{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T07:12:04Z","timestamp":1772003524245,"version":"3.50.1"},"reference-count":0,"publisher":"IACSIT Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJCTE"],"published-print":{"date-parts":[[2026]]},"abstract":"<jats:p>This paper presents Zero-Knowledge Federated Learning Guard (ZK-FLGuard), a privacy-preserving and verifiable federated learning framework for real-time anomaly detection in Fifth-Generation Mobile Network (5G)-enabled Internet of Things (IoT) environments. Building on the integration of zero-knowledge proofs (zk-SNARK\u2014Zero-Knowledge Succinct Non-interactive Argument of Knowledge) and blockchain-based access control, ZK-FLGuard ensures the integrity of model updates without exposing private data. Using real-world intrusion detection datasets (CICIDS2017\u2014Canadian Institute for Cybersecurity Intrusion Detection System 2017, TON_IoT\u2014Telecommunications Organisation of the National Security\u2014IoT) and a synthetic adversarial dataset, our evaluation shows that ZK-FLGuard achieves up to 0.96 \nF1-score (harmonic mean of precision and recall), improves recall in low-frequency attack detection, and introduces less than 10% additional latency overhead compared to standard Federated Learning (FL). Compared with centralized Long Short-Term Memory (LSTM) and FL without Zero-Knowledge Proof (ZKP), ZK-FLGuard provides competitive accuracy while ensuring verifiable computation and strong privacy guarantees. We address the critical challenge of securing federated anomaly detection in 5G-enabled IoT systems against data leakage, model poisoning, and unauthorized access. While FL preserves privacy by keeping raw data local, it remains vulnerable to gradient leakage and adversarial manipulation. Our hypothesis is that combining zero-knowledge proofs and blockchain with FL can deliver a scalable, tamper-resistant, and privacy-preserving detection pipeline suitable for resource-constrained edge environments.<\/jats:p>","DOI":"10.7763\/ijcte.2026.v18.1386","type":"journal-article","created":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T06:36:25Z","timestamp":1772001385000},"page":"27-37","source":"Crossref","is-referenced-by-count":0,"title":["ZK-FLGuard: Verifiable Privacy via Zero-Knowledge Proofs in Federated Anomaly Detection for 5G Edge-IoT Systems"],"prefix":"10.7763","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8872-5721","authenticated-orcid":false,"given":"Manuel J. C. S.","family":"Reis","sequence":"first","affiliation":[]}],"member":"4507","published-online":{"date-parts":[[2026]]},"container-title":["International Journal of Computer Theory and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/www.ijcte.org\/vol18\/IJCTE-V18N1-1386.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T06:36:25Z","timestamp":1772001385000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.ijcte.org\/show-152-1713-1.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":0,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026]]},"published-print":{"date-parts":[[2026]]}},"URL":"https:\/\/doi.org\/10.7763\/ijcte.2026.v18.1386","relation":{},"ISSN":["1793-8201"],"issn-type":[{"value":"1793-8201","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]}}}