Communication-Efficient Federated Learning in Industrial IoT — A Framework for Real-Time Threat Detection and Secure Device Coordination

Authors

  • Nutan Gusain School of Computer Science and Engineering, Galgotias University, Greater Noida, India
  • Himanshu Sharma Department of Computer Science and Engineering, Sharda University, Greater Noida, India

DOI:

https://doi.org/10.63503/j.ijcma.2025.115

Keywords:

Industrial Internet of Things (IIoT), Federated Learning, Communication-Efficient Learning, Differential Privacy

Abstract

Industrial Internet of Things (IIoT) technology development speed created a necessity for machine learning frameworks which provide secure operations along with efficient communication and ready scalability. The existing centralized approach proves inappropriate for IIoT because it faces limitations from bandwidth limitations and privacy issues in addition to cyber risks. We develop Communication-Efficient Federated Learning (CEFL) framework specifically designed for IIoT operations because it provides real-time intelligence capabilities with lower communication costs and improved security measures. CEFL implements an automated operation where edge devices use local datasets to conduct training tasks in each cycle. The limited bandwidth necessitates devices to use gradient sparsification and quantization techniques which reduces the size of update transmissions. Dependable user updates get collected securely on the central server through differential privacy techniques which protect sensitive information.

The system implements an adjusting scheduling framework that adjusts device contribution equilibrium with energy capacity as well as network conditions and trust ratings therefore maximizing resource deployment and providing continuous performance despite hardware outages. The system includes a threat detection module which tracks gradient variations to detect and trigger the removal of potential harmful devices immediately. The system pipeline that includes local optimization and efficient gradient handling together with secure aggregation and adaptive scheduling and proactive threat detection has been mathematically proven for its robust and efficient operation. The experimental tests conducted within simulated IIoT network environments demonstrate that the developed framework reduces communication expenses while maintaining both the model accuracy and security performance. The design of CEFL recognizes and overcomes main IIoT obstacles by delivering adaptable lightweight solutions which work well in complicated industrial conditions. Trust-based device coordination along with proactive anomaly detection leads to an autonomous and resilient network structure which prepares industrial intelligence systems for operation reliability improvement. The proposed framework creates a solid basis for extending digital industrial intelligence that involves energy-efficient federated learning as well as blockchain-based trust systems and multi-domain IIoT operations which drive next-generation industrial intelligence.

References

[1] Prakash, P., Ding, J., Chen, R., Qin, X., Shu, M., Cui, Q., ... & Pan, M. (2022). IoT device friendly and communication-efficient federated learning via joint model pruning and quantization. IEEE Internet of Things Journal, 9(15), 13638-13650. doi: https://doi.org/10.1109/JIOT.2022.3145865

[2] Shrivastava, G., Peng, S. L., Bansal, H., Sharma, K., & Sharma, M. (Eds.). (2020). New age analytics: Transforming the internet through machine learning, IoT, and trust modeling. CRC Press. doi: https://doi.org/10.1201/9781003007210

[3] Yang, Q., Chen, W. N., Gu, T., Zhang, H., Yuan, H., Kwong, S., & Zhang, J. (2019). A distributed swarm optimizer with adaptive communication for large-scale optimization. IEEE transactions on cybernetics, 50(7), 3393-3408. doi: https://doi.org/10.1109/TCYB.2019.2904543

[4] Saif, S., Das, P., Biswas, S., Khari, M., & Shanmuganathan, V. (2022). HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare. Microprocessors and Microsystems, 104622. doi: https://doi.org/10.1016/j.micpro.2022.104622

[5] Mate, S., Somani, V., & Dahiwale, P. (2024). Secure Data Collection, Aggregation, and Sharing in the Internet of Things. In Secure Communication in Internet of Things (pp. 85-93). CRC Press. doi: https://doi.org/10.1201/9781003477327

[6] Sharma, K. (2022). Internet of healthcare things security vulnerabilities and jamming attack analysis. Expert Systems, 39(3), e12853. doi: https://doi.org/10.1111/exsy.12853

