{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T15:20:14Z","timestamp":1777476014948,"version":"3.51.4"},"reference-count":31,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2025,6,8]],"date-time":"2025-06-08T00:00:00Z","timestamp":1749340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Sciences"],"abstract":"<jats:p>The rapid convergence of 5G networks and Internet of Things (IoT) technologies has unlocked unprecedented connectivity and responsiveness across smart environments\u2014but has also amplified cybersecurity risks due to device heterogeneity, data privacy concerns, and distributed attack surfaces. To address these challenges, we propose Edge-FLGuard, a federated learning and edge AI-based anomaly detection framework tailored for real-time protection in 5G-enabled IoT ecosystems. The framework integrates lightweight deep learning models\u2014specifically autoencoders and LSTM networks\u2014for on-device inference, combined with a privacy-preserving federated training pipeline to enable scalable, decentralized threat detection without raw data sharing. We evaluate Edge-FLGuard using both public (CICIDS2017, TON_IoT) and synthetic datasets under diverse attack scenarios including spoofing, DDoS, and unauthorized access. Experimental results demonstrate high detection accuracy (F1-score \u2265 0.91, AUC-ROC up to 0.96), low inference latency (&lt;20 ms), and robustness against data heterogeneity and adversarial conditions. By aligning edge intelligence with secure, collaborative learning, Edge-FLGuard offers a practical and scalable cybersecurity solution for next-generation IoT deployments.<\/jats:p>","DOI":"10.3390\/app15126452","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T08:22:34Z","timestamp":1749457354000},"page":"6452","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Edge-FLGuard: A Federated Learning Framework for Real-Time Anomaly Detection in 5G-Enabled IoT Ecosystems"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8872-5721","authenticated-orcid":false,"given":"Manuel J. C. S.","family":"Reis","sequence":"first","affiliation":[{"name":"Engineering Department and IEETA, University of Tr\u00e1s-os-Montes e Alto Douro, Quinta de Prados, 5000-801 Vila Real, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.comnet.2016.01.009","article-title":"Cloud-Assisted Industrial Internet of Things (IIoT)\u2014Enabled Framework for Health Monitoring","volume":"101","author":"Hossain","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"860","DOI":"10.1109\/COMST.2015.2481722","article-title":"Cognitive Radio for Smart Grids: Survey of Architectures, Spectrum Sensing Mechanisms, and Networking Protocols","volume":"18","author":"Khan","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Choo, K.-K.R. (2021). Internet of Things (IoT) Security and Forensics: Challenges and Opportunities. Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, Association for Computing Machinery.","DOI":"10.1145\/3462633.3484691"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1851","DOI":"10.1109\/COMST.2019.2891891","article-title":"A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities","volume":"21","author":"Alshamrani","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_5","unstructured":"Intersoft Consulting (2025, May 27). The EU General Data Protection Regulation (GDPR). Available online: https:\/\/gdpr-info.eu\/."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Nasr, M., Shokri, R., and Houmansadr, A. (2019, January 20\u201322). Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks against Centralized and Federated Learning. Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP.2019.00065"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","article-title":"Edge Computing: Vision and Challenges","volume":"3","author":"Shi","year":"2016","journal-title":"IEEE Internet Things J."},{"key":"ref_8","first-page":"106","article-title":"(Daphne) Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities","volume":"54","author":"Luo","year":"2021","journal-title":"ACM Comput. Surv."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1007\/s10723-023-09695-6","article-title":"Novel Edge Computing-Based Privacy-Preserving Approach for Smart Healthcare Systems in the Internet of Medical Things","volume":"21","author":"Meng","year":"2023","journal-title":"J. Grid Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"6822","DOI":"10.1109\/JIOT.2019.2912022","article-title":"Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things","volume":"6","author":"Zolanvari","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/2200000083","article-title":"Advances and Open Problems in Federated Learning","volume":"14","author":"Kairouz","year":"2021","journal-title":"Found. Trends\u00ae Mach. Learn."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Groen, D., de Mulatier, C., Paszynski, M., Krzhizhanovskaya, V.V., Dongarra, J.J., and Sloot, P.M.A. Federated Learning for Anomaly Detection in Industrial IoT-Enabled Production Environment Supported by Autonomous Guided Vehicles. Proceedings of the Computational Science\u2014ICCS 2022.","DOI":"10.1007\/978-3-031-08760-8"},{"key":"ref_13","unstructured":"Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., and Shmatikov, V. (2020, January 3). How To Backdoor Federated Learning. Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics, PMLR, Palermo, Sicily, Italy."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Nguyen, H., Nguyen, T., Lepp\u00e4nen, T., Partala, J., and Pirttikangas, S. (2022). Situation Awareness for Autonomous Vehicles Using Blockchain-Based Service Cooperation. arXiv.","DOI":"10.1007\/978-3-031-07472-1_29"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"140699","DOI":"10.1109\/ACCESS.2020.3013541","article-title":"Federated Learning: A Survey on Enabling Technologies, Protocols, and Applications","volume":"8","author":"Aledhari","year":"2020","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.cose.2018.11.001","article-title":"Survey of Machine Learning Techniques for Malware Analysis","volume":"81","author":"Ucci","year":"2019","journal-title":"Comput. Secur."},{"key":"ref_17","unstructured":"Javaid, A., Niyaz, Q., Sun, W., and Alam, M. A Deep Learning Approach for Network Intrusion Detection System. Proceedings of the 9th EAI International Conference on Bio-inspired Information and Communications Technologies (formerly BIONETICS)."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","article-title":"IoT Security: Review, Blockchain Solutions, and Open Challenges","volume":"82","author":"Khan","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/MCOM.2017.1700879","article-title":"BlockChain: A Distributed Solution to Automotive Security and Privacy","volume":"55","author":"Dorri","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","article-title":"N-BaIoT\u2014Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders","volume":"17","author":"Meidan","year":"2018","journal-title":"IEEE Pervasive Comput."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2417","DOI":"10.1007\/s11277-021-09071-1","article-title":"A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework","volume":"127","author":"Revathi","year":"2022","journal-title":"Wirel. Pers. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"41525","DOI":"10.1109\/ACCESS.2019.2895334","article-title":"Deep Learning Approach for Intelligent Intrusion Detection System","volume":"7","author":"Vinayakumar","year":"2019","journal-title":"IEEE Access"},{"key":"ref_23","first-page":"7314","article-title":"Tackling Data Heterogeneity in Federated Learning with Class Prototypes","volume":"37","author":"Dai","year":"2023","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"ref_24","unstructured":"McMahan, B., Moore, E., Ramage, D., Hampson, S., and Arcas, B.A. (2017, January 10). y Communication-Efficient Learning of Deep Networks from Decentralized Data. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, PMLR, Fort Lauderdale, FL, USA."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"4641","DOI":"10.1109\/JIOT.2020.2964162","article-title":"Federated Learning With Cooperating Devices: A Consensus Approach for Massive IoT Networks","volume":"7","author":"Savazzi","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1205","DOI":"10.1109\/JSAC.2019.2904348","article-title":"Adaptive Federated Learning in Resource Constrained Edge Computing Systems","volume":"37","author":"Wang","year":"2019","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Ochiai, H., Nishihata, R., Tomiyama, E., Sun, Y., and Esaki, H. (2024). Detection of Global Anomalies on Distributed IoT Edges with Device-to-Device Communication. arXiv.","DOI":"10.1145\/3565287.3616528"},{"key":"ref_28","unstructured":"Zhao, Y., Li, M., Lai, L., Suda, N., Civin, D., and Chandra, V. (2018). Federated Learning with Non-IID Data. arXiv."},{"key":"ref_29","unstructured":"Geyer, R.C., Klein, T., and Nabi, M. (2018). Differentially Private Federated Learning: A Client Level Perspective. arXiv."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H.B., Patel, S., Ramage, D., Segal, A., and Seth, K. Practical Secure Aggregation for Privacy-Preserving Machine Learning. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.","DOI":"10.1145\/3133956.3133982"},{"key":"ref_31","unstructured":"Blanchard, P., El Mhamdi, E.M., Guerraoui, R., and Stainer, J. (2017). Machine Learning with Adversaries: Byzantine Tolerant Gradient Descent. Proceedings of the Advances in Neural Information Processing Systems, Curran Associates, Inc.. Available online: https:\/\/dl.acm.org\/doi\/10.5555\/3294771.3294783."}],"container-title":["Applied Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2076-3417\/15\/12\/6452\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:48:34Z","timestamp":1760032114000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2076-3417\/15\/12\/6452"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,8]]},"references-count":31,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["app15126452"],"URL":"https:\/\/doi.org\/10.3390\/app15126452","relation":{},"ISSN":["2076-3417"],"issn-type":[{"value":"2076-3417","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,8]]}}}