Asynchronous federated learning based zero trust architecture for the next generation industrial control systems
The zero-trust architecture (ZTA) is an emerging technology for ensuring the security of next-generation industrial control systems (ICSs). However, ICSs are complex and characterised by diverse equipment, cyber-physical integration, dynamic network topologies and stringent real-time demands, which...
Saved in:
| Published in | Computer networks (Amsterdam, Netherlands : 1999) Vol. 269; p. 111459 |
|---|---|
| Main Authors | , , , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
Elsevier B.V
01.09.2025
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1389-1286 |
| DOI | 10.1016/j.comnet.2025.111459 |
Cover
| Abstract | The zero-trust architecture (ZTA) is an emerging technology for ensuring the security of next-generation industrial control systems (ICSs). However, ICSs are complex and characterised by diverse equipment, cyber-physical integration, dynamic network topologies and stringent real-time demands, which present significant challenges to ZTA implementation. Moreover, as enterprises increasingly share data to identify advanced business patterns, the risk of data breaches escalates during the digitalisation and intelligent transformation process. To address these issues, this article proposes a ZTA for next-generation ICSs based on asynchronous federated deep learning (FDL). Both physical and cyber information is considered in trust evaluations, except for subject and object attributes. This can significantly enhance the accuracy of zero-trust decision-making. Furthermore, a novel grouping-based asynchronous federated learning algorithm is proposed to reduce the aggregation delay experienced by different devices, grouping those with similar computing capabilities and business urgency requirements. Additionally, optimising model aggregation enhances the model’s adaptability to swift changes in ICSs environments. Through rigorous validation in a real gas pipeline system in our laboratory, we demonstrated the effectiveness of our proposed ZTA, showing that it is superior to alternative methodologies. |
|---|---|
| AbstractList | The zero-trust architecture (ZTA) is an emerging technology for ensuring the security of next-generation industrial control systems (ICSs). However, ICSs are complex and characterised by diverse equipment, cyber-physical integration, dynamic network topologies and stringent real-time demands, which present significant challenges to ZTA implementation. Moreover, as enterprises increasingly share data to identify advanced business patterns, the risk of data breaches escalates during the digitalisation and intelligent transformation process. To address these issues, this article proposes a ZTA for next-generation ICSs based on asynchronous federated deep learning (FDL). Both physical and cyber information is considered in trust evaluations, except for subject and object attributes. This can significantly enhance the accuracy of zero-trust decision-making. Furthermore, a novel grouping-based asynchronous federated learning algorithm is proposed to reduce the aggregation delay experienced by different devices, grouping those with similar computing capabilities and business urgency requirements. Additionally, optimising model aggregation enhances the model’s adaptability to swift changes in ICSs environments. Through rigorous validation in a real gas pipeline system in our laboratory, we demonstrated the effectiveness of our proposed ZTA, showing that it is superior to alternative methodologies. |
| ArticleNumber | 111459 |
| Author | Sun, Limin Sun, Rongkang Si, Shuaizong Lv, Shichao Zhang, Weidong Wang, Hangyu Pan, Zhiwen Lv, Fei |
| Author_xml | – sequence: 1 givenname: Fei surname: Lv fullname: Lv, Fei email: lvfei@iie.ac.cn organization: Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China – sequence: 2 givenname: Hangyu orcidid: 0009-0004-8234-2940 surname: Wang fullname: Wang, Hangyu email: wanghangyu@iie.ac.cn organization: Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China – sequence: 3 givenname: Zhiwen surname: Pan fullname: Pan, Zhiwen email: panzhiwen@iie.ac.cn organization: Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China – sequence: 4 givenname: Rongkang surname: Sun fullname: Sun, Rongkang email: sunrongkang@stu.sau.edu.cn organization: College of Artificial Intelligence, Shenyang Aerospace University, Shenyang, China – sequence: 5 givenname: Shuaizong orcidid: 0000-0001-8805-1221 surname: Si fullname: Si, Shuaizong email: sishuaizong@iie.ac.cn organization: Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China – sequence: 6 givenname: Weidong surname: Zhang fullname: Zhang, Weidong email: zhangweidong@iie.ac.cn organization: Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China – sequence: 7 givenname: Shichao surname: Lv fullname: Lv, Shichao email: lvshichao@iie.ac.cn organization: Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China – sequence: 8 givenname: Limin surname: Sun fullname: Sun, Limin email: sunlimin@iie.ac.cn organization: Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, Beijing, China |
| BookMark | eNp9kMtKQzEQhrOoYKu-gYu8wKnJuSYboRRvUHCj65DLnDblNCmTVKxP7ynHtathmPl-Zr4FmYUYgJB7zpac8fZhv7TxECAvS1Y2S8553cgZmfNKyIKXor0mi5T2jLG6LsWcHFfpHOwOY4inRHtwgDqDowNoDD5sqdFpbH8AI814SplqtDufweYTAu0j0rwDGuA70y2EC-1joD64cRe9HqiNIWMcaDqnDId0S656PSS4-6s35PP56WP9WmzeX97Wq01hy6bLhWtNpcEaw5nmXLradpZzZmppWiOk6BvNRNOCa0QvSw2i6pq-M1aOs650sroh9ZRrMaaE0Ksj-oPGs-JMXUypvZpMqYspNZkasccJg_G2Lw-okvUQLDiP48_KRf9_wC-e63uX |
| Cites_doi | 10.1016/j.comnet.2024.110294 10.1109/TICPS.2023.3333850 10.1109/JSAC.2023.3310068 10.1109/JIOT.2020.3041042 10.1109/JSAC.2019.2904348 10.1109/TIFS.2022.3206423 10.1109/TIFS.2023.3264152 10.1109/TNSE.2022.3169117 10.1109/JSAC.2020.2980921 10.1109/JSAC.2021.3126081 10.1016/j.comnet.2024.110376 10.1016/j.comnet.2021.108661 10.1016/j.comnet.2023.110010 10.3390/fi16090320 10.1016/j.comnet.2023.109576 10.1016/j.comnet.2022.109358 10.1109/JSAC.2021.3118352 10.1109/OJCOMS.2024.3391728 10.1109/TIFS.2023.3326975 10.1109/TII.2019.2925035 10.1109/TII.2022.3231406 10.1109/MWC.001.2300368 10.1109/JSAC.2022.3180799 10.1109/JSAC.2022.3229448 10.1109/TDSC.2023.3347040 10.1109/TNSM.2022.3157248 10.1016/j.comnet.2024.110197 10.1145/3055366.3055375 10.1109/JSAC.2021.3088655 10.1016/j.comnet.2022.109048 |
| ContentType | Journal Article |
| Copyright | 2025 |
| Copyright_xml | – notice: 2025 |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.comnet.2025.111459 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| ExternalDocumentID | 10_1016_j_comnet_2025_111459 S1389128625004268 |
| GrantInformation_xml | – fundername: Beijing Natural Science Foundation grantid: L234033 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 6OB 7-5 71M 77K 8P~ AABNK AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AATTM AAXKI AAXUO AAYFN AAYWO ABBOA ABFNM ABJNI ABMAC ABXDB ACDAQ ACGFS ACNNM ACRLP ACVFH ACZNC ADBBV ADCNI ADEZE ADJOM ADTZH AEBSH AECPX AEIPS AEKER AENEX AEUPX AFJKZ AFPUW AFTJW AFXIZ AGCQF AGHFR AGRNS AGUBO AGYEJ AHJVU AHZHX AIALX AIEXJ AIGII AIIUN AIKHN AITUG AKBMS AKRWK AKYEP ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD APXCP AXJTR BJAXD BKOJK BLXMC BNPGV CS3 DU5 EBS EFJIC EFKBS EJD EO8 EO9 EP2 EP3 F0J FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF HZ~ IHE J1W JJJVA KOM M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 PC. PQQKQ Q38 R2- RIG ROL RPZ RXW SDF SDG SDP SES SEW SPC SPCBC SST SSV SSZ T5K TAE TN5 ZMT ZY4 ~G- 77I AAYXX ACLOT CITATION EFLBG ~HD |
| ID | FETCH-LOGICAL-c257t-d6b3aecbb10a119d4c7c110b49b6b898f5a0856ed58f92ae8375f7bc989872d93 |
| IEDL.DBID | .~1 |
| ISSN | 1389-1286 |
| IngestDate | Wed Oct 01 05:46:51 EDT 2025 Sat Aug 09 17:30:52 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Next-generation industrial control system Physical information Zero-trust architecture Federated deep learning Cyber information |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c257t-d6b3aecbb10a119d4c7c110b49b6b898f5a0856ed58f92ae8375f7bc989872d93 |
| ORCID | 0009-0004-8234-2940 0000-0001-8805-1221 |
| ParticipantIDs | crossref_primary_10_1016_j_comnet_2025_111459 elsevier_sciencedirect_doi_10_1016_j_comnet_2025_111459 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | September 2025 2025-09-00 |
| PublicationDateYYYYMMDD | 2025-09-01 |
| PublicationDate_xml | – month: 09 year: 2025 text: September 2025 |
| PublicationDecade | 2020 |
| PublicationTitle | Computer networks (Amsterdam, Netherlands : 1999) |
| PublicationYear | 2025 |
| Publisher | Elsevier B.V |
| Publisher_xml | – name: Elsevier B.V |
