“…Equally, to enhance the security and preserve-privacy of IoT data, different techniques have been utilized, such as cryptocurrency and blockchain [30,44,49,52,69,78,84,94,99], cryptography-MGO and DHPEA [78], PUFs(ECDSA) [94], homomorphic encryption [51], routing/two-fish symmetry key [85], authentication [68], access control [36], DP [51,52,82]. Additionally, most strategies incorporate techniques to minimize energy consumption, such as in [38,56,72,93,99], while others employed ByzantineMedia and ByzantineKrum [45] to ensure the reliability of the deployed IDS model. With these approaches, the finding further revealed that while the TL and ensemble techniques aimed to speed up model training and detection accuracy, as well as boost data security, the FL strategies were geared towards improving accuracy, efficiency, data imbalances, reliability as well as preserve security and privacy of the data [37,51,52,82].…”