Next Article in Journal
Integrating Large Language Models into Automated Software Testing
Previous Article in Journal
Bi-Scale Mahalanobis Detection for Reactive Jamming in UAV OFDM Links
Previous Article in Special Issue
Fuzzy-Based MEC-Assisted Video Adaptation Framework for HTTP Adaptive Streaming
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Decentralized Federated Learning for IoT Malware Detection at the Multi-Access Edge: A Two-Tier, Privacy-Preserving Design

Department of Computer Science, King Abdulaziz University, Jeddah 21589, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Future Internet 2025, 17(10), 475; https://doi.org/10.3390/fi17100475
Submission received: 12 September 2025 / Revised: 9 October 2025 / Accepted: 14 October 2025 / Published: 17 October 2025

Abstract

Botnet attacks on Internet of Things (IoT) devices are escalating at the 5G/6G multi-access edge, yet most federated learning frameworks for IoT malware detection (FL-IMD) still hinge on a central aggregator, enlarging the attack surface, weakening privacy, and creating a single point of failure. We propose a two-tier, fully decentralized FL architecture aligned with MEC’s Proximal Edge Server (PES)/Supplementary Edge Server (SES) hierarchy. PES nodes train locally and encrypt updates with the Cheon–Kim–Kim–Song (CKKS) scheme; SES nodes verify ECDSA-signed provenance, homomorphically aggregate ciphertexts, and finalize each round via an Algorand-style committee that writes a compact, tamper-evident record (update digests/URIs and a global-model hash) to an append-only ledger. Using the N-BaIoT benchmark with an unsupervised autoencoder, we evaluate known-device and leave-one-device-out regimes against a classical centralized baseline and a cryptographically hardened but server-centric variant. With the heavier CKKS profile, attack sensitivity is preserved (TPR 0.99), and specificity (TNR) declines by only 0.20 percentage points relative to plaintext in both regimes; a lighter profile maintains TPR while trading 3.5–4.8 percentage points of TNR for about 71% smaller payloads. Decentralization adds only a negligible per-round overhead for committee finality, while homomorphic aggregation dominates latency. Overall, our FL-IMD design removes the trusted aggregator and provides verifiable, ledger-backed provenance suitable for trustless MEC deployments.
Keywords: federated learning; decentralized learning; multi-access edge computing (MEC); Internet of Things (IoT); IoT malware detection; privacy preservation; homomorphic encryption (CKKS); blockchain provenance; peer-to-peer aggregation; N-BaIoT dataset federated learning; decentralized learning; multi-access edge computing (MEC); Internet of Things (IoT); IoT malware detection; privacy preservation; homomorphic encryption (CKKS); blockchain provenance; peer-to-peer aggregation; N-BaIoT dataset

Share and Cite

MDPI and ACS Style

Asiri, M.; Khemakhem, M.A.; Alhebshi, R.M.; Alsulami, B.S.; Eassa, F.E. Decentralized Federated Learning for IoT Malware Detection at the Multi-Access Edge: A Two-Tier, Privacy-Preserving Design. Future Internet 2025, 17, 475. https://doi.org/10.3390/fi17100475

AMA Style

Asiri M, Khemakhem MA, Alhebshi RM, Alsulami BS, Eassa FE. Decentralized Federated Learning for IoT Malware Detection at the Multi-Access Edge: A Two-Tier, Privacy-Preserving Design. Future Internet. 2025; 17(10):475. https://doi.org/10.3390/fi17100475

Chicago/Turabian Style

Asiri, Mohammed, Maher A. Khemakhem, Reemah M. Alhebshi, Bassma S. Alsulami, and Fathy E. Eassa. 2025. "Decentralized Federated Learning for IoT Malware Detection at the Multi-Access Edge: A Two-Tier, Privacy-Preserving Design" Future Internet 17, no. 10: 475. https://doi.org/10.3390/fi17100475

APA Style

Asiri, M., Khemakhem, M. A., Alhebshi, R. M., Alsulami, B. S., & Eassa, F. E. (2025). Decentralized Federated Learning for IoT Malware Detection at the Multi-Access Edge: A Two-Tier, Privacy-Preserving Design. Future Internet, 17(10), 475. https://doi.org/10.3390/fi17100475

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop