RedPO-BRNNet: Federated Anomaly Detection with Differential Privacy and Secure Aggregation for Edge IoT
Abstract
In the context of edge computing (EC), there are distributed Internet of Things (IoT) devices that generate huge volumes of sensitive data, which necessitates privacy-preserving and efficient model training. Federated learning (FL) enables the ability to collaboratively train models without sharing raw data, albeit at the risk of sharing data values through indirect means and in an uncontrolled manner that continues to expose privacy risks like gradient inference attacks and data reconstruction methods. To propose a secure aggregation framework that combines FL with differential privacy (DP) at the 'noise' level of 1.e−4 and a red panda optimizer fused bidirectional recurrent neural network (RedPO-BRNNet), that improves predictive performance, convergence efficiency, and robustness in an EC environment. This framework is implemented using Python and utilizes local datasets of 2,501 time-series recordings gathered from 10 distributed edge devices, which feature blood pressure, activity level, body temperature, heart rate, anomaly scores, and a binary classification label. The data are pre-processed using Z-score normalization to standardize scales for the features across devices. Each edge device trains a local RedPO-BRNNet model, applies DP noise to the model parameters and then contributes updates that preserve privacy to the global aggregation using FedAvg. RedPO-BRNNet is tested against LSTM, Bi-LSTM, and baseline BRNN models during five training epochs. The proposed model achieves 94.97% anomaly detection accuracy, 2.14% privacy leakage, 57.82 ms client latency, and 78.96% model convergence efficiency, with improvements statistically validated using paired t-tests (p < 0.05). These results show that RedPO-BRNNet effectively protects privacy while enabling efficient and scalable edge intelligence, making it a dependable solution for safe, multi-device IoT deployments.References
Covi, E., Donati, E., Liang, X., Kappel, D., Heidari, H., Payvand, M. and Wang, W., 2021. Adaptive extreme edge computing for wearable devices. Frontiers in Neuroscience, 15, p.611300. https://doi.org/10.3389/fnins.2021.611300
Trigka, M. and Dritsas, E., 2025. Edge and cloud computing in smart cities. Future Internet, 17(3), p.118. https://doi.org/10.3390/fi17030118
Chandnani, N. and Khairnar, C.N., 2022. An analysis of architecture, framework, security, and challenging aspects for data aggregation and routing techniques in IoT WSNs. Theoretical Computer Science, 929, pp.95-113.
https://doi.org/10.1016/j.tcs.2022.06.032
Zhang, J., Qu, Z., Chen, C., Wang, H., Zhan, Y., Ye, B. and Guo, S., 2021. Edge learning: The enabling technology for distributed big data analytics in the edge. ACM Computing Surveys (CSUR), 54(7), pp.1-36. https://doi.org/10.1145/3464419
Rahman, A., Hossain, M.S., Muhammad, G., Kundu, D., Debnath, T., Rahman, M., Khan, M.S.I., Tiwari, P. and Band, S.S., 2023. Federated learning-based AI approaches in smart healthcare: concepts, taxonomies, challenges, and open issues. Cluster computing, 26(4), pp.2271-2311. https://doi.org/10.1007/s10586-022-03658-4
Ibrahim Khalaf, O., Algburi, S., S, A., Selvaraj, D., Sharif, M.S. and Elmedany, W., 2024. Federated learning with hybrid differential privacy for secure and reliable cross‐IoT platform knowledge sharing. Security and Privacy, 7(3), p.e374. https://doi.org/10.1002/spy2.374
Thantharate, P., Bhojwani, S. and Thantharate, A., 2024. DPShield: Optimizing differential privacy for high-utility data analysis in sensitive domains. Electronics, 13(12), p.2333. https://doi.org/10.3390/electronics13122333
Chen, C., Liu, J., Tan, H., Li, X., Wang, K.I.K., Li, P., Sakurai, K. and Dou, D., 2025. Trustworthy federated learning: privacy, security, and beyond. Knowledge and Information Systems, 67(3), pp.2321-2356. https://doi.org/10.1007/s10115-024-02285-2
