IJCNIS Vol. 18, No. 2, 8 Apr. 2026
Cover page and Table of Contents: PDF (size: 1274KB)
PDF (1274KB), PP.196-209
Views: 0 Downloads: 0
Internet of Things (IoT), Data Privacy, Machine Learning, Federated Learning, TinyML
The rapid extension of the Internet of Things (IoT) has introduced significant concerns, particularly in ensuring data security and safeguarding sensitive and private data. The integration of Federated Learning into IoT architecture has occurred as a covenanting solution to address the risks of data breaches, resource efficiency, and the challenges of data privacy and security. This paper presents a novel lightweight framework tailored for resource-constrained IoT devices that integrates Federated Learning and Tiny Machine Learning (TinyML) to deploy lightweight, reliable models on edge devices. Our experimental results show that the proposed approach can improve efficiency, reduce communication overhead, and enhance privacy preservation.
Hiba Kandil, Hafssa Benaboud, "Addressing Data Privacy Concerns in IoT Architecture with Federated Learning and TinyML", International Journal of Computer Network and Information Security(IJCNIS), Vol.18, No.2, pp.196-209, 2026. DOI:10.5815/ijcnis.2026.02.11
[1]T. Bouraffa and K.-L. Hui, “Regulating Information and Network Security: Review and Challenges,” ACM Comput. Surv., vol. 57, no. 5, p. 126:1-126:38, Jan. 2025, doi:10.1145/3711124.
[2]P. Sun, Y. Wan, Z. Wu, Z. Fang, and Q. Li, “A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions,” Computers & Security, vol. 148, p. 104097, Jan. 2025, doi:10.1016/j.cose.2024.104097.
[3]P. Joshi and S. Joshi, “Security Challenges in Internet of Things,” in Advanced Cyber Security Techniques for Data, Blockchain, IoT, and Network Protection, IGI Global Scientific Publishing, 2025, pp. 355–392. doi:10.4018/979-8 3693-9225-6.ch014.
[4]J. V, V. Balan, and B. V. S, “Security Issues in IoT: Perspective Review,” Computer Networks and Communications, pp. 101–117, Mar. 2025, doi:10.37256/cnc.3120256140.
[5]H. Kandil and H. Benaboud, “Using Machine Learning to Deal with Privacy and Confidentiality in Internet of Things: An Overview,” in Innovations in Smart Cities Applications Volume 8, M. Ben Ahmed, B. A. Abdelhakim, İ. R. Karaș, and K. Ben Ahmed, Eds., Cham: Springer Nature Switzerland, 2025, pp. 774–783. doi: 10.1007/978-3 031-88653-9 73.
[6]M. Ebrahimi, R. Sahay, S. Hosseinalipour, and B. Akram, “The Transition from Centralized Machine Learning to Federated Learning for Mental Health in Education: A Survey of Current Methods and Future Directions,” Jan. 20, 2025, arXiv: arXiv:2501.11714. doi:10.48550/arXiv.2501.11714.
[7]N. Jia et al. “A Comprehensive Survey on Communication-Efficient Federated Learning in Mobile Edge Environments,”IEEE Communications Surveys & Tutorials, pp. 1–1, 2025, doi:10.1109/COMST.2025.3535957.
[8]S. Chitimoju, “Federated Learning in Cybersecurity: Privacy-Preserving AI for Threat Detection,” International Journal of Digital Innovation, vol. 6, no. 1, Art. no. 1, Jan. 2025, Accessed: Mar. 23, 2025. [Online]. Available: https://researchworkx.com/index.php/ijdi/article/view/76.
[9]R. Dembani et al. “Agricultural data privacy and federated learning: A review of challenges and opportunities,” Computers and Electronics in Agriculture, vol. 232, p. 110048, May 2025, doi:10.1016/j.compag.2025.110048.
[10]J. Zhao et al., “The Federation Strikes Back: A Survey of Federated Learning Privacy Attacks, Defenses, Applications, and Policy Landscape,” ACM Comput. Surv., Mar. 2025, doi:10.1145/3724113.
[11]M. Arif and M. Rashid, “A Literature Review on Model Conversion, Inference, and Learning Strategies in EdgeML with TinyML Deployment,” Computers, Materials & Continua, pp. 1–10, Jan. 2025, doi:10.32604/cmc.2025.062819.
[12]Dr. L. Dutta and S. Bharali, “TinyML Meets IoT: A Comprehensive Survey,” Internet of Things, vol. 16, p. 100461, Dec. 2021, doi:10.1016/j.iot.2021.100461.
[13]H. Kandil, W. Bouimejane, M. Mouhcine, and H. Benaboud, “An Anomaly-based Intrusion Detection System for IoT environments using autoencoder neural networks and TinyML,” IJCA, vol. 187, no. 59, pp. 9–15, Nov. 2025, doi: 10.5120/ijca2025926000.
