Privacy‑Enhanced Federated Learning Framework for Intrusion Detection in Smart IoT Environments
DOI:
https://doi.org/10.65890/race.v1i2.153Keywords:
Federated Learning, IDS, IoT Security, Smart Devices, Privacy preservingAbstract
The rapid proliferation of the Internet of Things (IoT) has given rise to Smart Environments where sensors, actuators and embedded systems interact seamlessly to provide automation and convenience. Recent reports estimate that the number of connected IoT devices reached 14.4 billion in 2022 and continues to grow despite supply‑chain disruptions. Unfortunately, this connectivity also exposes critical infrastructures to malware, botnets and other cyber‑attacks. Conventional intrusion detection systems (IDS) are often ill‑suited for resource‑constrained IoT nodes because they require centralised data collection, violating privacy regulations and incurring excessive bandwidth consumption. Federated learning (FL) has emerged as a promising paradigm to overcome these limitations by enabling collaborative model training directly on edge devices. However, FL alone does not guarantee privacy, model updates may leak sensitive information and naive aggregators remain vulnerable to single points of failure. This work proposes a privacy‑enhanced federated learning framework for anomaly and malware detection in Smart IoT environments. The contributions of this research paper is threefold: (1) a hierarchical FL architecture that distributes computation across edge, fog and cloud tiers, incorporating differentially private noise to model updates is designed; (2) a multi‑agent intrusion detection algorithm that trains lightweight deep models locally using real traffic data while a fog‑level coordinator performs secure aggregation is developed; and (3) extensive experiments on modern IoT intrusion datasets to evaluate detection accuracy, communication overhead and resource consumption is done. The results show that the proposed framework achieves comparable accuracy to centralised training while substantially improving privacy and resilience.
References
[1] Sharma, Y., Sharma, S., & Arora, A. (2022, June). Feature ranking using statistical techniques for computer networks intrusion detection. In 2022 7th International Conference on Communication and Electronics Systems (ICCES) (pp. 761-765). IEEE. DOI: https://doi.org/10.1109/ICCES54183.2022.9835831
[2] Khraisat, A., Alazab, A., Alazab, M., Obeidat, A., Singh, S., & Jan, T. (2025). Federated learning for intrusion detection in IoT environments: a privacy-preserving strategy. Discover Internet of Things, 5(1), 72. DOI: https://doi.org/10.1007/s43926-025-00169-7
[3] Sharma, H., Kumar, P., & Sharma, K. (2025, July). Deep Learning based Ensemble Model for Intrusion Detection in IoT Network. In 2025 International Conference on Innovations in Intelligent Systems: Advancements in Computing, Communication, and Cybersecurity (ISAC3) (pp. 1-6). IEEE. DOI: https://doi.org/10.1109/ISAC364032.2025.11156772
[4] Albanbay, N., Tursynbek, Y., Graffi, K., Uskenbayeva, R., Kalpeyeva, Z., Abilkaiyr, Z., & Ayapov, Y. (2025). Federated learning-based intrusion detection in IoT networks: Performance evaluation and data scaling study. Journal of Sensor and Actuator Networks, 14(4), 78. DOI: https://doi.org/10.3390/jsan14040078
[5] Karunamurthy, A., Vijayan, K., Kshirsagar, P. R., & Tan, K. T. (2025). An optimal federated learning-based intrusion detection for IoT environment. Scientific Reports, 15(1), 8696. DOI: https://doi.org/10.1038/s41598-025-93501-8
[6] Islam, M. M., Abdullah, W. M., & Saha, B. N. (2025). Privacy-Preserving Hierarchical Fog Federated Learning (PP-HFFL) for IoT Intrusion Detection. Sensors (Basel, Switzerland), 25(23), 7296. DOI: https://doi.org/10.3390/s25237296