[7] Hijazi, N. M., Aloqaily, M., Guizani, M., Ouni, B., & Karray, F. (2023). Secure federated learning with fully homomorphic encryption for IoT communications. IEEE Internet of Things Journal, 11(3), 4289-4300. doi : https://doi.org/10.1109/JIOT.2023.3302065

[8] Abaoud, M., Almuqrin, M. A., & Khan, M. F. (2023). Advancing federated learning through novel mechanism for privacy preservation in healthcare applications. IEEE Access, 11, 83562-83579. doi : https://doi.org/10.1109/ACCESS.2023.3301162

[9] Kumar, R., & Agrawal, N. (2023). Analysis of multi-dimensional Industrial IoT (IIoT) data in Edge–Fog–Cloud based architectural frameworks: A survey on current state and research challenges. Journal of Industrial Information Integration, 35, 100504. doi: https://doi.org/10.1016/j.jii.2023.100504

[10] Hafeez, T., Xu, L., & Mcardle, G. (2021). Edge intelligence for data handling and predictive maintenance in IIOT. IEEE access, 9, 49355-49371. doi: https://doi.org/10.1109/ACCESS.2021.3069137

[11] Kumar, S., Kameswari, Y. L., Rao, K. R., Moram, V., & Shital, S. (2024). Risk Management in IIoT. In Industrial Internet of Things Security (pp. 53-70). CRC Press. doi: https://doi.org/10.1201/9781003466284

[12] Bajpai, A., Chaurasia, D., & Tiwari, N. (2024). A novel methodology for anomaly detection in smart home networks via Fractional Stochastic Gradient Descent. Computers and Electrical Engineering, 119, 109604. doi: https://doi.org/10.1016/j.compeleceng.2024.109604

[13] Bharathi, R., Kannadhasan, S., Padminidevi, B., Maharajan, M. S., Nagarajan, R., & Tonmoy, M. M. (2022). Predictive model techniques with energy efficiency for IOT‐based data transmission in wireless sensor networks. Journal of Sensors, 2022(1), 3434646. doi: https://doi.org/10.1155/2022/3434646

[14] Chen, H., Huang, S., Zhang, D., Xiao, M., Skoglund, M., & Poor, H. V. (2022). Federated learning over wireless IoT networks with optimized communication and resources. IEEE Internet of Things Journal, 9(17), 16592-16605. doi: https://doi.org/10.1109/JIOT.2022.3151193

[15] Azar, J., Makhoul, A., Barhamgi, M., & Couturier, R. (2019). An energy efficient IoT data compression approach for edge machine learning. Future Generation Computer Systems, 96, 168-175. doi: https://doi.org/10.1016/j.future.2019.02.005

[16] Mao, W., Zhao, Z., Chang, Z., Min, G., & Gao, W. (2021). Energy-efficient industrial internet of things: Overview and open issues. IEEE transactions on industrial informatics, 17(11), 7225-7237. doi: https://doi.org/10.1109/TII.2021.3067026

[17] Shukla, S., Hassan, M. F., Tran, D. C., Akbar, R., Paputungan, I. V., & Khan, M. K. (2023). Improving latency in Internet-of-Things and cloud computing for real-time data transmission: a systematic literature review (SLR). Cluster Computing, 1-24. doi: https://doi.org/10.1007/s10586-021-03279-3

[18] Sun, L., Lin, J., Dong, W., Li, X., Wu, J., & Shi, G. (2024). Learning real-world heterogeneous noise models with a benchmark dataset. Pattern Recognition, 156, 110823. doi: https://doi.org/10.1016/j.patcog.2024.110823

Downloads

Published

2025-05-08

How to Cite

Nutan Gusain, & Himanshu Sharma. (2025). Communication-Efficient Federated Learning in Industrial IoT — A Framework for Real-Time Threat Detection and Secure Device Coordination. International Journal on Computational Modelling Applications, 2(2), 18–29. https://doi.org/10.63503/j.ijcma.2025.115

Issue

Section

Research Articles