Next Article in Journal
Multiscale Fracture Characteristics of Coal and Their Influence on Fracture Propagation
Previous Article in Journal
Anomalous Scattering and Weak Interactions of Lumps for the (2 1)-Dimensional Generalized Kadomtsev- Petviashvili Equation
 
 
Due to scheduled maintenance work on our servers, there may be short service disruptions on this website between 11:00 and 12:00 CEST on March 28th.
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

A Secure Authentication Scheme for Hierarchical Federated Learning with Anomaly Detection in IoT-Based Smart Agriculture

School of Electronic and Electrical Engineering, Kyungpook National University, Daegu 41566, Republic of Korea
*
Author to whom correspondence should be addressed.
Appl. Sci. 2026, 16(7), 3211; https://doi.org/10.3390/app16073211
Submission received: 11 March 2026 / Revised: 24 March 2026 / Accepted: 25 March 2026 / Published: 26 March 2026

Abstract

Unmanned Aerial Vehicle (UAV)-assisted hierarchical federated learning (HFL) has emerged as a promising architecture for Internet of Things (IoT)-based smart agriculture, which enables scalable model training over large and sparse farmlands. In this setting, UAVs act as mobile edge servers, aggregating local updates from distributed agricultural IoT devices and relaying them to the cloud server. While HFL improves scalability and reduces communication overhead, it still faces critical security threats due to its reliance on public wireless channels and the vulnerability of model aggregation to malicious updates. In this paper, we propose a secure authentication scheme that integrates anomaly detection with elliptic curve cryptography (ECC)-based mutual authentication to protect both the communication and training phases. In the proposed scheme, UAVs authenticate participating clients before receiving their local models, then perform anomaly detection to identify and exclude malicious participants. If a client is found to be malicious, its identity credentials are revoked and broadcast by the cloud server to prevent future participation. The security of the proposed scheme is formally verified using Burrows–Abadi–Needham (BAN) logic, the Real-or-Random (RoR) model, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool, along with informal security analysis. The performance evaluation includes comparisons of security features, computation cost, and communication cost with other related schemes, and an experimental assessment of anomaly detection performance. The results demonstrate that our scheme provides strong security guarantees, low overhead, and effective malicious client detection, making it well suited for UAV-assisted HFL in smart agriculture.
Keywords: authentication; hierarchical federated learning (HFL); Internet of Things (IoT); anomaly detection authentication; hierarchical federated learning (HFL); Internet of Things (IoT); anomaly detection

Share and Cite

MDPI and ACS Style

Choi, J.; Park, Y. A Secure Authentication Scheme for Hierarchical Federated Learning with Anomaly Detection in IoT-Based Smart Agriculture. Appl. Sci. 2026, 16, 3211. https://doi.org/10.3390/app16073211

AMA Style

Choi J, Park Y. A Secure Authentication Scheme for Hierarchical Federated Learning with Anomaly Detection in IoT-Based Smart Agriculture. Applied Sciences. 2026; 16(7):3211. https://doi.org/10.3390/app16073211

Chicago/Turabian Style

Choi, Jihye, and Youngho Park. 2026. "A Secure Authentication Scheme for Hierarchical Federated Learning with Anomaly Detection in IoT-Based Smart Agriculture" Applied Sciences 16, no. 7: 3211. https://doi.org/10.3390/app16073211

APA Style

Choi, J., & Park, Y. (2026). A Secure Authentication Scheme for Hierarchical Federated Learning with Anomaly Detection in IoT-Based Smart Agriculture. Applied Sciences, 16(7), 3211. https://doi.org/10.3390/app16073211

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop