Asynchronous federated learning based zero trust architecture for the next generation industrial control systems

The zero-trust architecture (ZTA) is an emerging technology for ensuring the security of next-generation industrial control systems (ICSs). However, ICSs are complex and characterised by diverse equipment, cyber-physical integration, dynamic network topologies and stringent real-time demands, which...

Full description

Saved in:
Bibliographic Details
Published inComputer networks (Amsterdam, Netherlands : 1999) Vol. 269; p. 111459
Main Authors Lv, Fei, Wang, Hangyu, Pan, Zhiwen, Sun, Rongkang, Si, Shuaizong, Zhang, Weidong, Lv, Shichao, Sun, Limin
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.09.2025
Subjects
Online AccessGet full text
ISSN1389-1286
DOI10.1016/j.comnet.2025.111459

Cover

Abstract The zero-trust architecture (ZTA) is an emerging technology for ensuring the security of next-generation industrial control systems (ICSs). However, ICSs are complex and characterised by diverse equipment, cyber-physical integration, dynamic network topologies and stringent real-time demands, which present significant challenges to ZTA implementation. Moreover, as enterprises increasingly share data to identify advanced business patterns, the risk of data breaches escalates during the digitalisation and intelligent transformation process. To address these issues, this article proposes a ZTA for next-generation ICSs based on asynchronous federated deep learning (FDL). Both physical and cyber information is considered in trust evaluations, except for subject and object attributes. This can significantly enhance the accuracy of zero-trust decision-making. Furthermore, a novel grouping-based asynchronous federated learning algorithm is proposed to reduce the aggregation delay experienced by different devices, grouping those with similar computing capabilities and business urgency requirements. Additionally, optimising model aggregation enhances the model’s adaptability to swift changes in ICSs environments. Through rigorous validation in a real gas pipeline system in our laboratory, we demonstrated the effectiveness of our proposed ZTA, showing that it is superior to alternative methodologies.
AbstractList The zero-trust architecture (ZTA) is an emerging technology for ensuring the security of next-generation industrial control systems (ICSs). However, ICSs are complex and characterised by diverse equipment, cyber-physical integration, dynamic network topologies and stringent real-time demands, which present significant challenges to ZTA implementation. Moreover, as enterprises increasingly share data to identify advanced business patterns, the risk of data breaches escalates during the digitalisation and intelligent transformation process. To address these issues, this article proposes a ZTA for next-generation ICSs based on asynchronous federated deep learning (FDL). Both physical and cyber information is considered in trust evaluations, except for subject and object attributes. This can significantly enhance the accuracy of zero-trust decision-making. Furthermore, a novel grouping-based asynchronous federated learning algorithm is proposed to reduce the aggregation delay experienced by different devices, grouping those with similar computing capabilities and business urgency requirements. Additionally, optimising model aggregation enhances the model’s adaptability to swift changes in ICSs environments. Through rigorous validation in a real gas pipeline system in our laboratory, we demonstrated the effectiveness of our proposed ZTA, showing that it is superior to alternative methodologies.
ArticleNumber 111459
Author Sun, Limin
Sun, Rongkang
Si, Shuaizong
Lv, Shichao
Zhang, Weidong
Wang, Hangyu
Pan, Zhiwen
Lv, Fei
Author_xml – sequence: 1
  givenname: Fei
  surname: Lv
  fullname: Lv, Fei
  email: lvfei@iie.ac.cn
  organization: Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China
– sequence: 2
  givenname: Hangyu
  orcidid: 0009-0004-8234-2940
  surname: Wang
  fullname: Wang, Hangyu
  email: wanghangyu@iie.ac.cn
  organization: Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China
– sequence: 3
  givenname: Zhiwen
  surname: Pan
  fullname: Pan, Zhiwen
  email: panzhiwen@iie.ac.cn
  organization: Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China
– sequence: 4
  givenname: Rongkang
  surname: Sun
  fullname: Sun, Rongkang
  email: sunrongkang@stu.sau.edu.cn
  organization: College of Artificial Intelligence, Shenyang Aerospace University, Shenyang, China
– sequence: 5
  givenname: Shuaizong
  orcidid: 0000-0001-8805-1221
  surname: Si
  fullname: Si, Shuaizong
  email: sishuaizong@iie.ac.cn
  organization: Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China
– sequence: 6
  givenname: Weidong
  surname: Zhang
  fullname: Zhang, Weidong
  email: zhangweidong@iie.ac.cn
  organization: Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China
– sequence: 7
  givenname: Shichao
  surname: Lv
  fullname: Lv, Shichao
  email: lvshichao@iie.ac.cn
  organization: Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China
– sequence: 8
  givenname: Limin
  surname: Sun
  fullname: Sun, Limin
  email: sunlimin@iie.ac.cn
  organization: Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China
BookMark eNp9kMtKQzEQhrOoYKu-gYu8wKnJuSYboRRvUHCj65DLnDblNCmTVKxP7ynHtathmPl-Zr4FmYUYgJB7zpac8fZhv7TxECAvS1Y2S8553cgZmfNKyIKXor0mi5T2jLG6LsWcHFfpHOwOY4inRHtwgDqDowNoDD5sqdFpbH8AI814SplqtDufweYTAu0j0rwDGuA70y2EC-1joD64cRe9HqiNIWMcaDqnDId0S656PSS4-6s35PP56WP9WmzeX97Wq01hy6bLhWtNpcEaw5nmXLradpZzZmppWiOk6BvNRNOCa0QvSw2i6pq-M1aOs650sroh9ZRrMaaE0Ksj-oPGs-JMXUypvZpMqYspNZkasccJg_G2Lw-okvUQLDiP48_KRf9_wC-e63uX
Cites_doi 10.1016/j.comnet.2024.110294
10.1109/TICPS.2023.3333850
10.1109/JSAC.2023.3310068
10.1109/JIOT.2020.3041042
10.1109/JSAC.2019.2904348
10.1109/TIFS.2022.3206423
10.1109/TIFS.2023.3264152
10.1109/TNSE.2022.3169117
10.1109/JSAC.2020.2980921
10.1109/JSAC.2021.3126081
10.1016/j.comnet.2024.110376
10.1016/j.comnet.2021.108661
10.1016/j.comnet.2023.110010
10.3390/fi16090320
10.1016/j.comnet.2023.109576
10.1016/j.comnet.2022.109358
10.1109/JSAC.2021.3118352
10.1109/OJCOMS.2024.3391728
10.1109/TIFS.2023.3326975
10.1109/TII.2019.2925035
10.1109/TII.2022.3231406
10.1109/MWC.001.2300368
10.1109/JSAC.2022.3180799
10.1109/JSAC.2022.3229448
10.1109/TDSC.2023.3347040
10.1109/TNSM.2022.3157248
10.1016/j.comnet.2024.110197
10.1145/3055366.3055375
10.1109/JSAC.2021.3088655
10.1016/j.comnet.2022.109048
ContentType Journal Article
Copyright 2025
Copyright_xml – notice: 2025
DBID AAYXX
CITATION
DOI 10.1016/j.comnet.2025.111459
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
ExternalDocumentID 10_1016_j_comnet_2025_111459
S1389128625004268
GrantInformation_xml – fundername: Beijing Natural Science Foundation
  grantid: L234033
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
6OB
7-5
71M
77K
8P~
AABNK
AAEDT
AAEDW
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AATTM
AAXKI
AAXUO
AAYFN
AAYWO
ABBOA
ABFNM
ABJNI
ABMAC
ABXDB
ACDAQ
ACGFS
ACNNM
ACRLP
ACVFH
ACZNC
ADBBV
ADCNI
ADEZE
ADJOM
ADTZH
AEBSH
AECPX
AEIPS
AEKER
AENEX
AEUPX
AFJKZ
AFPUW
AFTJW
AFXIZ
AGCQF
AGHFR
AGRNS
AGUBO
AGYEJ
AHJVU
AHZHX
AIALX
AIEXJ
AIGII
AIIUN
AIKHN
AITUG
AKBMS
AKRWK
AKYEP
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOUOD
APXCP
AXJTR
BJAXD
BKOJK
BLXMC
BNPGV
CS3
DU5
EBS
EFJIC
EFKBS
EJD
EO8
EO9
EP2
EP3
F0J
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
HZ~
IHE
J1W
JJJVA
KOM
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
PQQKQ
Q38
R2-
RIG
ROL
RPZ
RXW
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TAE
TN5
ZMT
ZY4
~G-
77I
AAYXX
ACLOT
CITATION
EFLBG
~HD
ID FETCH-LOGICAL-c257t-d6b3aecbb10a119d4c7c110b49b6b898f5a0856ed58f92ae8375f7bc989872d93
IEDL.DBID .~1
ISSN 1389-1286
IngestDate Wed Oct 01 05:46:51 EDT 2025
Sat Aug 09 17:30:52 EDT 2025
IsPeerReviewed true
IsScholarly true
Keywords Next-generation industrial control system
Physical information
Zero-trust architecture
Federated deep learning
Cyber information
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c257t-d6b3aecbb10a119d4c7c110b49b6b898f5a0856ed58f92ae8375f7bc989872d93
ORCID 0009-0004-8234-2940
0000-0001-8805-1221
ParticipantIDs crossref_primary_10_1016_j_comnet_2025_111459
elsevier_sciencedirect_doi_10_1016_j_comnet_2025_111459
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate September 2025
2025-09-00
PublicationDateYYYYMMDD 2025-09-01
PublicationDate_xml – month: 09
  year: 2025
  text: September 2025
PublicationDecade 2020
PublicationTitle Computer networks (Amsterdam, Netherlands : 1999)
PublicationYear 2025
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Chai, Ali, Zawad, Truex, Anwar, Baracaldo, Zhou, Ludwig, Yan, Cheng (b22) 2020
Cheng, Chen, Han (b38) 2023
Ali, Gregory, Li, Dib (b37) 2024
Boobalan, Ramu, Pham, Dev, Pandya, Maddikunta, Gadekallu, Huynh-The (b17) 2022; 212
Hong, Xu, Huang, Li, Hu, Gu (b28) 2023; 18
Jose Diaz Rivera, Muhammad, Song (b29) 2024; 5
Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, Aditya P Mathur, WADI: a water distribution testbed for research in the design of secure cyber physical systems, in: Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017, pp. 25–28.
Stafford (b27) 2020; 800
Ramezanpour, Jagannath (b14) 2022; 217
Nguyen, Malik, Zhan, Yousefpour, Rabbat, Malek, Huba (b26) 2022
Lei, Pang, Wen, Hou, Li (b32) 2023
Zhang, Yang, Wu, Peng, Zhang, Zhang, Shen (b18) 2021; 39
Qi, Chiaro, Guzzo, Ianni, Fortino, Piccialli (b41) 2023
Bello, Hussein, Ulema, Koilpillai (b10) 2022; 19
Yang, Zhao, Xiong, Lam, Sun, Xiao (b20) 2021; 39
Chen, Qiao, Zhao, Liu, Shi, Lyu, Chen, Lu, Zhai (b39) 2020; 8
Bi, He, Luo, Meng, Ji, Huang (b6) 2023; 19
Wang, Zhou, Shi, Zhuang (b19) 2022; 40
Li, Yang, Yu, Duan, Yang (b15) 2024; 16
Li, Chen, Jin, Shi, Goh, Ng (b44) 2019
El Rajab, Yang, Shami (b16) 2024; 243
Aloqaily, Ridhawi, Kanhere (b2) 2023; 41
Yuan, Xia, Zhang, Yang, Mahmoud (b7) 2020; 16
Campolo, Genovese, Singh, Molinaro (b24) 2023; 223
Hu, Shaloudegi, Zhang, Yu (b35) 2022; 9
Wang, Xu, Shi, Chang (b42) 2021; 40
Qin, Xiao, Sun, Dai, Zhang, Shen (b1) 2023; 41
Feng, Hu (b33) 2023; 1
Ge, Zhu (b31) 2023
Huang, Zhang, Hu, Fu, Qin (b8) 2022; 17
Yang, Li, Lin, Chen, Sun (b4) 2020; 38
Wang, Xu, Liu, Xu, Huang, Zhao (b36) 2022
Xie, Wang, Ding, Yang, Liang, Qin (b12) 2024; 31
Xie, Koyejo, Gupta (b25) 2019
McMahan, Moore, Ramage, Hampson, y Arcas (b34) 2017
Colombo, Karnouskos, Bangemann (b3) 2014
Wang, Tuor, Salonidis, Leung, Makaya, He, Chan (b40) 2019; 37
Ge, Zhu (b9) 2024; 19
Zhang, Zheng, Zhang, Chen, Tan, Zhang, Li (b13) 2024; 245
Karimireddy, Kale, Mohri, Reddi, Stich, Suresh (b23) 2020
de Oliveira, Gonçalves, Meneguette, de Sousa Jr., Guidoni, Oliveira, Rocha Filho (b21) 2023; 236
Campos, Saura, González-Vidal, Hernández-Ramos, Bernabe, Baldini, Skarmeta (b5) 2022; 203
Liu, Xing, Tong, Lin, Chen, Guan, Wu, Susilo (b30) 2023
Jing, Peng, Fu, Hu (b11) 2024
Yang (10.1016/j.comnet.2025.111459_b4) 2020; 38
Campolo (10.1016/j.comnet.2025.111459_b24) 2023; 223
Jing (10.1016/j.comnet.2025.111459_b11) 2024
El Rajab (10.1016/j.comnet.2025.111459_b16) 2024; 243
Yang (10.1016/j.comnet.2025.111459_b20) 2021; 39
Wang (10.1016/j.comnet.2025.111459_b42) 2021; 40
Qin (10.1016/j.comnet.2025.111459_b1) 2023; 41
Chai (10.1016/j.comnet.2025.111459_b22) 2020
Chen (10.1016/j.comnet.2025.111459_b39) 2020; 8
Qi (10.1016/j.comnet.2025.111459_b41) 2023
Xie (10.1016/j.comnet.2025.111459_b12) 2024; 31
Feng (10.1016/j.comnet.2025.111459_b33) 2023; 1
Ge (10.1016/j.comnet.2025.111459_b9) 2024; 19
de Oliveira (10.1016/j.comnet.2025.111459_b21) 2023; 236
Lei (10.1016/j.comnet.2025.111459_b32) 2023
Ramezanpour (10.1016/j.comnet.2025.111459_b14) 2022; 217
Karimireddy (10.1016/j.comnet.2025.111459_b23) 2020
Bello (10.1016/j.comnet.2025.111459_b10) 2022; 19
Campos (10.1016/j.comnet.2025.111459_b5) 2022; 203
Huang (10.1016/j.comnet.2025.111459_b8) 2022; 17
Boobalan (10.1016/j.comnet.2025.111459_b17) 2022; 212
Wang (10.1016/j.comnet.2025.111459_b19) 2022; 40
Hong (10.1016/j.comnet.2025.111459_b28) 2023; 18
Wang (10.1016/j.comnet.2025.111459_b40) 2019; 37
Zhang (10.1016/j.comnet.2025.111459_b18) 2021; 39
Hu (10.1016/j.comnet.2025.111459_b35) 2022; 9
Yuan (10.1016/j.comnet.2025.111459_b7) 2020; 16
Ali (10.1016/j.comnet.2025.111459_b37) 2024
Zhang (10.1016/j.comnet.2025.111459_b13) 2024; 245
Stafford (10.1016/j.comnet.2025.111459_b27) 2020; 800
Bi (10.1016/j.comnet.2025.111459_b6) 2023; 19
Cheng (10.1016/j.comnet.2025.111459_b38) 2023
Colombo (10.1016/j.comnet.2025.111459_b3) 2014
Li (10.1016/j.comnet.2025.111459_b15) 2024; 16
Xie (10.1016/j.comnet.2025.111459_b25) 2019
Jose Diaz Rivera (10.1016/j.comnet.2025.111459_b29) 2024; 5
Aloqaily (10.1016/j.comnet.2025.111459_b2) 2023; 41
McMahan (10.1016/j.comnet.2025.111459_b34) 2017
Nguyen (10.1016/j.comnet.2025.111459_b26) 2022
Ge (10.1016/j.comnet.2025.111459_b31) 2023
Liu (10.1016/j.comnet.2025.111459_b30) 2023
10.1016/j.comnet.2025.111459_b43
Wang (10.1016/j.comnet.2025.111459_b36) 2022
Li (10.1016/j.comnet.2025.111459_b44) 2019
References_xml – year: 2019
  ident: b25
  article-title: Asynchronous federated optimization
– volume: 41
  start-page: 3504
  year: 2023
  end-page: 3516
  ident: b2
  article-title: Reinforcing industry 4.0 with digital twins and blockchain-assisted federated learning
  publication-title: IEEE J. Sel. Areas Commun.
– volume: 5
  start-page: 2792
  year: 2024
  end-page: 2814
  ident: b29
  article-title: Securing digital identity in the zero trust architecture: A blockchain approach to privacy-focused multi-factor authentication
  publication-title: IEEE Open J. Commun. Soc.
– volume: 19
  start-page: 9619
  year: 2023
  end-page: 9630
  ident: b6
  article-title: Defense of advanced persistent threat on industrial internet of things with lateral movement modeling
  publication-title: IEEE Trans. Ind. Inform.
– volume: 217
  year: 2022
  ident: b14
  article-title: Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN
  publication-title: Comput. Netw.
– volume: 9
  start-page: 2039
  year: 2022
  end-page: 2051
  ident: b35
  article-title: Federated learning meets multi-objective optimization
  publication-title: IEEE Trans. Netw. Sci. Eng.
– year: 2022
  ident: b36
  article-title: Accelerating federated learning with cluster construction and hierarchical aggregation
  publication-title: IEEE Trans. Mob. Comput.
– volume: 8
  start-page: 10248
  year: 2020
  end-page: 10263
  ident: b39
  article-title: A security awareness and protection system for 5G smart healthcare based on zero-trust architecture
  publication-title: IEEE Internet Things J.
– volume: 40
  start-page: 2361
  year: 2022
  end-page: 2377
  ident: b19
  article-title: Interference management for over-the-air federated learning in multi-cell wireless networks
  publication-title: IEEE J. Sel. Areas Commun.
– volume: 236
  year: 2023
  ident: b21
  article-title: F-NIDS—A network intrusion detection system based on federated learning
  publication-title: Comput. Netw.
– year: 2023
  ident: b38
  article-title: Towards zero-trust security for the metaverse
  publication-title: IEEE Commun. Mag.
– volume: 41
  start-page: 776
  year: 2023
  end-page: 788
  ident: b1
  article-title: Inverse-GMM: A latency distribution shaping method for industrial cooperative deep learning systems
  publication-title: IEEE J. Sel. Areas Commun.
– year: 2024
  ident: b37
  article-title: Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in multi-access edge computing
  publication-title: Comput. Netw.
– volume: 212
  year: 2022
  ident: b17
  article-title: Fusion of federated learning and industrial internet of things: A survey
  publication-title: Comput. Netw.
– start-page: 125
  year: 2020
  end-page: 136
  ident: b22
  article-title: Tifl: A tier-based federated learning system
  publication-title: Proceedings of the 29th International Symposium on High-Performance Parallel and Distributed Computing
– volume: 37
  start-page: 1205
  year: 2019
  end-page: 1221
  ident: b40
  article-title: Adaptive federated learning in resource constrained edge computing systems
  publication-title: IEEE J. Sel. Areas Commun.
– year: 2023
  ident: b32
  article-title: Physical layer enhanced zero-trust security for wireless industrial internet of things
  publication-title: IEEE Trans. Ind. Inform.
– year: 2023
  ident: b31
  article-title: GAZETA: Game-theoretic zero-trust authentication for defense against lateral movement in 5G IoT networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
– reference: Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, Aditya P Mathur, WADI: a water distribution testbed for research in the design of secure cyber physical systems, in: Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017, pp. 25–28.
– start-page: 1273
  year: 2017
  end-page: 1282
  ident: b34
  article-title: Communication-efficient learning of deep networks from decentralized data
  publication-title: Artificial Intelligence and Statistics
– volume: 40
  start-page: 323
  year: 2021
  end-page: 341
  ident: b42
  article-title: Quantized federated learning under transmission delay and outage constraints
  publication-title: IEEE J. Sel. Areas Commun.
– volume: 243
  year: 2024
  ident: b16
  article-title: Zero-touch networks: Towards next-generation network automation
  publication-title: Comput. Netw.
– volume: 39
  start-page: 3144
  year: 2021
  end-page: 3159
  ident: b20
  article-title: Privacy-preserving federated learning for UAV-enabled networks: Learning-based joint scheduling and resource management
  publication-title: IEEE J. Sel. Areas Commun.
– start-page: 1
  year: 2014
  end-page: 22
  ident: b3
  article-title: Towards the next generation of industrial cyber-physical systems
  publication-title: Industrial Cloud-Based Cyber-Physical Systems: The IMC-AESOP Approach
– volume: 19
  start-page: 540
  year: 2024
  end-page: 554
  ident: b9
  article-title: GAZETA: Game-theoretic ZEro-trust authentication for defense against lateral movement in 5G IoT networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 39
  start-page: 3688
  year: 2021
  end-page: 3703
  ident: b18
  article-title: Optimizing federated learning in distributed industrial IoT: A multi-agent approach
  publication-title: IEEE J. Sel. Areas Commun.
– start-page: 703
  year: 2019
  end-page: 716
  ident: b44
  article-title: MAD-GAN: Multivariate anomaly detection for time series data with generative adversarial networks
  publication-title: International Conference on Artificial Neural Networks
– volume: 245
  year: 2024
  ident: b13
  article-title: ATT&CK-based advanced persistent threat attacks risk propagation assessment model for zero trust networks
  publication-title: Comput. Netw.
– start-page: 5132
  year: 2020
  end-page: 5143
  ident: b23
  article-title: Scaffold: Stochastic controlled averaging for federated learning
  publication-title: International Conference on Machine Learning
– volume: 1
  start-page: 394
  year: 2023
  end-page: 405
  ident: b33
  article-title: Cyber-physical zero trust architecture for industrial cyber-physical systems
  publication-title: IEEE Trans. Ind. Cyber Phys. Syst.
– volume: 223
  year: 2023
  ident: b24
  article-title: Scalable and interoperable edge-based federated learning in IoT contexts
  publication-title: Comput. Netw.
– year: 2023
  ident: b41
  article-title: Model aggregation techniques in federated learning: A comprehensive survey
  publication-title: Future Gener. Comput. Syst.
– volume: 16
  start-page: 1571
  year: 2020
  end-page: 1580
  ident: b7
  article-title: Stackelberg-game-based defense analysis against advanced persistent threats on cloud control system
  publication-title: IEEE Trans. Ind. Inform.
– year: 2024
  ident: b11
  article-title: An authentication mechanism based on zero trust with radio frequency fingerprint for internet of things networks
  publication-title: IEEE Internet Things J.
– volume: 19
  start-page: 1876
  year: 2022
  end-page: 1889
  ident: b10
  article-title: On sustained zero trust conceptualization security for mobile core networks in 5G and beyond
  publication-title: IEEE Trans. Netw. Serv. Manag.
– volume: 31
  start-page: 22
  year: 2024
  end-page: 29
  ident: b12
  article-title: Industrial wireless internet zero trust model: Zero trust meets dynamic federated learning with blockchain
  publication-title: IEEE Wirel. Commun.
– volume: 800
  start-page: 207
  year: 2020
  ident: b27
  article-title: Zero trust architecture
  publication-title: NIST Spec. Publ.
– volume: 38
  start-page: 955
  year: 2020
  end-page: 967
  ident: b4
  article-title: iFinger: Intrusion detection in industrial control systems via register-based fingerprinting
  publication-title: IEEE J. Sel. Areas Commun.
– volume: 18
  start-page: 2794
  year: 2023
  end-page: 2809
  ident: b28
  article-title: SysFlow: Toward a programmable zero trust framework for system security
  publication-title: IEEE Trans. Inf. Forensics Secur.
– start-page: 3581
  year: 2022
  end-page: 3607
  ident: b26
  article-title: Federated learning with buffered asynchronous aggregation
  publication-title: International Conference on Artificial Intelligence and Statistics
– start-page: 1
  year: 2023
  end-page: 14
  ident: b30
  article-title: Secure and scalable cross-domain data sharing in zero-trust cloud-edge-end environment based on sharding blockchain
  publication-title: IEEE Trans. Dependable Secur. Comput.
– volume: 16
  start-page: 320
  year: 2024
  ident: b15
  article-title: A micro-segmentation method based on VLAN-VxLAN mapping technology
  publication-title: Futur. Internet
– volume: 203
  year: 2022
  ident: b5
  article-title: Evaluating federated learning for intrusion detection in internet of things: Review and challenges
  publication-title: Comput. Netw.
– volume: 17
  start-page: 3306
  year: 2022
  end-page: 3320
  ident: b8
  article-title: Research on distributed dynamic trusted access control based on security subsystem
  publication-title: IEEE Trans. Inf. Forensics Secur.
– year: 2022
  ident: 10.1016/j.comnet.2025.111459_b36
  article-title: Accelerating federated learning with cluster construction and hierarchical aggregation
  publication-title: IEEE Trans. Mob. Comput.
– volume: 243
  year: 2024
  ident: 10.1016/j.comnet.2025.111459_b16
  article-title: Zero-touch networks: Towards next-generation network automation
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2024.110294
– volume: 1
  start-page: 394
  year: 2023
  ident: 10.1016/j.comnet.2025.111459_b33
  article-title: Cyber-physical zero trust architecture for industrial cyber-physical systems
  publication-title: IEEE Trans. Ind. Cyber Phys. Syst.
  doi: 10.1109/TICPS.2023.3333850
– year: 2023
  ident: 10.1016/j.comnet.2025.111459_b41
  article-title: Model aggregation techniques in federated learning: A comprehensive survey
  publication-title: Future Gener. Comput. Syst.
– year: 2019
  ident: 10.1016/j.comnet.2025.111459_b25
– volume: 41
  start-page: 3504
  issue: 11
  year: 2023
  ident: 10.1016/j.comnet.2025.111459_b2
  article-title: Reinforcing industry 4.0 with digital twins and blockchain-assisted federated learning
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2023.3310068
– volume: 8
  start-page: 10248
  issue: 13
  year: 2020
  ident: 10.1016/j.comnet.2025.111459_b39
  article-title: A security awareness and protection system for 5G smart healthcare based on zero-trust architecture
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.3041042
– volume: 800
  start-page: 207
  year: 2020
  ident: 10.1016/j.comnet.2025.111459_b27
  article-title: Zero trust architecture
  publication-title: NIST Spec. Publ.
– start-page: 1273
  year: 2017
  ident: 10.1016/j.comnet.2025.111459_b34
  article-title: Communication-efficient learning of deep networks from decentralized data
– volume: 37
  start-page: 1205
  issue: 6
  year: 2019
  ident: 10.1016/j.comnet.2025.111459_b40
  article-title: Adaptive federated learning in resource constrained edge computing systems
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2019.2904348
– volume: 17
  start-page: 3306
  year: 2022
  ident: 10.1016/j.comnet.2025.111459_b8
  article-title: Research on distributed dynamic trusted access control based on security subsystem
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2022.3206423
– year: 2023
  ident: 10.1016/j.comnet.2025.111459_b31
  article-title: GAZETA: Game-theoretic zero-trust authentication for defense against lateral movement in 5G IoT networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
– volume: 18
  start-page: 2794
  year: 2023
  ident: 10.1016/j.comnet.2025.111459_b28
  article-title: SysFlow: Toward a programmable zero trust framework for system security
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2023.3264152
– volume: 9
  start-page: 2039
  issue: 4
  year: 2022
  ident: 10.1016/j.comnet.2025.111459_b35
  article-title: Federated learning meets multi-objective optimization
  publication-title: IEEE Trans. Netw. Sci. Eng.
  doi: 10.1109/TNSE.2022.3169117
– volume: 38
  start-page: 955
  issue: 5
  year: 2020
  ident: 10.1016/j.comnet.2025.111459_b4
  article-title: iFinger: Intrusion detection in industrial control systems via register-based fingerprinting
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2020.2980921
– volume: 40
  start-page: 323
  issue: 1
  year: 2021
  ident: 10.1016/j.comnet.2025.111459_b42
  article-title: Quantized federated learning under transmission delay and outage constraints
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2021.3126081
– volume: 245
  year: 2024
  ident: 10.1016/j.comnet.2025.111459_b13
  article-title: ATT&CK-based advanced persistent threat attacks risk propagation assessment model for zero trust networks
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2024.110376
– volume: 203
  year: 2022
  ident: 10.1016/j.comnet.2025.111459_b5
  article-title: Evaluating federated learning for intrusion detection in internet of things: Review and challenges
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2021.108661
– start-page: 5132
  year: 2020
  ident: 10.1016/j.comnet.2025.111459_b23
  article-title: Scaffold: Stochastic controlled averaging for federated learning
– start-page: 3581
  year: 2022
  ident: 10.1016/j.comnet.2025.111459_b26
  article-title: Federated learning with buffered asynchronous aggregation
– volume: 236
  year: 2023
  ident: 10.1016/j.comnet.2025.111459_b21
  article-title: F-NIDS—A network intrusion detection system based on federated learning
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2023.110010
– volume: 16
  start-page: 320
  issue: 9
  year: 2024
  ident: 10.1016/j.comnet.2025.111459_b15
  article-title: A micro-segmentation method based on VLAN-VxLAN mapping technology
  publication-title: Futur. Internet
  doi: 10.3390/fi16090320
– volume: 223
  year: 2023
  ident: 10.1016/j.comnet.2025.111459_b24
  article-title: Scalable and interoperable edge-based federated learning in IoT contexts
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2023.109576
– volume: 217
  year: 2022
  ident: 10.1016/j.comnet.2025.111459_b14
  article-title: Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2022.109358
– volume: 39
  start-page: 3688
  issue: 12
  year: 2021
  ident: 10.1016/j.comnet.2025.111459_b18
  article-title: Optimizing federated learning in distributed industrial IoT: A multi-agent approach
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2021.3118352
– start-page: 125
  year: 2020
  ident: 10.1016/j.comnet.2025.111459_b22
  article-title: Tifl: A tier-based federated learning system
– start-page: 1
  year: 2014
  ident: 10.1016/j.comnet.2025.111459_b3
  article-title: Towards the next generation of industrial cyber-physical systems
– volume: 5
  start-page: 2792
  year: 2024
  ident: 10.1016/j.comnet.2025.111459_b29
  article-title: Securing digital identity in the zero trust architecture: A blockchain approach to privacy-focused multi-factor authentication
  publication-title: IEEE Open J. Commun. Soc.
  doi: 10.1109/OJCOMS.2024.3391728
– volume: 19
  start-page: 540
  year: 2024
  ident: 10.1016/j.comnet.2025.111459_b9
  article-title: GAZETA: Game-theoretic ZEro-trust authentication for defense against lateral movement in 5G IoT networks
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2023.3326975
– volume: 16
  start-page: 1571
  issue: 3
  year: 2020
  ident: 10.1016/j.comnet.2025.111459_b7
  article-title: Stackelberg-game-based defense analysis against advanced persistent threats on cloud control system
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2019.2925035
– volume: 19
  start-page: 9619
  issue: 9
  year: 2023
  ident: 10.1016/j.comnet.2025.111459_b6
  article-title: Defense of advanced persistent threat on industrial internet of things with lateral movement modeling
  publication-title: IEEE Trans. Ind. Inform.
  doi: 10.1109/TII.2022.3231406
– volume: 31
  start-page: 22
  issue: 2
  year: 2024
  ident: 10.1016/j.comnet.2025.111459_b12
  article-title: Industrial wireless internet zero trust model: Zero trust meets dynamic federated learning with blockchain
  publication-title: IEEE Wirel. Commun.
  doi: 10.1109/MWC.001.2300368
– volume: 40
  start-page: 2361
  issue: 8
  year: 2022
  ident: 10.1016/j.comnet.2025.111459_b19
  article-title: Interference management for over-the-air federated learning in multi-cell wireless networks
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2022.3180799
– year: 2023
  ident: 10.1016/j.comnet.2025.111459_b38
  article-title: Towards zero-trust security for the metaverse
  publication-title: IEEE Commun. Mag.
– volume: 41
  start-page: 776
  issue: 3
  year: 2023
  ident: 10.1016/j.comnet.2025.111459_b1
  article-title: Inverse-GMM: A latency distribution shaping method for industrial cooperative deep learning systems
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2022.3229448
– start-page: 1
  year: 2023
  ident: 10.1016/j.comnet.2025.111459_b30
  article-title: Secure and scalable cross-domain data sharing in zero-trust cloud-edge-end environment based on sharding blockchain
  publication-title: IEEE Trans. Dependable Secur. Comput.
  doi: 10.1109/TDSC.2023.3347040
– volume: 19
  start-page: 1876
  issue: 2
  year: 2022
  ident: 10.1016/j.comnet.2025.111459_b10
  article-title: On sustained zero trust conceptualization security for mobile core networks in 5G and beyond
  publication-title: IEEE Trans. Netw. Serv. Manag.
  doi: 10.1109/TNSM.2022.3157248
– year: 2024
  ident: 10.1016/j.comnet.2025.111459_b37
  article-title: Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in multi-access edge computing
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2024.110197
– ident: 10.1016/j.comnet.2025.111459_b43
  doi: 10.1145/3055366.3055375
– year: 2023
  ident: 10.1016/j.comnet.2025.111459_b32
  article-title: Physical layer enhanced zero-trust security for wireless industrial internet of things
  publication-title: IEEE Trans. Ind. Inform.
– start-page: 703
  year: 2019
  ident: 10.1016/j.comnet.2025.111459_b44
  article-title: MAD-GAN: Multivariate anomaly detection for time series data with generative adversarial networks
– volume: 39
  start-page: 3144
  issue: 10
  year: 2021
  ident: 10.1016/j.comnet.2025.111459_b20
  article-title: Privacy-preserving federated learning for UAV-enabled networks: Learning-based joint scheduling and resource management
  publication-title: IEEE J. Sel. Areas Commun.
  doi: 10.1109/JSAC.2021.3088655
– year: 2024
  ident: 10.1016/j.comnet.2025.111459_b11
  article-title: An authentication mechanism based on zero trust with radio frequency fingerprint for internet of things networks
  publication-title: IEEE Internet Things J.
– volume: 212
  year: 2022
  ident: 10.1016/j.comnet.2025.111459_b17
  article-title: Fusion of federated learning and industrial internet of things: A survey
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2022.109048
SSID ssj0004428
Score 2.4654567
Snippet The zero-trust architecture (ZTA) is an emerging technology for ensuring the security of next-generation industrial control systems (ICSs). However, ICSs are...
SourceID crossref
elsevier
SourceType Index Database
Publisher
StartPage 111459
SubjectTerms Cyber information
Federated deep learning
Next-generation industrial control system
Physical information
Zero-trust architecture
Title Asynchronous federated learning based zero trust architecture for the next generation industrial control systems
URI https://dx.doi.org/10.1016/j.comnet.2025.111459
Volume 269
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier)
  issn: 1389-1286
  databaseCode: GBLVA
  dateStart: 20110101
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0004428
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: Elsevier SD Complete Freedom Collection [SCCMFC]
  issn: 1389-1286
  databaseCode: ACRLP
  dateStart: 19990114
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0004428
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect (Elsevier)
  issn: 1389-1286
  databaseCode: .~1
  dateStart: 19990114
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0004428
  providerName: Elsevier
– providerCode: PRVESC
  databaseName: ScienceDirect (Elsevier)
  issn: 1389-1286
  databaseCode: AIKHN
  dateStart: 19990114
  customDbUrl:
  isFulltext: true
  dateEnd: 99991231
  titleUrlDefault: https://www.sciencedirect.com
  omitProxy: true
  ssIdentifier: ssj0004428
  providerName: Elsevier
– providerCode: PRVLSH
  databaseName: Elsevier Journals
  issn: 1389-1286
  databaseCode: AKRWK
  dateStart: 19990114
  customDbUrl:
  isFulltext: true
  mediaType: online
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0004428
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELYqWGBAPEV5VB5YTfOw43isKqpCRQegolvkV6oypBXtAgO_nbs8oEiIgSlKZFvROfnuO_nuO0KuAqGVDnPNlPOCcScDpgPNGdfSe-5sqiTWO9-Pk-GE303FtEX6TS0MplXW2F9heonW9ZNubc3ucj7vPpZHbBEwclEGAljwy7nELgbXH99pHpyX_VVxMMPRTflcmeMFaxceMyojgdjBUbH0N_e04XIG-2Sv5oq0V73OAWn54pDsbigIHpFlb_VWWBS4hQie5qgMAeTR0boZxIyil3L03b8uaFleQTdPDigwVgoMkBYA0XRWKlDjRtH5V0MPWuey00ryeXVMJoObp_6Q1U0UmIW_cc1cYmLtrTFhoMNQOW6lBZdvuDKJSVWaCw2sK_FOpLmKtIeAVeTSWOwrKSOn4hOyVSwKf0ooj2PgJ8rHhltuAJ5Sm1hgFLAiRHVB3iassV22rLQysiaJ7CWrbJ2hrbPK1m0iGwNnP_Y8Azj_c-bZv2eekx28q7LELsgWmN5fAq1Ym0753XTIdu92NBzjdfTwPPoEr2fRyw
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELZKGYAB8RTl6YHVNA87jseqoirQdqGVull-pSpDWtEuMPDbOecBRUIMrIltRWfn7jv5u-8Qug2YEirMFBHWMUItD4gKFCVUceeoNangvt55OEr6E_o4ZdMG6ta1MJ5WWfn-0qcX3rp60q6s2V7O5-3n4ootAkTOikQg3ULblEXcZ2B3H988D0qLBqt-NPHD6_q5guQFi-fOUyoj5p0H9ZKlv8WnjZjTO0D7FVjEnfJ7DlHD5Udob0NC8BgtO6u33HiFW0jhcealIQA9Wlx1g5hhH6YsfnevC1zUV-DNqwMMkBUDBMQ5-Gg8KySo_U7h-VdHD1yR2XGp-bw6QZPe_bjbJ1UXBWLgd1wTm-hYOaN1GKgwFJYabiDmayp0olORZkwB7EqcZWkmIuUgY2UZ18Y3luSRFfEpauaL3J0hTOMYAIpwsaaGavBPqUkMQApYEdK6IGshUttOLkuxDFmzyF5kaWvpbS1LW7cQrw0sf2y6BH_-58zzf8-8QTv98XAgBw-jpwu069-UlLFL1IRtcFeAMdb6ujhDnyW40b0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Asynchronous+federated+learning+based+zero+trust+architecture+for+the+next+generation+industrial+control+systems&rft.jtitle=Computer+networks+%28Amsterdam%2C+Netherlands+%3A+1999%29&rft.au=Lv%2C+Fei&rft.au=Wang%2C+Hangyu&rft.au=Pan%2C+Zhiwen&rft.au=Sun%2C+Rongkang&rft.date=2025-09-01&rft.issn=1389-1286&rft.volume=269&rft.spage=111459&rft_id=info:doi/10.1016%2Fj.comnet.2025.111459&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_comnet_2025_111459
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1389-1286&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1389-1286&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1389-1286&client=summon