| References | Chai, Ali, Zawad, Truex, Anwar, Baracaldo, Zhou, Ludwig, Yan, Cheng (b22) 2020 Cheng, Chen, Han (b38) 2023 Ali, Gregory, Li, Dib (b37) 2024 Boobalan, Ramu, Pham, Dev, Pandya, Maddikunta, Gadekallu, Huynh-The (b17) 2022; 212 Hong, Xu, Huang, Li, Hu, Gu (b28) 2023; 18 Jose Diaz Rivera, Muhammad, Song (b29) 2024; 5 Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, Aditya P Mathur, WADI: a water distribution testbed for research in the design of secure cyber physical systems, in: Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017, pp. 25–28. Stafford (b27) 2020; 800 Ramezanpour, Jagannath (b14) 2022; 217 Nguyen, Malik, Zhan, Yousefpour, Rabbat, Malek, Huba (b26) 2022 Lei, Pang, Wen, Hou, Li (b32) 2023 Zhang, Yang, Wu, Peng, Zhang, Zhang, Shen (b18) 2021; 39 Qi, Chiaro, Guzzo, Ianni, Fortino, Piccialli (b41) 2023 Bello, Hussein, Ulema, Koilpillai (b10) 2022; 19 Yang, Zhao, Xiong, Lam, Sun, Xiao (b20) 2021; 39 Chen, Qiao, Zhao, Liu, Shi, Lyu, Chen, Lu, Zhai (b39) 2020; 8 Bi, He, Luo, Meng, Ji, Huang (b6) 2023; 19 Wang, Zhou, Shi, Zhuang (b19) 2022; 40 Li, Yang, Yu, Duan, Yang (b15) 2024; 16 Li, Chen, Jin, Shi, Goh, Ng (b44) 2019 El Rajab, Yang, Shami (b16) 2024; 243 Aloqaily, Ridhawi, Kanhere (b2) 2023; 41 Yuan, Xia, Zhang, Yang, Mahmoud (b7) 2020; 16 Campolo, Genovese, Singh, Molinaro (b24) 2023; 223 Hu, Shaloudegi, Zhang, Yu (b35) 2022; 9 Wang, Xu, Shi, Chang (b42) 2021; 40 Qin, Xiao, Sun, Dai, Zhang, Shen (b1) 2023; 41 Feng, Hu (b33) 2023; 1 Ge, Zhu (b31) 2023 Huang, Zhang, Hu, Fu, Qin (b8) 2022; 17 Yang, Li, Lin, Chen, Sun (b4) 2020; 38 Wang, Xu, Liu, Xu, Huang, Zhao (b36) 2022 Xie, Wang, Ding, Yang, Liang, Qin (b12) 2024; 31 Xie, Koyejo, Gupta (b25) 2019 McMahan, Moore, Ramage, Hampson, y Arcas (b34) 2017 Colombo, Karnouskos, Bangemann (b3) 2014 Wang, Tuor, Salonidis, Leung, Makaya, He, Chan (b40) 2019; 37 Ge, Zhu (b9) 2024; 19 Zhang, Zheng, Zhang, Chen, Tan, Zhang, Li (b13) 2024; 245 Karimireddy, Kale, Mohri, Reddi, Stich, Suresh (b23) 2020 de Oliveira, Gonçalves, Meneguette, de Sousa Jr., Guidoni, Oliveira, Rocha Filho (b21) 2023; 236 Campos, Saura, González-Vidal, Hernández-Ramos, Bernabe, Baldini, Skarmeta (b5) 2022; 203 Liu, Xing, Tong, Lin, Chen, Guan, Wu, Susilo (b30) 2023 Jing, Peng, Fu, Hu (b11) 2024 Yang (10.1016/j.comnet.2025.111459_b4) 2020; 38 Campolo (10.1016/j.comnet.2025.111459_b24) 2023; 223 Jing (10.1016/j.comnet.2025.111459_b11) 2024 El Rajab (10.1016/j.comnet.2025.111459_b16) 2024; 243 Yang (10.1016/j.comnet.2025.111459_b20) 2021; 39 Wang (10.1016/j.comnet.2025.111459_b42) 2021; 40 Qin (10.1016/j.comnet.2025.111459_b1) 2023; 41 Chai (10.1016/j.comnet.2025.111459_b22) 2020 Chen (10.1016/j.comnet.2025.111459_b39) 2020; 8 Qi (10.1016/j.comnet.2025.111459_b41) 2023 Xie (10.1016/j.comnet.2025.111459_b12) 2024; 31 Feng (10.1016/j.comnet.2025.111459_b33) 2023; 1 Ge (10.1016/j.comnet.2025.111459_b9) 2024; 19 de Oliveira (10.1016/j.comnet.2025.111459_b21) 2023; 236 Lei (10.1016/j.comnet.2025.111459_b32) 2023 Ramezanpour (10.1016/j.comnet.2025.111459_b14) 2022; 217 Karimireddy (10.1016/j.comnet.2025.111459_b23) 2020 Bello (10.1016/j.comnet.2025.111459_b10) 2022; 19 Campos (10.1016/j.comnet.2025.111459_b5) 2022; 203 Huang (10.1016/j.comnet.2025.111459_b8) 2022; 17 Boobalan (10.1016/j.comnet.2025.111459_b17) 2022; 212 Wang (10.1016/j.comnet.2025.111459_b19) 2022; 40 Hong (10.1016/j.comnet.2025.111459_b28) 2023; 18 Wang (10.1016/j.comnet.2025.111459_b40) 2019; 37 Zhang (10.1016/j.comnet.2025.111459_b18) 2021; 39 Hu (10.1016/j.comnet.2025.111459_b35) 2022; 9 Yuan (10.1016/j.comnet.2025.111459_b7) 2020; 16 Ali (10.1016/j.comnet.2025.111459_b37) 2024 Zhang (10.1016/j.comnet.2025.111459_b13) 2024; 245 Stafford (10.1016/j.comnet.2025.111459_b27) 2020; 800 Bi (10.1016/j.comnet.2025.111459_b6) 2023; 19 Cheng (10.1016/j.comnet.2025.111459_b38) 2023 Colombo (10.1016/j.comnet.2025.111459_b3) 2014 Li (10.1016/j.comnet.2025.111459_b15) 2024; 16 Xie (10.1016/j.comnet.2025.111459_b25) 2019 Jose Diaz Rivera (10.1016/j.comnet.2025.111459_b29) 2024; 5 Aloqaily (10.1016/j.comnet.2025.111459_b2) 2023; 41 McMahan (10.1016/j.comnet.2025.111459_b34) 2017 Nguyen (10.1016/j.comnet.2025.111459_b26) 2022 Ge (10.1016/j.comnet.2025.111459_b31) 2023 Liu (10.1016/j.comnet.2025.111459_b30) 2023 10.1016/j.comnet.2025.111459_b43 Wang (10.1016/j.comnet.2025.111459_b36) 2022 Li (10.1016/j.comnet.2025.111459_b44) 2019 |