Nguyen, D.C., Ding, M., Pham, Q.V., Pathirana, P.N., Le, L.B., Seneviratne, A., Li, J., Niyato, D. and Poor, H.V., 2021. Federated learning meets blockchain in edge computing: Opportunities and challenges. IEEE Internet of Things Journal, 8(16), pp.12806-12825. https://doi.org/10.1109/JIOT.2021.3072611
Erskine, S.K., 2024. Secure data aggregation using authentication and authorization for privacy preservation in wireless sensor networks. Sensors, 24(7), p.2090. https://doi.org/10.3390/s24072090
Nazir, A., He, J., Zhu, N., Anwar, M.S. and Pathan, M.S., 2024. Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain. Cluster Computing, 27(6), pp.8367-8392. https://doi.org/10.1007/s10586-024-04436-0
Xu, W., Yang, Z., Ng, D.W.K., Levorato, M., Eldar, Y.C. and Debbah, M., 2023. Edge learning for B5G networks with distributed signal processing: Semantic communication, edge computing, and wireless sensing. IEEE journal of Selected Topics in Signal Processing, 17(1), pp.9-39. https://doi.org/10.1109/JSTSP.2023.3239189
Shenoy, D., Bhat, R. and Krishna Prakasha, K., 2025. Exploring privacy mechanisms and metrics in federated learning. Artificial Intelligence Review, 58(8), p.223. https://doi.org/10.1007/s10462-025-11170-5
Liu, W., Xu, X., Li, D., Qi, L., Dai, F., Dou, W. and Ni, Q., 2022. Privacy preservation for federated learning with robust aggregation in edge computing. IEEE Internet of Things Journal, 10(8), pp.7343-7355. https://doi.org/10.1109/JIOT.2022.3229122
Jiang, B., Li, J., Wang, H. and Song, H., 2021. Privacy-preserving federated learning for industrial edge computing via hybrid differential privacy and adaptive compression. IEEE Transactions on Industrial Informatics, 19(2), pp.1136-1144. https://doi.org/10.1109/TII.2021.3131175
Jia, B., Zhang, X., Liu, J., Zhang, Y., Huang, K., and Liang, Y., 2021. Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT. IEEE Transactions on Industrial Informatics, 18(6), pp.4049-4058. https://doi.org/10.1109/TII.2021.3085960
Sharma, J., Kim, D., Lee, A. and Seo, D., 2021. On a differential privacy-based framework for enhancing user data privacy in a mobile edge computing environment. Ieee access, 9, pp.38107-38118. https://doi.org/10.1109/ACCESS.2021.3063603
Wang, R., Lai, J., Zhang, Z., Li, X., Vijayakumar, P. and Karuppiah, M., 2022. Privacy-preserving federated learning for internet of Medical Things under edge computing. IEEE Journal of biomedical and health informatics, 27(2), pp.854-865. https://doi.org/10.1109/JBHI.2022.3157725
Zhou, J., Wu, N., Wang, Y., Gu, S., Cao, Z., Dong, X. and Choo, K.K.R., 2022. A differentially private federated learning model against poisoning attacks in edge computing. IEEE Transactions on Dependable and Secure Computing, 20(3), pp.1941-1958. https://doi.org/10.1109/TDSC.2022.3168556
Zhou, H., Yang, G., Dai, H. and Liu, G., 2022. PFLF: Privacy-preserving federated learning framework for edge computing. IEEE Transactions on Information Forensics and Security, 17, pp.1905-1918. https://doi.org/10.1109/TIFS.2022.3174394
Hongbin, F. and Zhi, Z., 2023. Privacy-preserving data aggregation scheme based on federated learning for IIoT. Mathematics, 11(1), p.214. https://doi.org/10.3390/math11010214
Liu, Y., Liu, P., Jing, W. and Song, H.H., 2023. PD2S: A privacy-preserving differentiated data sharing scheme based on blockchain and federated learning. IEEE Internet of Things Journal, 10(24), pp.21489-21501. https://doi.org/10.1109/JIOT.2023.3295763
Wu, X., Zhang, Y., Shi, M., Li, P., Li, R. and Xiong, N.N., 2022. An adaptive federated learning scheme with differential privacy preserving. Future Generation Computer Systems, 127, pp.362-372. https://doi.org/10.1016/j.future.2021.09.015
Fan, H., Huang, C. and Liu, Y., 2022. Federated learning-based privacy-preserving data aggregation scheme for IIoT. IEEE Access, 11, pp.6700-6707. http://dx.doi.org/10.13140/RG.2.2.16605.59365
Zhu, B. and Niu, L., 2025. A privacy-preserving federated learning scheme with homomorphic encryption and edge computing. Alexandria Engineering Journal, 118, pp.11-20.
DOI:
https://doi.org/10.31449/inf.v49i35.11175Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







