Federated Learning and Blockchain Integration for Privacy Protection in the Internet of Things: Challenges and Solutions
Abstract
:1. Introduction
- We present a state-of-the-art review of federated learning and Blockchain and how they have been used in collaboration in the IoT ecosystem.
- We review the existing security and privacy challenges that face the integration of federated learning and Blockchain in the distributed IoT environment.
- We discuss existing solutions for security and privacy by categorizing them based on the nature of the privacy-preservation mechanism.
2. Related Work
3. Federated Learning and Blockchain: Brief Review
3.1. Federated Learning
- Clients selection: Participants’ devices are selected to join the training iterations. This selection could depend on a number of factors, such as device processing capabilities and storage capacity, and is determined by definitive selection protocols [10].
- Model selection: The primary model is chosen, and its main parameters are determined and shared with clients to start the federated learning [12].
- Local model training: Clients independently train the model with the local device data storage [7].
- Local model gradients updates: After each iteration, clients push the training gradients to the aggregator device [10].
- Global model update: The aggregator applies an aggregation technique to level the trained model gradients and propagate the update to the clients to start the next round [7].
3.1.1. Categories of Federated Learning
- Horizontal federated learning: Where the datasets have the exact same features but varying samples.
- Vertical federated learning: Where the sample space is the same, but the features are different.
- Federated transfer learning: Starts from a pre-trained model where the overlap of the samples space and features space is less.
- Centralized approach: Where a global central model is updated by aggregating the clients’ training parameters. This approach applies protocols to avoid malicious client participation
- Decentralized approach: Where the clients’ complete reliance on their neighbours to update the model removes the central authority. This approach requires absolute trust among clients.
3.1.2. Aggregation Techniques
3.2. Blockchain Technology
3.2.1. Overview of Blockchain
3.2.2. Components of Blockchain
- Cryptographic hash function: Blockchain employs hashing in two ways, in the cryptographic challenge and in the Merkle tree. The cryptographic challenge, the nonce, is the value that miner nodes compete to calculate. On the other hand, the Merkle tree is the representation of the transactions as hashed values [24].
- Asymmetric key encryption: Asymmetric encryption, or public-key encryption, is applied in addresses and digital signatures. The transactions are signed by the sender’s private key, while the public key is used in the node’s wallet address [24].
- Transactions: A transaction is the exchange of transmits, processes, and storages of digital assets to control the state among the Blockchain nodes. Several transactions will create a block.
- Consensus mechanisms: An agreement protocol to validate the new to-be-added block. Many consensus mechanisms exist. Table 5 shows a brief review of the four most used and well-known consensus algorithms.
3.2.3. Characteristics of Blockchain
- Decentralization: where the ledger is shared among all the P2P network nodes.
- Transparency: where the ledger records are retrievable by any Blockchain node.
- Immutability and traceability: Where each block points to its predecessor, meaning a change to one block’s content will not go unnoticed. Furthermore, where each block is timestamped to enhance the data traceability.
- De-Trusting: where no central authority or a third party is required to review the operations.
- Anonymity: where nodes are identified by their digital signature.
- Credibility: where internal calculations are automatically performed without human intervention, making Blockchain credible to perform secure operations.
3.3. Taxonomy of Federated Learning, Blockchain, and IoT
4. Privacy and Security Challenges
4.1. Privacy Challenges
- Shared data (P1): Blockchain storage capacity is limited, which means it could be a challenge to manage the storage of the massive shared raw data [10].
- Model gradients leakage (P2): Can be referred to as message spoofing, which is when an adversary manages to obtain shared model gradients and, in time, derive information about the training data [28].
- Linking attack (P3): The DLT enables connected nodes to have complete access to the transaction logs. An adversary could apply linking algorithms and extract information from the federated learning procedures [12].
4.2. Security Challenges
- Data poisoning (S1), or poisoning attacks: when the adversary adds specific noise to the dataset or alters its labels, better known as label-flipping attacks.
- Model poisoning (S2): similar to data poisoning, model poisoning is when the adversary tries to actively alter the model updates to change the model decision outcome.
5. Existing Solutions
5.1. Reputation-Based
5.2. Noise-Based
5.3. Other Solutions
5.4. Lessons Learned
- Most of the found work focuses on applying federated learning with Blockchain with a disregard to applying methods to detect poisonous attacks.
- We found that most work is reputation-based rather than noise-based to prevent the occurrence of poisonous attacks.
- The application scope of federated learning and Blockchain integration heavily focused on industrial, medical, and communications area.
6. Conclusions and Future Directions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Sisinni, E.; Saifullah, A.; Han, S.; Jennehag, U.; Gidlund, M. Industrial Internet of Things: Challenges, Opportunities, and Directions. IEEE Trans. Ind. Inform. 2018, 14, 4724–4734. [Google Scholar] [CrossRef]
- Vailshery, L. IoT Connected Devices Worldwide 2019–2030. Statista. Available online: https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/ (accessed on 15 October 2022).
- The Internet of Things Reference Model; CISCO: San Jose, CA, USA, 2014; Available online: https://dl.icdst.org/pdfs/files4/0f1d1327c5195d1922175dd77878b9fb.pdf (accessed on 10 October 2022).
- Mukherjee, M.; Matam, R.; Mavromoustakis, C.X.; Jiang, H.; Mastorakis, G.; Guo, M. Intelligent edge computing: Security and privacy challenges. IEEE Commun. Mag. 2020, 58, 26–31. [Google Scholar] [CrossRef]
- Ghaznavi, M.; Jalalpour, E.; Salahuddin, M.A.; Boutaba, R.; Migault, D.; Preda, S. Content delivery network security: A survey. IEEE Commun. Surv. Tutor. 2021, 23, 2166–2190. [Google Scholar] [CrossRef]
- Murshed, M.G.S.; Murphy, C.; Hou, D.; Khan, N.; Ananthanarayanan, G.; Hussain, F. Machine Learning at the Network Edge: A Survey. ACM Comput. Surv. 2021, 54, 170. [Google Scholar] [CrossRef]
- Konečný, J.; McMahan, H.B.; Yu, F.X.; Richtárik, P.; Suresh, A.T.; Bacon, D. Federated Learning: Strategies for Improving Communication Efficiency. arXiv 2017, arXiv:1610.05492. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Ding, M.; Pathirana, P.N.; Seneviratne, A.; Li, J.; Poor, H.V. Federated Learning for Internet of Things: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2021, 23, 1622–1658. [Google Scholar] [CrossRef]
- Gad, A.G.; Mosa, D.T.; Abualigah, L.; Abohany, A.A. Emerging Trends in Blockchain Technology and Applications: A Review and Outlook. J. King Saud Univ.—Comput. Inf. Sci. 2022, 34, 6719–6742. [Google Scholar] [CrossRef]
- Wang, Z.; Hu, Q. Blockchain-based Federated Learning: A Comprehensive Survey. arXiv 2021, arXiv:2110.02182. [Google Scholar] [CrossRef]
- Qammar, A.; Karim, A.; Ning, H.; Ding, J. Securing federated learning with blockchain: A systematic literature review. Artif. Intell. Rev. 2022, 56, 3951–3985. [Google Scholar] [CrossRef]
- Ali, M.; Karimipour, H.; Tariq, M. Integration of blockchain and federated learning for Internet of Things: Recent advances and future challenges. Comput. Secur. 2021, 108, 102355. [Google Scholar] [CrossRef]
- Issa, W.; Moustafa, N.; Turnbull, B.; Sohrabi, N.; Tari, Z. Blockchain-based federated learning for securing internet of things: A comprehensive survey. ACM Comput. Surv. 2023, 55, 1–43. [Google Scholar] [CrossRef]
- Wang, N.; Yang, W.; Wang, X.; Wu, L.; Guan, Z.; Du, X.; Guizani, M. A blockchain based privacy-preserving federated learning scheme for Internet of Vehicles. Digit. Commun. Netw. 2022. [Google Scholar] [CrossRef]
- Javed, A.R.; Hassan, M.A.; Shahzad, F.; Ahmed, W.; Singh, S.; Baker, T.; Gadekallu, T.R. Integration of Blockchain Technology and Federated Learning in Vehicular (IoT) Networks: A Comprehensive Survey. Sensors 2022, 22, 4394. [Google Scholar] [CrossRef] [PubMed]
- Moulahi, T.; Jabbar, R.; Alabdulatif, A.; Abbas, S.; El Khediri, S.; Zidi, S.; Rizwan, M. Privacy-preserving federated learning cyber-threat detection for intelligent transport systems with blockchain-based security. Expert Syst. 2023, 40, e13103. [Google Scholar] [CrossRef]
- McMahan, H.B.; Moore, E.; Ramage, D.; Hampson, S.; Arcas, B.A.Y. Communication-Efficient Learning of Deep Networks from Decentralized Data. arXiv 2017. [Google Scholar] [CrossRef]
- Yang, Q.; Liu, Y.; Chen, T.; Tong, Y. Federated Machine Learning: Concept and Applications. arXiv 2019. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. p. 9. Available online: https://www.ussc.gov/sites/default/files/pdf/training/annual-national-training-seminar/2018/Emerging_Tech_Bitcoin_Crypto.pdf (accessed on 28 October 2022).
- Haber, S.; Stornetta, W.S. How to time-stamp a digital document. J. Cryptol. 1991, 3, 99–111. [Google Scholar] [CrossRef]
- Namasudra, S.; Deka, G.C.; Johri, P.; Hosseinpour, M.; Gandomi, A.H. The Revolution of Blockchain: State-of-the-Art and Research Challenges. Arch. Comput. Methods Eng. 2021, 28, 1497–1515. [Google Scholar] [CrossRef]
- Efanov, D.; Roschin, P. The All-Pervasiveness of the Blockchain Technology. Procedia Comput. Sci. 2018, 123, 116–121. [Google Scholar] [CrossRef]
- Cummings, S. The Four Blockchain Generations. The Capital. 2 February 2019. Available online: https://medium.com/the-capital/the-four-blockchain-generations-5627ef666f3b (accessed on 22 November 2022).
- Yaga, D.; Mell, P.; Roby, N.; Scarfone, K. Blockchain Technology Overview; NIST Internal or Interagency Report (NISTIR) 8202; National Institute of Standards and Technology: Gaithersburg, MA, USA, 2018. [CrossRef]
- Proof-of-Stake (PoS). Ethereum.Org. Available online: https://ethereum.org (accessed on 23 November 2022).
- Lu, Y. The blockchain: State-of-the-art and research challenges. J. Ind. Inf. Integr. 2019, 15, 80–90. [Google Scholar] [CrossRef]
- Alfrhan, A.; Moulahi, T.; Alabdulatif, A. Comparative study on hash functions for lightweight blockchain in Internet of Things (IoT). Blockchain Res. Appl. 2021, 2, 100036. [Google Scholar] [CrossRef]
- Liu, P.; Xu, X.; Wang, W. Threats, attacks and defenses to federated learning: Issues, taxonomy and perspectives. Cybersecurity 2022, 5, 4. [Google Scholar] [CrossRef]
- Rahman, M.A.; Hossain, M.S.; Islam, M.S.; Alrajeh, N.A.; Muhammad, G. Secure and Provenance Enhanced Internet of Health Things Framework: A Blockchain Managed Federated Learning Approach. IEEE Access 2020, 8, 205071–205087. [Google Scholar] [CrossRef]
- Kang, J.; Xiong, Z.; Niyato, D.; Zou, Y.; Zhang, Y.; Guizani, M. Reliable Federated Learning for Mobile Networks. IEEE Wirel. Commun. 2020, 27, 72–80. [Google Scholar] [CrossRef]
- Qi, Y.; Hossain, M.S.; Nie, J.; Li, X. Privacy-preserving blockchain-based federated learning for traffic flow prediction. Future Gener. Comput. Syst. 2021, 117, 328–337. [Google Scholar] [CrossRef]
- ur Rehman, M.H.; Dirir, A.M.; Salah, K.; Damiani, E.; Svetinovic, D. TrustFed: A Framework for Fair and Trustworthy Cross-Device Federated Learning in IIoT. IEEE Trans. Ind. Inform. 2021, 17, 8485–8494. [Google Scholar] [CrossRef]
- ur Rehman, M.H.; Salah, K.; Damiani, E.; Svetinovic, D. Towards Blockchain-Based Reputation-Aware Federated Learning. In Proceedings of the IEEE INFOCOM 2020—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 183–188. [Google Scholar] [CrossRef]
- Otoum, S.; Ridhawi, I.A.; Mouftah, H. Securing Critical IoT Infrastructures With Blockchain-Supported Federated Learning. IEEE Internet Things J. 2022, 9, 2592–2601. [Google Scholar] [CrossRef]
- Zhao, Y.; Zhao, J.; Jiang, L.; Tan, R.; Niyato, D.; Li, Z.; Lyu, L.; Liu, Y. Privacy-Preserving Blockchain-Based Federated Learning for IoT Devices. IEEE Internet Things J. 2021, 8, 1817–1829. [Google Scholar] [CrossRef]
- Liu, Y.; Peng, J.; Kang, J.; Iliyasu, A.M.; Niyato, D.; El-Latif, A.A.A. A Secure Federated Learning Framework for 5G Networks. IEEE Wirel. Commun. 2020, 27, 24–31. [Google Scholar] [CrossRef]
- Chang, Y.; Fang, C.; Sun, W. A Blockchain-Based Federated Learning Method for Smart Healthcare. Comput. Intell. Neurosci. 2021, 2021, e4376418. [Google Scholar] [CrossRef] [PubMed]
- Shayan, M.; Fung, C.; Yoon, C.J.M.; Beschastnikh, I. Biscotti: A Blockchain System for Private and Secure Federated Learning. IEEE Trans. Parallel Distrib. Syst. 2021, 32, 1513–1525. [Google Scholar] [CrossRef]
- BAFL: A Blockchain-Based Asynchronous Federated Learning Framework. IEEE Journals & Magazine. IEEE Xplore. Available online: https://ieeexplore.ieee.org/abstract/document/9399813 (accessed on 30 October 2022).
- Short, A.R.; Leligou, H.C.; Papoutsidakis, M.; Theocharis, E. Using Blockchain Technologies to Improve Security in Federated Learning Systems. In Proceedings of the 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC), Madrid, Spain, 13–17 July 2020; Available online: https://ieeexplore.ieee.org/abstract/document/9202584 (accessed on 24 October 2022).
- Qu, Y.; Gao, L.; Luan, T.H.; Xiang, Y.; Yu, S.; Li, B.; Zheng, G. Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing. IEEE Internet Things J. 2020, 7, 5171–5183. [Google Scholar] [CrossRef]
- Lu, Y.; Huang, X.; Zhang, K.; Maharjan, S.; Zhang, Y. Blockchain Empowered Asynchronous Federated Learning for Secure Data Sharing in Internet of Vehicles. IEEE Trans. Veh. Technol. 2020, 69, 4298–4311. [Google Scholar] [CrossRef]
- Lu, Y.; Huang, X.; Dai, Y.; Maharjan, S.; Zhang, Y. Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT. IEEE Trans. Ind. Inform. 2020, 16, 4177–4186. [Google Scholar] [CrossRef]
- Zhang, W.; Lu, Q.; Yu, Q.; Li, Z.; Liu, Y.; Lo, S.K.; Chen, S.; Xu, X.; Zhu, L. Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT. IEEE Internet Things J. 2021, 8, 5926–5937. [Google Scholar] [CrossRef]
- Zhang, X.; Hou, H.; Fang, Z.; Wang, Z. Industrial Internet Federated Learning Driven by IoT Equipment ID and Blockchain. Wirel. Commun. Mob. Comput. 2021, 2021, e7705843. [Google Scholar] [CrossRef]
- Jia, B.; Zhang, X.; Liu, J.; Zhang, Y.; Huang, K.; Liang, Y. Blockchain-Enabled Federated Learning Data Protection Aggregation Scheme With Differential Privacy and Homomorphic Encryption in IIoT. IEEE Trans. Ind. Inform. 2022, 18, 4049–4058. [Google Scholar] [CrossRef]
- Preuveneers, D.; Rimmer, V.; Tsingenopoulos, I.; Spooren, J.; Joosen, W.; Ilie-Zudor, E. Chained Anomaly Detection Models for Federated Learning: An Intrusion Detection Case Study. Appl. Sci. 2018, 8, 2663. [Google Scholar] [CrossRef]
- Sharma, P.K.; Park, J.H.; Cho, K. Blockchain and federated learning-based distributed computing defence framework for sustainable society. Sustain. Cities Soc. 2020, 59, 102220. [Google Scholar] [CrossRef]
- Połap, D.; Srivastava, G.; Yu, K. Agent architecture of an intelligent medical system based on federated learning and blockchain technology. J. Inf. Secur. Appl. 2021, 58, 102748. [Google Scholar] [CrossRef]
- Cui, L.; Qu, Y.; Xie, G.; Zeng, D.; Li, R.; Shen, S.; Yu, S. Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures. IEEE Trans. Ind. Inform. 2022, 18, 3492–3500. [Google Scholar] [CrossRef]
- Zhang, P.; Sun, H.; Situ, J.; Jiang, C.; Xie, D. Federated Transfer Learning for IIoT Devices With Low Computing Power Based on Blockchain and Edge Computing. IEEE Access 2021, 9, 98630–98638. [Google Scholar] [CrossRef]
- Chai, H.; Leng, S.; Chen, Y.; Zhang, K. A Hierarchical Blockchain-Enabled Federated Learning Algorithm for Knowledge Sharing in Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 2021, 22, 3975–3986. [Google Scholar] [CrossRef]
- Fan, S.; Zhang, H.; Zeng, Y.; Cai, W. Hybrid Blockchain-Based Resource Trading System for Federated Learning in Edge Computing. IEEE Internet Things J. 2021, 8, 2252–2264. [Google Scholar] [CrossRef]
- Qu, Y.; Pokhrel, S.R.; Garg, S.; Gao, L.; Xiang, Y. A Blockchained Federated Learning Framework for Cognitive Computing in Industry 4.0 Networks. IEEE Trans. Ind. Inform. 2021, 17, 2964–2973. [Google Scholar] [CrossRef]
# | Layer Name | Component |
---|---|---|
7 | Collaboration and Processes | People and Business Processes |
6 | Application | Reporting, Analytics, Control |
5 | Data Abstraction | Aggregation and Access |
4 | Data Accumulation | Storage |
3 | Edge (Fog) Computing | Data Element Analysis and Transformation |
2 | Connectivity | Communication and Processing Units |
1 | Physical Devices and Controllers | The “Things” in IoT |
Related Work | Summary | Limitation |
---|---|---|
[10] | Studied the security and privacy issues of Blockchain and federated learning integration. | Did not cover integrations related to IoT. Furthermore, no consideration on poisoning attack mitigations. |
[11] | Explained federated learning approaches with concern to privacy and security issues. | The wide scope of the paper did not focus on IoT-related integrations, with no mention of poisoning attack mitigations. |
[12] | Presented a survey that studied the integration between Blockchain, federated learning, and IoT with studying. | Did not provide analysis on the found literature and how the poisoning attacks are mitigated. |
[13] | Propose a comprehensive survey discussing the use of FL techniques to secure IoT-based systems. | Did not outline adversarial machine learning attacks and how to tackle them. |
[14] | The authors outlined existing solutions that deal with applying FL and Blockchain for security and privacy-preserved methods in the IoV ecosystem. | Focused only on IoV data and did not discuss other types of IoT ecosystems. |
[15] | ||
[16] | ||
This paper | Provided a technology summary and reviewed existing integrations of Blockchain, federated learning, and IoT while performing a security and privacy analysis of each reference found in the literature. | - |
Algorithm | Based on | Centralized | Remarks |
---|---|---|---|
Federated Average (FedAvg) | Stochastic gradient descent (SGD) | √ | - |
Secure Multi-Party Computation (SMC-Avg) | - | √ | Performs well even with 33% non-participating clients. |
FedProx | FedAvg | √ | Addresses device heterogeneity. |
Permissionless | Permissioned | Federated | |
---|---|---|---|
Publicity | Public | Private | Private |
Authority | Decentralized | Centralized | Decentralized |
Security | Less secure | Most secure | Secure |
Transaction speed and cost | High | Less | Less |
Consensus Algorithms | Steps | Blockchain | Remarks |
---|---|---|---|
Proof of Work [21] |
| Public | First protocol in Blockchain [19]. High computational requirements. Less efficiency [23]. |
Proof of Stake [25] |
| Public | More resource efficient [21]. The selection is not that “random”. The higher a validator invests, the higher chance of being chosen [24]. |
Proof of Elapsed Time [21] |
| Private | System clock can be compromised [24]. |
Practical Byzantine Fault Tolerance |
| Private | Addresses the scalability issues [21]. |
Type | Ref. | Consensus | Application | Integration Scope 1 | Privacy and Security 2 | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Con. | Incent. | Prov. | IPFS | P1gol | P2 | P3 | S1 | S2 | ||||
Reputation-Based | [29] | - | IoHT | √ | - | √ | - | √ | √ | - | - | √ |
[30] | BFTP | Mobile network | √ | - | - | - | - | √ | - | √ | √ | |
[31] | dBFTP | IoV | √ | - | - | - | √ | √ | √ | √ | - | |
[32] | - | iIoT | √ | - | - | √ | √ | - | - | √ | √ | |
[33] | - | Edge computing | - | √ | √ | √ | - | √ | - | - | √ | |
[34] | BFTP | IoT infrastructure | √ | √ | - | - | √ | √ | - | - | √ | |
[35] | Algorand | Edge computing | √ | - | - | √ | √ | √ | - | - | √ | |
Noise-Based | [36] | - | Mobile network | - | √ | - | - | - | √ | √ | - | √ |
[37] | Algorand | mIoT | √ | - | - | - | - | √ | - | - | √ | |
[38] | PoF | Edge computing | √ | - | - | - | - | √ | √ | - | √ | |
[39] | PoW | Edge computing | √ | √ | - | - | - | √ | - | √ | √ | |
Other | [40] | - | Edge computing | √ | - | - | - | - | √ | - | - | √ |
[41] | PoW | Fog computing | √ | - | - | - | √ | √ | - | √ | √ | |
[54] | PoW and PoET | Industry network | √ | √ | - | - | √ | √ | √ | - | √ | |
[42] | - | IoV | - | - | - | √ | - | √ | - | - | - | |
[43] | PoQ | iIoT | √ | - | √ | - | √ | - | - | √ | - | |
[44] | PoW | iIoT | - | √ | - | - | √ | - | - | √ | - | |
[45] | - | iIoT | √ | - | - | - | - | √ | - | - | - | |
[46] | RAFT | iIoT | √ | - | - | - | - | √ | - | √ | √ | |
[47] | Round Robin | IoT | √ | - | - | - | - | - | - | - | √ | |
[48] | - | IoBT | - | - | - | - | - | √ | - | - | √ | |
[49] | - | IoMT | - | - | - | - | √ | - | - | √ | - | |
[50] | - | IoT infrastructure | - | - | - | - | - | √ | - | - | - | |
[51] | Ripple | iIoT | √ | - | √ | - | √ | - | - | - | - | |
[52] | PoK | IoV | √ | √ | - | - | √ | - | - | √ | - | |
[53] | PoW | Edge computing | √ | √ | √ | - | √ | - | - | - | √ |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Al Asqah, M.; Moulahi, T. Federated Learning and Blockchain Integration for Privacy Protection in the Internet of Things: Challenges and Solutions. Future Internet 2023, 15, 203. https://doi.org/10.3390/fi15060203
Al Asqah M, Moulahi T. Federated Learning and Blockchain Integration for Privacy Protection in the Internet of Things: Challenges and Solutions. Future Internet. 2023; 15(6):203. https://doi.org/10.3390/fi15060203
Chicago/Turabian StyleAl Asqah, Muneerah, and Tarek Moulahi. 2023. "Federated Learning and Blockchain Integration for Privacy Protection in the Internet of Things: Challenges and Solutions" Future Internet 15, no. 6: 203. https://doi.org/10.3390/fi15060203
APA StyleAl Asqah, M., & Moulahi, T. (2023). Federated Learning and Blockchain Integration for Privacy Protection in the Internet of Things: Challenges and Solutions. Future Internet, 15(6), 203. https://doi.org/10.3390/fi15060203