificial Intelligence, Rende, Italy. Proceedings 18.","DOI":"10.1007\/978-3-030-35166-3_34"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Nayak, J., Naik, B., Vimal, S., and Favorskaya, M. (2024). Machine Learning for Cyber-Physical Systems: Advances and Challenges, Springer.","DOI":"10.1007\/978-3-031-54038-7"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"108661","DOI":"10.1016\/j.comnet.2021.108661","article-title":"Evaluating Federated Learning for intrusion detection in Internet of Things: Review and challenges","volume":"203","author":"Campos","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3712000","article-title":"Recent advances of differential privacy in centralized deep learning: A systematic survey","volume":"57","author":"Demelius","year":"2025","journal-title":"ACM Comput. Surv."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Baqer, M. (2024). Energy-Efficient Federated Learning for Internet of Things: Leveraging In-Network Processing and Hierarchical Clustering. Future Internet, 17.","DOI":"10.3390\/fi17010004"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Li, S., Ngai, E., and Voigt, T. (2024). Byzantine-Robust Aggregation in Federated Learning. IEEE Transactions on Industrial Informatics, IEEE.","DOI":"10.1109\/TBDATA.2023.3237397"},{"key":"ref_19","unstructured":"Canadian Institute for Cybersecurity (2025, March 30). CICIDS2017 Dataset. Available online: https:\/\/www.unb.ca\/cic\/datasets\/ids-2017.html."},{"key":"ref_20","first-page":"108","article-title":"Toward generating a new intrusion detection dataset and intrusion traffic characterization","volume":"1","author":"Sharafaldin","year":"2018","journal-title":"ICISSp"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Khan, M.M., and Alkhathami, M. (2024). Anomaly detection in IoT-based healthcare: Machine learning for enhanced security. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-56126-x"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Khan, R., Taj, S., Ma, X., Noor, A., Zhu, H., Khan, J., Khan, Z.U., and Khan, S.U. (2024). Advanced federated ensemble internet of learning approach for cloud based medical healthcare monitoring system. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-77196-x"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"e1657","DOI":"10.7717\/peerj-cs.1657","article-title":"Integration of federated learning with IoT for smart cities applications, challenges, and solutions","volume":"9","author":"Ghadi","year":"2023","journal-title":"PeerJ Comput. Sci."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Priyadarshini, I. (2024). Anomaly detection of iot cyberattacks in smart cities using federated learning and split learning. Big Data Cogn. Comput., 8.","DOI":"10.3390\/bdcc8030021"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Aljunaid, S.K., Almheiri, S.J., Dawood, H., and Khan, M.A. (2025). Secure and Transparent Banking: Explainable AI-Driven Federated Learning Model for Financial Fraud Detection. J. Risk Financ. Manag., 18.","DOI":"10.3390\/jrfm18040179"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Arora, S., Beams, A., Chatzigiannis, P., Meiser, S., Patel, K., Raghuraman, S., Rindal, P., Shah, H., Wang, Y., and Wu, Y. (2024, January 9\u201313). Privacy-preserving financial anomaly detection via federated learning & multi-party computation. Proceedings of the 2024 Annual Computer Security Applications Conference Workshops (ACSAC Workshops), Honolulu, HI, USA.","DOI":"10.1109\/ACSACW65225.2024.00038"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Dritsas, E., and Trigka, M. (2025). Federated Learning for IoT: A Survey of Techniques, Challenges, and Applications. J. Sens. Actuator Netw., 14.","DOI":"10.3390\/jsan14010009"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"104918","DOI":"10.1016\/j.jpdc.2024.104918","article-title":"Balancing privacy and performance in federated learning: A systematic literature review on methods and metrics","volume":"192","author":"Mohammadi","year":"2024","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"101035","DOI":"10.1016\/j.iot.2023.101035","article-title":"Edge AI for Internet of Energy: Challenges and perspectives","volume":"25","author":"Himeur","year":"2024","journal-title":"Internet Things"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Ram\u00edrez-Gordillo, T., Maci\u00e1-Lillo, A., Pujol, F.A., Garc\u00eda-D\u2019Urso, N., Azor\u00edn-L\u00f3pez, J., and Mora, H. (2025). Decentralized Identity Management for Internet of Things (IoT) Devices Using IOTA Blockchain Technology. Future Internet, 17.","DOI":"10.3390\/fi17010049"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"101032","DOI":"10.1016\/j.measen.2024.101032","article-title":"Blockchain aware decentralized identity management and access control system","volume":"31","author":"Agarkar","year":"2024","journal-title":"Meas. Sens."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"100242","DOI":"10.1016\/j.array.2022.100242","article-title":"Post-quantum cryptography Algorithm\u2019s standardization and performance analysis","volume":"15","author":"Kumar","year":"2022","journal-title":"Array"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Amirkhanova, D.S., Iavich, M., and Mamyrbayev, O. (2024). Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal\u2019s Principles. Cryptography, 8.","DOI":"10.3390\/cryptography8030031"},{"key":"ref_34","unstructured":"Sibanda, I. (2024). The Rise of Quantum-Resistant Cryptography. IEEE Comput. Soc., Available online: https:\/\/www.computer.org\/publications\/tech-news\/trends\/quantum-resistant-cryptography\/."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Alalhareth, M., and Hong, S.C. (2024). Enhancing the internet of medical things (IoMT) security with meta-learning: A performance-driven approach for ensemble intrusion detection systems. Sensors, 24.","DOI":"10.3390\/s24113519"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Rihan, S.D.A., Anbar, M., and Alabsi, B.A. (2023). Meta-learner-based approach for detecting attacks on internet of things networks. Sensors, 23.","DOI":"10.3390\/s23198191"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s44248-024-00010-6","article-title":"Benchmarking of Secure Group Communication schemes with focus on IoT","volume":"2","author":"Prantl","year":"2024","journal-title":"Discov. Data"}],"container-title":["Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2227-9709\/12\/3\/62\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:04:24Z","timestamp":1760033064000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2227-9709\/12\/3\/62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,4]]},"references-count":37,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["informatics12030062"],"URL":"https:\/\/doi.org\/10.3390\/informatics12030062","relation":{},"ISSN":["2227-9709"],"issn-type":[{"value":"2227-9709","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,7,4]]}}}