Показать сокращенную информацию
| dc.contributor.author | Asiri, Fatima | |
| dc.contributor.author | Malwi, Wajdan Al | |
| dc.contributor.author | Masood, Fahad | |
| dc.contributor.author | Alshehri, Mohammed S. | |
| dc.contributor.author | Zhukabayeva, Tamara | |
| dc.contributor.author | Shah, Syed Aziz | |
| dc.contributor.author | Ahmad, Jawad | |
| dc.date.accessioned | 2026-03-12T05:19:49Z | |
| dc.date.available | 2026-03-12T05:19:49Z | |
| dc.date.issued | 2025 | |
| dc.identifier.issn | 1546-2226 | |
| dc.identifier.other | Doi:10.32604/cmc.2025.066498 | |
| dc.identifier.uri | http://repository.enu.kz/handle/enu/30183 | |
| dc.description.abstract | Edge computing (EC) combined with the Internet of Things (IoT) provides a scalable and efficient solution for smart homes.The rapid proliferation of IoT devices poses real-time data processing and security challenges. EC has become a transformative paradigm for addressing these challenges, particularly in intrusion detection and anomaly mitigation. The widespread connectivity of IoT edge networks has exposed them to various security threats, necessitating robust strategies to detect malicious activities. This research presents a privacy-preserving federated anomaly detection framework combined with Bayesian game theory (BGT) and double deep Q-learning (DDQL). The proposed framework integrates BGT to model attacker and defender interactions for dynamic threat level adaptation and resource availability. It also models a strategic layout between attackers and defenders that takes into account uncertainty. DDQL is incorporated to optimize decision-making and aids in learning optimal defense policies at the edge, thereby ensuring policy and decision optimization. Federated learning (FL) enables decentralized and unshared anomaly detection for sensitive data between devices. Data collection has been performed from various sensors in a real-time EC-IoT network to identify irregularities that occurred due to different attacks. The results reveal that the proposed model achieves high detection accuracy of up to 98% while maintaining low resource consumption. This study demonstrates the synergy between game theory and FL to strengthen anomaly detection in EC-IoT networks. | ru |
| dc.language.iso | en | ru |
| dc.publisher | Computers, Materials & Continua | ru |
| dc.relation.ispartofseries | 84(2); | |
| dc.subject | IoT | ru |
| dc.subject | edge computing | ru |
| dc.subject | smart homes | ru |
| dc.subject | anomaly detection | ru |
| dc.subject | Bayesian game theory | ru |
| dc.subject | reinforcement learning | ru |
| dc.title | Privacy Preserving Federated Anomaly Detection in IoT Edge Computing Using Bayesian Game Reinforcement Learning | ru |
| dc.type | Article | ru |