Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Sensors,
Journal Year:
2025,
Volume and Issue:
25(1), P. 213 - 213
Published: Jan. 2, 2025
This
paper
provides
the
complete
details
of
current
challenges
and
solutions
in
cybersecurity
cyber-physical
systems
(CPS)
within
context
IIoT
its
integration
with
edge
computing
(IIoT–edge
computing).
We
systematically
collected
analyzed
relevant
literature
from
past
five
years,
applying
a
rigorous
methodology
to
identify
key
sources.
Our
study
highlights
prevalent
layer
attacks,
common
intrusion
methods,
critical
threats
facing
IIoT–edge
environments.
Additionally,
we
examine
various
types
cyberattacks
targeting
CPS,
outlining
their
significant
impact
on
industrial
operations.
A
detailed
taxonomy
primary
security
mechanisms
for
CPS
is
developed,
followed
by
comparative
analysis
our
approach
against
existing
research.
The
findings
underscore
widespread
vulnerabilities
across
architecture,
particularly
relation
DoS,
ransomware,
malware,
MITM
attacks.
review
emphasizes
advanced
technologies,
including
machine
learning
(ML),
federated
(FL),
blockchain,
blockchain–ML,
deep
(DL),
encryption,
cryptography,
IT/OT
convergence,
digital
twins,
as
essential
enhancing
real-time
data
protection
computing.
Finally,
outlines
potential
future
research
directions
aimed
at
advancing
this
rapidly
evolving
domain.
Language: Английский
Multi-attention DeepCRNN: an efficient and explainable intrusion detection framework for Internet of Medical Things environments
Knowledge and Information Systems,
Journal Year:
2025,
Volume and Issue:
unknown
Published: April 5, 2025
Language: Английский
Federated learning with Blockchain on Denial-of-Service attacks detection and classification of edge IIoT networks using Deep Transfer Learning model
Computers & Electrical Engineering,
Journal Year:
2025,
Volume and Issue:
124, P. 110319 - 110319
Published: April 18, 2025
Language: Английский
A hierarchical blockchain architecture for federated learning in edge computing networks
The Journal of Supercomputing,
Journal Year:
2025,
Volume and Issue:
81(7)
Published: May 2, 2025
Language: Английский
A Theoretical Framework for Decentralized Intrusion Detection in Smart Networks Using Blockchain and Machine Learning
Moinul Alam,
No information about this author
Mostafa Monzur Hasan,
No information about this author
Arvil Nath Akash
No information about this author
et al.
Lecture notes on data engineering and communications technologies,
Journal Year:
2025,
Volume and Issue:
unknown, P. 245 - 256
Published: Jan. 1, 2025
Language: Английский
FBLearn: Decentralized Platform for Federated Learning on Blockchain
Daniel Djolev,
No information about this author
Milena Lazarova,
No information about this author
Ognyan Nakov
No information about this author
et al.
Electronics,
Journal Year:
2024,
Volume and Issue:
13(18), P. 3672 - 3672
Published: Sept. 16, 2024
In
recent
years,
rapid
technological
advancements
have
propelled
blockchain
and
artificial
intelligence
(AI)
into
prominent
roles
within
the
digital
industry,
each
having
unique
applications.
Blockchain,
recognized
for
its
secure
transparent
data
storage,
AI,
a
powerful
tool
analysis
decision
making,
exhibit
common
features
that
render
them
complementary.
At
same
time,
machine
learning
has
become
robust
influential
technology,
adopted
by
many
companies
to
address
non-trivial
technical
problems.
This
adoption
is
fueled
vast
amounts
of
generated
utilized
in
daily
operations.
An
intriguing
intersection
AI
occurs
realm
federated
learning,
distributed
approach
allowing
multiple
parties
collaboratively
train
shared
model
without
centralizing
data.
paper
presents
decentralized
platform
FBLearn
implementation
blockchain,
which
enables
us
harness
benefits
necessity
exchanging
sensitive
customer
or
product
data,
thereby
fostering
trustless
collaboration.
As
network
introduced
training
replace
centralized
server,
global
aggregation
approaches
be
utilized.
investigates
several
techniques
based
on
local
average
ensemble
using
either
globally
validation
evaluation.
The
suggested
are
experimentally
evaluated
two
use
cases
platform:
credit
risk
scoring
random
forest
classifier
card
fraud
detection
logistic
regression.
experimental
results
confirm
adaptive
weight
calculation
quality
enhance
robustness
model.
performance
evaluation
metrics
ROC
curves
prove
strategies
successfully
isolate
influence
low-quality
models
final
proposed
system’s
ability
outperform
created
with
separate
datasets
underscores
potential
collaborative
efforts
improve
accuracy
compared
models.
Integrating
forward-looking
collaboration
while
addressing
privacy
concerns.
Language: Английский
SA-FLIDS: secure and authenticated federated learning-based intelligent network intrusion detection system for smart healthcare
PeerJ Computer Science,
Journal Year:
2024,
Volume and Issue:
10, P. e2414 - e2414
Published: Dec. 13, 2024
Smart
healthcare
systems
are
gaining
increased
practicality
and
utility,
driven
by
continuous
advancements
in
artificial
intelligence
technologies,
cloud
fog
computing,
the
Internet
of
Things
(IoT).
However,
despite
these
transformative
developments,
challenges
persist
within
IoT
devices,
encompassing
computational
constraints,
storage
limitations,
attack
vulnerability.
These
attacks
target
sensitive
health
information,
compromise
data
integrity,
pose
obstacles
to
overall
resilience
sector.
To
address
vulnerabilities,
Network-based
Intrusion
Detection
Systems
(NIDSs)
crucial
fortifying
smart
networks
ensuring
secure
use
IoMT-based
applications
mitigating
security
risks.
Thus,
this
article
proposes
a
novel
Secure
Authenticated
Federated
Learning-based
NIDS
framework
using
Blockchain
(SA-FLIDS)
for
fog-IoMT-enabled
systems.
Our
research
aims
improve
privacy
reduce
communication
costs.
Furthermore,
we
also
weaknesses
decentralized
learning
systems,
like
Sybil
Model
Poisoning
attacks.
We
leverage
blockchain-based
Self-Sovereign
Identity
(SSI)
model
handle
client
authentication
communication.
Additionally,
Trimmed
Mean
method
aggregate
data.
This
helps
effect
unusual
or
malicious
inputs
when
creating
model.
approach
is
evaluated
on
real
traffic
datasets
such
as
CICIoT2023
EdgeIIoTset.
It
demonstrates
exceptional
robustness
against
adversarial
findings
underscore
potential
our
technique
applications.
Language: Английский