| References_xml | – year: 2019 ident: b25 article-title: Asynchronous federated optimization – volume: 41 start-page: 3504 year: 2023 end-page: 3516 ident: b2 article-title: Reinforcing industry 4.0 with digital twins and blockchain-assisted federated learning publication-title: IEEE J. Sel. Areas Commun. – volume: 5 start-page: 2792 year: 2024 end-page: 2814 ident: b29 article-title: Securing digital identity in the zero trust architecture: A blockchain approach to privacy-focused multi-factor authentication publication-title: IEEE Open J. Commun. Soc. – volume: 19 start-page: 9619 year: 2023 end-page: 9630 ident: b6 article-title: Defense of advanced persistent threat on industrial internet of things with lateral movement modeling publication-title: IEEE Trans. Ind. Inform. – volume: 217 year: 2022 ident: b14 article-title: Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN publication-title: Comput. Netw. – volume: 9 start-page: 2039 year: 2022 end-page: 2051 ident: b35 article-title: Federated learning meets multi-objective optimization publication-title: IEEE Trans. Netw. Sci. Eng. – year: 2022 ident: b36 article-title: Accelerating federated learning with cluster construction and hierarchical aggregation publication-title: IEEE Trans. Mob. Comput. – volume: 8 start-page: 10248 year: 2020 end-page: 10263 ident: b39 article-title: A security awareness and protection system for 5G smart healthcare based on zero-trust architecture publication-title: IEEE Internet Things J. – volume: 40 start-page: 2361 year: 2022 end-page: 2377 ident: b19 article-title: Interference management for over-the-air federated learning in multi-cell wireless networks publication-title: IEEE J. Sel. Areas Commun. – volume: 236 year: 2023 ident: b21 article-title: F-NIDS—A network intrusion detection system based on federated learning publication-title: Comput. Netw. – year: 2023 ident: b38 article-title: Towards zero-trust security for the metaverse publication-title: IEEE Commun. Mag. – volume: 41 start-page: 776 year: 2023 end-page: 788 ident: b1 article-title: Inverse-GMM: A latency distribution shaping method for industrial cooperative deep learning systems publication-title: IEEE J. Sel. Areas Commun. – year: 2024 ident: b37 article-title: Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in multi-access edge computing publication-title: Comput. Netw. – volume: 212 year: 2022 ident: b17 article-title: Fusion of federated learning and industrial internet of things: A survey publication-title: Comput. Netw. – start-page: 125 year: 2020 end-page: 136 ident: b22 article-title: Tifl: A tier-based federated learning system publication-title: Proceedings of the 29th International Symposium on High-Performance Parallel and Distributed Computing – volume: 37 start-page: 1205 year: 2019 end-page: 1221 ident: b40 article-title: Adaptive federated learning in resource constrained edge computing systems publication-title: IEEE J. Sel. Areas Commun. – year: 2023 ident: b32 article-title: Physical layer enhanced zero-trust security for wireless industrial internet of things publication-title: IEEE Trans. Ind. Inform. – year: 2023 ident: b31 article-title: GAZETA: Game-theoretic zero-trust authentication for defense against lateral movement in 5G IoT networks publication-title: IEEE Trans. Inf. Forensics Secur. – reference: Chuadhry Mujeeb Ahmed, Venkata Reddy Palleti, Aditya P Mathur, WADI: a water distribution testbed for research in the design of secure cyber physical systems, in: Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, 2017, pp. 25–28. – start-page: 1273 year: 2017 end-page: 1282 ident: b34 article-title: Communication-efficient learning of deep networks from decentralized data publication-title: Artificial Intelligence and Statistics – volume: 40 start-page: 323 year: 2021 end-page: 341 ident: b42 article-title: Quantized federated learning under transmission delay and outage constraints publication-title: IEEE J. Sel. Areas Commun. – volume: 243 year: 2024 ident: b16 article-title: Zero-touch networks: Towards next-generation network automation publication-title: Comput. Netw. – volume: 39 start-page: 3144 year: 2021 end-page: 3159 ident: b20 article-title: Privacy-preserving federated learning for UAV-enabled networks: Learning-based joint scheduling and resource management publication-title: IEEE J. Sel. Areas Commun. – start-page: 1 year: 2014 end-page: 22 ident: b3 article-title: Towards the next generation of industrial cyber-physical systems publication-title: Industrial Cloud-Based Cyber-Physical Systems: The IMC-AESOP Approach – volume: 19 start-page: 540 year: 2024 end-page: 554 ident: b9 article-title: GAZETA: Game-theoretic ZEro-trust authentication for defense against lateral movement in 5G IoT networks publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 39 start-page: 3688 year: 2021 end-page: 3703 ident: b18 article-title: Optimizing federated learning in distributed industrial IoT: A multi-agent approach publication-title: IEEE J. Sel. Areas Commun. – start-page: 703 year: 2019 end-page: 716 ident: b44 article-title: MAD-GAN: Multivariate anomaly detection for time series data with generative adversarial networks publication-title: International Conference on Artificial Neural Networks – volume: 245 year: 2024 ident: b13 article-title: ATT&CK-based advanced persistent threat attacks risk propagation assessment model for zero trust networks publication-title: Comput. Netw. – start-page: 5132 year: 2020 end-page: 5143 ident: b23 article-title: Scaffold: Stochastic controlled averaging for federated learning publication-title: International Conference on Machine Learning – volume: 1 start-page: 394 year: 2023 end-page: 405 ident: b33 article-title: Cyber-physical zero trust architecture for industrial cyber-physical systems publication-title: IEEE Trans. Ind. Cyber Phys. Syst. – volume: 223 year: 2023 ident: b24 article-title: Scalable and interoperable edge-based federated learning in IoT contexts publication-title: Comput. Netw. – year: 2023 ident: b41 article-title: Model aggregation techniques in federated learning: A comprehensive survey publication-title: Future Gener. Comput. Syst. – volume: 16 start-page: 1571 year: 2020 end-page: 1580 ident: b7 article-title: Stackelberg-game-based defense analysis against advanced persistent threats on cloud control system publication-title: IEEE Trans. Ind. Inform. – year: 2024 ident: b11 article-title: An authentication mechanism based on zero trust with radio frequency fingerprint for internet of things networks publication-title: IEEE Internet Things J. – volume: 19 start-page: 1876 year: 2022 end-page: 1889 ident: b10 article-title: On sustained zero trust conceptualization security for mobile core networks in 5G and beyond publication-title: IEEE Trans. Netw. Serv. Manag. – volume: 31 start-page: 22 year: 2024 end-page: 29 ident: b12 article-title: Industrial wireless internet zero trust model: Zero trust meets dynamic federated learning with blockchain publication-title: IEEE Wirel. Commun. – volume: 800 start-page: 207 year: 2020 ident: b27 article-title: Zero trust architecture publication-title: NIST Spec. Publ. – volume: 38 start-page: 955 year: 2020 end-page: 967 ident: b4 article-title: iFinger: Intrusion detection in industrial control systems via register-based fingerprinting publication-title: IEEE J. Sel. Areas Commun. – volume: 18 start-page: 2794 year: 2023 end-page: 2809 ident: b28 article-title: SysFlow: Toward a programmable zero trust framework for system security publication-title: IEEE Trans. Inf. Forensics Secur. – start-page: 3581 year: 2022 end-page: 3607 ident: b26 article-title: Federated learning with buffered asynchronous aggregation publication-title: International Conference on Artificial Intelligence and Statistics – start-page: 1 year: 2023 end-page: 14 ident: b30 article-title: Secure and scalable cross-domain data sharing in zero-trust cloud-edge-end environment based on sharding blockchain publication-title: IEEE Trans. Dependable Secur. Comput. – volume: 16 start-page: 320 year: 2024 ident: b15 article-title: A micro-segmentation method based on VLAN-VxLAN mapping technology publication-title: Futur. Internet – volume: 203 year: 2022 ident: b5 article-title: Evaluating federated learning for intrusion detection in internet of things: Review and challenges publication-title: Comput. Netw. – volume: 17 start-page: 3306 year: 2022 end-page: 3320 ident: b8 article-title: Research on distributed dynamic trusted access control based on security subsystem publication-title: IEEE Trans. Inf. Forensics Secur. – year: 2022 ident: 10.1016/j.comnet.2025.111459_b36 article-title: Accelerating federated learning with cluster construction and hierarchical aggregation publication-title: IEEE Trans. Mob. Comput. – volume: 243 year: 2024 ident: 10.1016/j.comnet.2025.111459_b16 article-title: Zero-touch networks: Towards next-generation network automation publication-title: Comput. Netw. doi: 10.1016/j.comnet.2024.110294 – volume: 1 start-page: 394 year: 2023 ident: 10.1016/j.comnet.2025.111459_b33 article-title: Cyber-physical zero trust architecture for industrial cyber-physical systems publication-title: IEEE Trans. Ind. Cyber Phys. Syst. doi: 10.1109/TICPS.2023.3333850 – year: 2023 ident: 10.1016/j.comnet.2025.111459_b41 article-title: Model aggregation techniques in federated learning: A comprehensive survey publication-title: Future Gener. Comput. Syst. – year: 2019 ident: 10.1016/j.comnet.2025.111459_b25 – volume: 41 start-page: 3504 issue: 11 year: 2023 ident: 10.1016/j.comnet.2025.111459_b2 article-title: Reinforcing industry 4.0 with digital twins and blockchain-assisted federated learning publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2023.3310068 – volume: 8 start-page: 10248 issue: 13 year: 2020 ident: 10.1016/j.comnet.2025.111459_b39 article-title: A security awareness and protection system for 5G smart healthcare based on zero-trust architecture publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.3041042 – volume: 800 start-page: 207 year: 2020 ident: 10.1016/j.comnet.2025.111459_b27 article-title: Zero trust architecture publication-title: NIST Spec. Publ. – start-page: 1273 year: 2017 ident: 10.1016/j.comnet.2025.111459_b34 article-title: Communication-efficient learning of deep networks from decentralized data – volume: 37 start-page: 1205 issue: 6 year: 2019 ident: 10.1016/j.comnet.2025.111459_b40 article-title: Adaptive federated learning in resource constrained edge computing systems publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2019.2904348 – volume: 17 start-page: 3306 year: 2022 ident: 10.1016/j.comnet.2025.111459_b8 article-title: Research on distributed dynamic trusted access control based on security subsystem publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2022.3206423 – year: 2023 ident: 10.1016/j.comnet.2025.111459_b31 article-title: GAZETA: Game-theoretic zero-trust authentication for defense against lateral movement in 5G IoT networks publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 18 start-page: 2794 year: 2023 ident: 10.1016/j.comnet.2025.111459_b28 article-title: SysFlow: Toward a programmable zero trust framework for system security publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2023.3264152 – volume: 9 start-page: 2039 issue: 4 year: 2022 ident: 10.1016/j.comnet.2025.111459_b35 article-title: Federated learning meets multi-objective optimization publication-title: IEEE Trans. Netw. Sci. Eng. doi: 10.1109/TNSE.2022.3169117 – volume: 38 start-page: 955 issue: 5 year: 2020 ident: 10.1016/j.comnet.2025.111459_b4 article-title: iFinger: Intrusion detection in industrial control systems via register-based fingerprinting publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2020.2980921 – volume: 40 start-page: 323 issue: 1 year: 2021 ident: 10.1016/j.comnet.2025.111459_b42 article-title: Quantized federated learning under transmission delay and outage constraints publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2021.3126081 – volume: 245 year: 2024 ident: 10.1016/j.comnet.2025.111459_b13 article-title: ATT&CK-based advanced persistent threat attacks risk propagation assessment model for zero trust networks publication-title: Comput. Netw. doi: 10.1016/j.comnet.2024.110376 – volume: 203 year: 2022 ident: 10.1016/j.comnet.2025.111459_b5 article-title: Evaluating federated learning for intrusion detection in internet of things: Review and challenges publication-title: Comput. Netw. doi: 10.1016/j.comnet.2021.108661 – start-page: 5132 year: 2020 ident: 10.1016/j.comnet.2025.111459_b23 article-title: Scaffold: Stochastic controlled averaging for federated learning – start-page: 3581 year: 2022 ident: 10.1016/j.comnet.2025.111459_b26 article-title: Federated learning with buffered asynchronous aggregation – volume: 236 year: 2023 ident: 10.1016/j.comnet.2025.111459_b21 article-title: F-NIDS—A network intrusion detection system based on federated learning publication-title: Comput. Netw. doi: 10.1016/j.comnet.2023.110010 – volume: 16 start-page: 320 issue: 9 year: 2024 ident: 10.1016/j.comnet.2025.111459_b15 article-title: A micro-segmentation method based on VLAN-VxLAN mapping technology publication-title: Futur. Internet doi: 10.3390/fi16090320 – volume: 223 year: 2023 ident: 10.1016/j.comnet.2025.111459_b24 article-title: Scalable and interoperable edge-based federated learning in IoT contexts publication-title: Comput. Netw. doi: 10.1016/j.comnet.2023.109576 – volume: 217 year: 2022 ident: 10.1016/j.comnet.2025.111459_b14 article-title: Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN publication-title: Comput. Netw. doi: 10.1016/j.comnet.2022.109358 – volume: 39 start-page: 3688 issue: 12 year: 2021 ident: 10.1016/j.comnet.2025.111459_b18 article-title: Optimizing federated learning in distributed industrial IoT: A multi-agent approach publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2021.3118352 – start-page: 125 year: 2020 ident: 10.1016/j.comnet.2025.111459_b22 article-title: Tifl: A tier-based federated learning system – start-page: 1 year: 2014 ident: 10.1016/j.comnet.2025.111459_b3 article-title: Towards the next generation of industrial cyber-physical systems – volume: 5 start-page: 2792 year: 2024 ident: 10.1016/j.comnet.2025.111459_b29 article-title: Securing digital identity in the zero trust architecture: A blockchain approach to privacy-focused multi-factor authentication publication-title: IEEE Open J. Commun. Soc. doi: 10.1109/OJCOMS.2024.3391728 – volume: 19 start-page: 540 year: 2024 ident: 10.1016/j.comnet.2025.111459_b9 article-title: GAZETA: Game-theoretic ZEro-trust authentication for defense against lateral movement in 5G IoT networks publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2023.3326975 – volume: 16 start-page: 1571 issue: 3 year: 2020 ident: 10.1016/j.comnet.2025.111459_b7 article-title: Stackelberg-game-based defense analysis against advanced persistent threats on cloud control system publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2019.2925035 – volume: 19 start-page: 9619 issue: 9 year: 2023 ident: 10.1016/j.comnet.2025.111459_b6 article-title: Defense of advanced persistent threat on industrial internet of things with lateral movement modeling publication-title: IEEE Trans. Ind. Inform. doi: 10.1109/TII.2022.3231406 – volume: 31 start-page: 22 issue: 2 year: 2024 ident: 10.1016/j.comnet.2025.111459_b12 article-title: Industrial wireless internet zero trust model: Zero trust meets dynamic federated learning with blockchain publication-title: IEEE Wirel. Commun. doi: 10.1109/MWC.001.2300368 – volume: 40 start-page: 2361 issue: 8 year: 2022 ident: 10.1016/j.comnet.2025.111459_b19 article-title: Interference management for over-the-air federated learning in multi-cell wireless networks publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2022.3180799 – year: 2023 ident: 10.1016/j.comnet.2025.111459_b38 article-title: Towards zero-trust security for the metaverse publication-title: IEEE Commun. Mag. – volume: 41 start-page: 776 issue: 3 year: 2023 ident: 10.1016/j.comnet.2025.111459_b1 article-title: Inverse-GMM: A latency distribution shaping method for industrial cooperative deep learning systems publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2022.3229448 – start-page: 1 year: 2023 ident: 10.1016/j.comnet.2025.111459_b30 article-title: Secure and scalable cross-domain data sharing in zero-trust cloud-edge-end environment based on sharding blockchain publication-title: IEEE Trans. Dependable Secur. Comput. doi: 10.1109/TDSC.2023.3347040 – volume: 19 start-page: 1876 issue: 2 year: 2022 ident: 10.1016/j.comnet.2025.111459_b10 article-title: On sustained zero trust conceptualization security for mobile core networks in 5G and beyond publication-title: IEEE Trans. Netw. Serv. Manag. doi: 10.1109/TNSM.2022.3157248 – year: 2024 ident: 10.1016/j.comnet.2025.111459_b37 article-title: Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in multi-access edge computing publication-title: Comput. Netw. doi: 10.1016/j.comnet.2024.110197 – ident: 10.1016/j.comnet.2025.111459_b43 doi: 10.1145/3055366.3055375 – year: 2023 ident: 10.1016/j.comnet.2025.111459_b32 article-title: Physical layer enhanced zero-trust security for wireless industrial internet of things publication-title: IEEE Trans. Ind. Inform. – start-page: 703 year: 2019 ident: 10.1016/j.comnet.2025.111459_b44 article-title: MAD-GAN: Multivariate anomaly detection for time series data with generative adversarial networks – volume: 39 start-page: 3144 issue: 10 year: 2021 ident: 10.1016/j.comnet.2025.111459_b20 article-title: Privacy-preserving federated learning for UAV-enabled networks: Learning-based joint scheduling and resource management publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2021.3088655 – year: 2024 ident: 10.1016/j.comnet.2025.111459_b11 article-title: An authentication mechanism based on zero trust with radio frequency fingerprint for internet of things networks publication-title: IEEE Internet Things J. – volume: 212 year: 2022 ident: 10.1016/j.comnet.2025.111459_b17 article-title: Fusion of federated learning and industrial internet of things: A survey publication-title: Comput. Netw. doi: 10.1016/j.comnet.2022.109048 |
