Federated learning–based anomaly detection for privacy-preserving in IoT-enabled industrial control systems

Authors

  • Obi Ofuka Princewill Department of Computer Science, University of Calabar, Nigeria
  • Essien Eyo Department Computer Science, University of Calabar, Nigeria
  • Bassey I. Ele Department Computer Science, University of Calabar, Nigeria

DOI:

https://doi.org/10.64497/jssci.203

Keywords:

Industrial Control Systems, Federated Learning, Anomaly Detection, IIoT, Edge Computing, Cybersecurity.

Abstract

The integration of Industrial Internet of Things (IIoT) technologies into Industrial Control Systems (ICS) has significantly expanded the cyber-attack surface of critical infrastructure. Conventional centralized machine learning approaches for anomaly detection are often incompatible with industrial privacy, latency, and availability constraints. This paper presents a federated learning–based anomaly detection framework that enables collaborative model training across distributed edge devices while preserving data locality. The proposed framework leverages edge-based learning and federated aggregation to achieve timely detection of anomalous process behavior without sharing raw operational data. Experimental evaluation using a simulated water treatment ICS testbed demonstrates improved detection accuracy, reduced detection latency, and substantially lower communication overhead compared to centralized learning approaches. These results confirm that federated learning provides a practical and scalable foundation for privacy-preserving cybersecurity monitoring in IoT-enabled industrial environments.

Downloads

Download data is not yet available.

References

[1] K. Kairouz et al., “Advances and Open Problems in Federated Learning,” Proc. IEEE, vol. 109, no. 10, pp. 1655–1668, Oct. 2021.

[2] H. B. McMahan et al., “Communication-efficient learning of deep networks from decentralized data,” Proc. AISTATS, pp. 1273–1282, 2017.

[3] A. Humayed, J. Lin, F. Li, and B. Luo, “Cyber-physical systems security—A survey,” IEEE Internet Things J., vol. 4, no. 6, pp. 1802–1831, Dec. 2017. DOI: https://doi.org/10.1109/JIOT.2017.2703172

[4] R. Mitchell and I.-R. Chen, “A survey of intrusion detection techniques for cyber-physical systems,” ACM Comput. Surv., vol. 46, no. 4, pp. 1–29, 2014. DOI: https://doi.org/10.1145/2542049

[5] S. Li, L. Da Xu, and S. Zhao, “The Internet of Things: a survey,” Inf. Syst. Front., vol. 17, no. 2, pp. 243–259, 2015. DOI: https://doi.org/10.1007/s10796-014-9492-7

[6] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, pp. 436–444, 2015. DOI: https://doi.org/10.1038/nature14539

[7] M. Conti et al., “Internet of Things security and forensics,” Future Gener. Comput. Syst., vol. 78, pp. 544–546, 2018. DOI: https://doi.org/10.1016/j.future.2017.07.060

[8] P. Ferrari et al., “Evaluation of communication latency in industrial IoT applications,” IEEE Trans. Ind. Informatics, vol. 13, no. 2, pp. 709–719, Apr. 2017.

[9] S. Yin et al., “Data-driven techniques focused on modern industry,” IEEE Trans. Ind. Electron., vol. 62, no. 1, pp. 657–667, Jan. 2015. DOI: https://doi.org/10.1109/TIE.2014.2308133

[10] L. Lu et al., “Federated learning for intrusion detection in industrial IoT,” IEEE Access, vol. 8, pp. 197938–197949, 2020.

[11] L. Bottou, “Large-scale machine learning with stochastic gradient descent,” Proc. COMPSTAT, pp. 177–186, 2010. DOI: https://doi.org/10.1007/978-3-7908-2604-3_16

[12] J. Lin et al., “A survey on internet of things: Architecture, enabling technologies, security and privacy,” IEEE Internet Things J., vol. 4, no. 5, pp. 1125–1142, Oct. 2017. DOI: https://doi.org/10.1109/JIOT.2017.2683200

[13] S. Rinaldi, A. Flammini, M. Pasetti, and E. Sisinni, “On the network latency in industrial IoT applications,” IEEE Trans. Ind. Informatics, vol. 13, no. 2, pp. 710–720, 2017.

[14] M. Zubair, H. B. M. Rais, F. Ullah, and A. A. Suleiman, “Enhancing image reconstruction fidelity in low-dose CT scans: A comprehensive MPS-UNet framework,” in Proc. Int. Conf. Smart Cities, Singapore: Springer Nature Singapore, pp. 59–70, 2024. DOI: https://doi.org/10.1007/978-981-96-5848-0_6

[15] H. Daud, N. S. Haron, N. F. M. Krishnan, S. Y. Tan, M. A. F. A. Wahab, A. A. A. Azhar, A. Z. Zubir, S. B. S. Emirlee, D. S. Metwally, and A. A. Suleiman, “Optimizing AWS cloud resource management: Predicting EC2 instance CPU utilization using LSTM and ARIMA models,” Int. J. Anal. Appl., vol. 23, p. 261, 2025. DOI: https://doi.org/10.28924/2291-8639-23-2025-261

[16] M. Zubair, A. A. Suleiman, A. K. Yousafzai, and T. Alazemi, “Prediction of oxide glass refractive index using a novel deep learning architecture, DualNet (U-Net and ANN) with hybrid loss function,” Opt. Quantum Electron., vol. 57, no. 7, p. 387, 2025. DOI: https://doi.org/10.1007/s11082-025-08300-2

[17] T. Kim et al., “Towards federated learning for anomaly detection in cyber-physical systems,” Sensors, vol. 21, no. 7, pp. 1–18, 2021.

[18] N. Moustafa and J. Slay, “The evaluation of network anomaly detection systems: Statistical analysis of UNSW-NB15 data set,” Inf. Secur. J., vol. 25, no. 1–3, pp. 18–31, 2016. DOI: https://doi.org/10.1080/19393555.2015.1125974

[19] A. A. Suleiman, A. Suleiman, U. A. Abdullahi, and S. A. Suleiman, “Estimation of the case fatality rate of COVID-19 epidemiological data in Nigeria using statistical regression analysis,” Biosaf. Health, vol. 3, no. 1, pp. 4–7, 2021. DOI: https://doi.org/10.1016/j.bsheal.2020.09.003

Downloads

Published

2026-03-05

How to Cite

Princewill, O. O., Essien Eyo, & Ele, B. I. (2026). Federated learning–based anomaly detection for privacy-preserving in IoT-enabled industrial control systems . Journal of Statistical Sciences and Computational Intelligence, 2(1), 233–242. https://doi.org/10.64497/jssci.203
Views
  • Abstract 143
  • PDF 38

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.