[7] Sharma, H., Kumar, P., & Sharma, K. (2023, February). Identification of device type using transformers in heterogeneous internet of things traffic. In International Conference On Innovative Computing And Communication (pp. 471-481). Singapore: Springer Nature Singapore. DOI: https://doi.org/10.1007/978-981-99-3010-4_40
[8] Friha, O., Ferrag, M. A., Benbouzid, M., Berghout, T., Kantarci, B., & Choo, K. K. R. (2023). 2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT. Computers & Security, 127, 103097. DOI: https://doi.org/10.1016/j.cose.2023.103097
[9] Truex, S., Baracaldo, N., Anwar, A., Steinke, T., Ludwig, H., Zhang, R., & Zhou, Y. (2019, November). A hybrid approach to privacy-preserving federated learning. In Proceedings of the 12th ACM workshop on artificial intelligence and security (pp. 1-11). DOI: https://doi.org/10.1145/3338501.3357370
[10] Sharma, H., Kumar, P., & Sharma, K. (2025). Advanced Security for IoT and Smart Devices: Addressing Modern Threats and Solutions. Emerging Threats and Countermeasures in Cybersecurity, 191-216. DOI: https://doi.org/10.1002/9781394230600.ch10
[11] Gupta, R., Gusain, N., Shirole, B. S., Jagtap, M. T., Thomas, S. A., & KUMAR, S. (2025). Optimizing Healthcare Management Systems with AI and Machine Learning. South Eastern European Journal of Public Health, 2973-2985.
[12] Li, Q., Wen, Z., Wu, Z., Hu, S., Wang, N., Li, Y., ... & He, B. (2021). A survey on federated learning systems: Vision, hype and reality for data privacy and protection. IEEE Transactions on Knowledge and Data Engineering, 35(4), 3347-3366. DOI: https://doi.org/10.1109/TKDE.2021.3124599
[13] Gusain, N. (2025). Cardiovascular Disease Prediction through Machine Learning: A Comparative Study of Ensemble Techniques. Revolutionary Advances in Computing and Electronics: An International Journal, 27-40.
[14] Chen, J., Yan, H., Liu, Z., Zhang, M., Xiong, H., & Yu, S. (2024). When federated learning meets privacy-preserving computation. ACM Computing Surveys, 56(12), 1-36. DOI: https://doi.org/10.1145/3679013
[15] Wei, K., Li, J., Ding, M., Ma, C., Yang, H. H., Farokhi, F., ... & Poor, H. V. (2020). Federated learning with differential privacy: Algorithms and performance analysis. IEEE transactions on information forensics and security, 15, 3454-3469. DOI: https://doi.org/10.1109/TIFS.2020.2988575
[16] Sapra, P., Paikaray, D., Gusain, N., Abrol, M., Ramesh, S., & Bhardwaj, S. (2023). Evaluation of soft computing in methodology for calculating information protection from parameters of its distribution in social networks. Soft Computing, 1-11. DOI: https://doi.org/10.1007/s00500-023-08633-8
[17] Lyu, L., Yu, H., Ma, X., Chen, C., Sun, L., Zhao, J., ... & Yu, P. S. (2022). Privacy and robustness in federated learning: Attacks and defenses. IEEE transactions on neural networks and learning systems, 35(7), 8726-8746. DOI: https://doi.org/10.1109/TNNLS.2022.3216981
[18] Gusain, N., & Sharma, H. (2025). Communication-Efficient Federated Learning in Industrial IoT—A Framework for Real-Time Threat Detection and Secure Device Coordination. International Journal on Computational Modelling Applications, 2(2), 18-29. DOI: https://doi.org/10.63503/j.ijcma.2025.115
[19] Sharma, H., Kumar, P., & Sharma, K. (2025). Intelligent Time Series Analysis for Intrusion Detection in the Internet of Things: A Generative-Adversarial-Network-Enhanced Convolutional-Neural-Network–Long-Short-Term-Memory Framework Using Signal Features. Intelligent Computing, 4, 0127. DOI: https://doi.org/10.34133/icomputing.0127
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Revolutionary Advances in Computing and Electronics: An International Journal

This work is licensed under a Creative Commons Attribution 4.0 International License.