| SSID | ssj0004428 |
| Score | 2.4654567 |
| Snippet | The zero-trust architecture (ZTA) is an emerging technology for ensuring the security of next-generation industrial control systems (ICSs). However, ICSs are... |
| SourceID | crossref elsevier |
| SourceType | Index Database Publisher |
| StartPage | 111459 |
| SubjectTerms | Cyber information Federated deep learning Next-generation industrial control system Physical information Zero-trust architecture |
| Title | Asynchronous federated learning based zero trust architecture for the next generation industrial control systems |
| URI | https://dx.doi.org/10.1016/j.comnet.2025.111459 |
| Volume | 269 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Baden-Württemberg Complete Freedom Collection (Elsevier) issn: 1389-1286 databaseCode: GBLVA dateStart: 20110101 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0004428 providerName: Elsevier – providerCode: PRVESC databaseName: Elsevier SD Complete Freedom Collection [SCCMFC] issn: 1389-1286 databaseCode: ACRLP dateStart: 19990114 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0004428 providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect (Elsevier) issn: 1389-1286 databaseCode: .~1 dateStart: 19990114 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0004428 providerName: Elsevier – providerCode: PRVESC databaseName: ScienceDirect (Elsevier) issn: 1389-1286 databaseCode: AIKHN dateStart: 19990114 customDbUrl: isFulltext: true dateEnd: 99991231 titleUrlDefault: https://www.sciencedirect.com omitProxy: true ssIdentifier: ssj0004428 providerName: Elsevier – providerCode: PRVLSH databaseName: Elsevier Journals issn: 1389-1286 databaseCode: AKRWK dateStart: 19990114 customDbUrl: isFulltext: true mediaType: online dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0004428 providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELYqWGBAPEV5VB5YTfOw43isKqpCRQegolvkV6oypBXtAgO_nbs8oEiIgSlKZFvROfnuO_nuO0KuAqGVDnPNlPOCcScDpgPNGdfSe-5sqiTWO9-Pk-GE303FtEX6TS0MplXW2F9heonW9ZNubc3ucj7vPpZHbBEwclEGAljwy7nELgbXH99pHpyX_VVxMMPRTflcmeMFaxceMyojgdjBUbH0N_e04XIG-2Sv5oq0V73OAWn54pDsbigIHpFlb_VWWBS4hQie5qgMAeTR0boZxIyil3L03b8uaFleQTdPDigwVgoMkBYA0XRWKlDjRtH5V0MPWuey00ryeXVMJoObp_6Q1U0UmIW_cc1cYmLtrTFhoMNQOW6lBZdvuDKJSVWaCw2sK_FOpLmKtIeAVeTSWOwrKSOn4hOyVSwKf0ooj2PgJ8rHhltuAJ5Sm1hgFLAiRHVB3iassV22rLQysiaJ7CWrbJ2hrbPK1m0iGwNnP_Y8Azj_c-bZv2eekx28q7LELsgWmN5fAq1Ym0753XTIdu92NBzjdfTwPPoEr2fRyw |
| linkProvider | Elsevier |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELZKGYAB8RTl6YHVNA87jseqoirQdqGVull-pSpDWtEuMPDbOecBRUIMrIltRWfn7jv5u-8Qug2YEirMFBHWMUItD4gKFCVUceeoNangvt55OEr6E_o4ZdMG6ta1MJ5WWfn-0qcX3rp60q6s2V7O5-3n4ootAkTOikQg3ULblEXcZ2B3H988D0qLBqt-NPHD6_q5guQFi-fOUyoj5p0H9ZKlv8WnjZjTO0D7FVjEnfJ7DlHD5Udob0NC8BgtO6u33HiFW0jhcealIQA9Wlx1g5hhH6YsfnevC1zUV-DNqwMMkBUDBMQ5-Gg8KySo_U7h-VdHD1yR2XGp-bw6QZPe_bjbJ1UXBWLgd1wTm-hYOaN1GKgwFJYabiDmayp0olORZkwB7EqcZWkmIuUgY2UZ18Y3luSRFfEpauaL3J0hTOMYAIpwsaaGavBPqUkMQApYEdK6IGshUttOLkuxDFmzyF5kaWvpbS1LW7cQrw0sf2y6BH_-58zzf8-8QTv98XAgBw-jpwu069-UlLFL1IRtcFeAMdb6ujhDnyW40b0 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Asynchronous+federated+learning+based+zero+trust+architecture+for+the+next+generation+industrial+control+systems&rft.jtitle=Computer+networks+%28Amsterdam%2C+Netherlands+%3A+1999%29&rft.au=Lv%2C+Fei&rft.au=Wang%2C+Hangyu&rft.au=Pan%2C+Zhiwen&rft.au=Sun%2C+Rongkang&rft.date=2025-09-01&rft.issn=1389-1286&rft.volume=269&rft.spage=111459&rft_id=info:doi/10.1016%2Fj.comnet.2025.111459&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_comnet_2025_111459 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1389-1286&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1389-1286&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1389-1286&client=summon |