[14]C. N. da Silva and C. V. S. Prazeres, “Tiny Federated Learning for Constrained Sensors: A Systematic Literature Review,” IEEE Sensors Reviews, pp. 1–16, 2025, doi:10.1109/SR.2025.3548547.
[15]M. Ficco, A. Guerriero, E. Milite, F. Palmieri, R. Pietrantuono, and S. Russo, “Federated learning for IoT devices: Enhancing TinyML with on-board training,” Information Fusion, vol. 104, p. 102189, Apr. 2024, doi:10.1016/j.inffus.2023.102189.
[16]K. Kopparapu, E. Lin, J. G. Breslin, and B. Sudharsan, “TinyFedTL: Federated Transfer Learning on Ubiquitous Tiny IoT Devices,” In 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Mar. 2022, pp. 79–81, doi:10.1109/PerComWorkshops53856.2022.9767250.
[17]H. Ren, X. Li, D. Anicic, and T. A. Runkler, “TinyMetaFed: Efficient Federated Meta-Learning for TinyML,” Sep. 28, 2023, arXiv: arXiv:2307.06822. doi:10.48550/arXiv.2307.06822.
[18]L. Yin, J. Feng, H. Xun, Z. Sun, and X. Cheng, “A Privacy-Preserving Federated Learning for Multi-party Data Sharing in Social IoTs,” IEEE Trans. Netw. Sci. Eng., vol. 8, no. 3, pp. 2706–2718, Jul. 2021, doi:10.1109/TNSE.2021.3074185.
[19]J. O. Odeh, X. Yang, C. I. Nwakanma, and S. Dhelim, “Asynchronous Privacy-Preservation Federated Learning Method for Mobile Edge Network in Industrial Internet of Things Ecosystem,” Electronics, vol. 13, no. 9, p. 1610, Apr. 2024, doi:10.3390/electronics13091610.
[20]Z. He, F. Zhang, Y. Li, Y. Cao, and Z. Cai, “Privacy-Enhanced Personalized Federated Learning With Layer-Wise Gradient Shielding on Heterogeneous IoT Data,” IEEE Internet of Things Journal, vol. 11, no. 15, pp. 25771–25781, Aug. 2024, doi:10.1109/JIOT.2024.3391342.
[21]A. Imteaj and M. H. Amini, “FedPARL: Client Activity and Resource-Oriented Lightweight Federated Learning Model for Resource-Constrained Heterogeneous IoT Environment,” Front. Commun. Netw., vol. 2, Apr. 2021, doi:10.3389/frcmn.2021.657653.
[22]S. Dadkhah, H. Mahdikhani, P. K. Danso, A. Zohourian, K. A. Truong, and A. A. Ghorbani, “Towards the Development of a Realistic Multidimensional IoT Profiling Dataset,” in 2022 19th Annual International Conference on Privacy, Security & Trust (PST), Aug. 2022, pp. 1–11. doi: 10.1109/PST55820.2022.9851966.
[23]D. Shah, J. Wang, and Q. P. He, “Feature engineering in big data analytics for IoT-enabled smart manufacturing– Comparison between deep learning and statistical learning,” Computers & Chemical Engineering, vol. 141, p. 106970, Oct. 2020, doi:10.1016/j.compchemeng.2020.106970.
[24]S. L et al., “A Multiclass Attack Classification Framework for IoT Using Hybrid Deep Learning Model. — EBSCO host.” Accessed: Mar. 24, 2025. doi:10.54216/JCIM.150112.
[25]N. Sirisha et al. “IoT-based data quality and data preprocessing of multinational corporations,” The Journal of High Technology Management Research, vol. 34, no. 2, p. 100477, Nov. 2023, doi:10.1016/j.hitech.2023.100477.
[26]M. Shahnawaz and M. Kumar, “A Comprehensive Survey on Big Data Analytics: Characteristics, Tools and Techniques,” ACM Comput. Surv., vol. 57, no. 8, p. 196:1-196:33, Mar. 2025, doi:10.1145/3718364.
[27]J. L. Salmeron and I. Ar´ evalo, “Concurrent vertical and horizontal federated learning with fuzzy cognitive maps,” Future Generation Computer Systems, vol. 162, p. 107482, Jan. 2025, doi:10.1016/j.future.2024.107482.
[28]Z. Sun, J. Xu, J. Li, and T. Zhang, “Privacy Protection Authentication Protocol for Consumer Internet of Things in Horizontal Federated Learning Environment,” IEEE Transactions on Consumer Electronics, pp. 1–1, 2025, doi:10.1109/TCE.2025.3525497.