Proceedings of International Conference on Applied Innovation in IT
2026/03/31, Volume 14, Issue 1, pp.727-740
Adaptive Federated Intrusion Detection Framework Using Quantum-Enhanced Harris Hawks Optimization for Edge-Based 6G Networks
Murtadha Talib Abbas, Riyadh Rahef Nuiaa Alogaili, Ahmed Raad Al-Sudani, Ali Hakem Alsaeedi and Selvakumar Manickam Abstract: The rapid evolution of 6G networks introduces unprecedented connectivity, speed, and data volume yet also heightens exposure to large-scale and intelligent cyberattacks. Traditional centralized intrusion detection systems are increasingly inadequate due to scalability limits, privacy risks, and latency challenges in distributed architectures. To overcome these constraints, this study proposes a Quantum-Enhanced Harris Hawks Optimization–based Federated Learning Intrusion Detection System (QHHO–FLIDS) that integrates quantum-driven feature selection with a hybrid CNN–LSTM framework deployed across edge nodes through federated learning. This approach enhances convergence efficiency, reduces data transfer, and preserves privacy by sharing encrypted model gradients instead of raw data. Extensive experiments using the CSE-CIC-IDS2018 and TON_IoT (2020) datasets confirm the system’s effectiveness, achieving detection accuracy above 99% with inference latency under 30 milliseconds. These results demonstrate that QHHO–FLIDS provides a lightweight, transparent, and adaptive security layer, offering significant implications for privacy-preserving intrusion detection and proactive threat mitigation in 6G-enabled cyber-physical environments.
Keywords: Federated Learning, Intrusion Detection System, 6G Networks, Quantum-Enhanced Optimization, Harris Hawks Optimization, Explainable AI, CNN–LSTM, Cybersecurity.
DOI: Under indexing
Download: PDF
References:
- B. R. Das, S. R. Hasan, S. R. Sabuj, M. A. Hossain, and S. K. Ray, “A Comprehensive Survey on Emerging AI Technologies for 6G Communications: Research Direction, Trends, Challenges, and Opportunities,” Int. J. Intell. Networks, 2025.
- A. Ullah, A. Nadeem, M. Arif, M. M. Bashir, and W. Choi, “6G Internet-of-Things assisted smart homes and buildings: Enabling technologies, opportunities and challenges,” Internet of Things, p. 101658, 2025.
- A. M. Alwakeel, “Synergistic Integration of Edge Computing and 6G Networks for Real-Time IoT Applications,” Mathematics, vol. 13, no. 9, p. 1540, 2025.
- Q. He et al., “Integrating IoT and 6 G: Applications of Edge Intelligence, Challenges, and Future Directions,” IEEE Trans. Serv. Comput., 2025.
- T. Al-Shurbaji et al., “Deep learning-based intrusion detection system for detecting IoT botnet attacks: a review,” IEEE Access, 2025.
- N. Mohamed, “Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms,” Knowl. Inf. Syst., pp. 1-87, 2025.
- S. Najafli, A. Toroghi Haghighat, and B. Karasfi, “Taxonomy of deep learning-based intrusion detection system approaches in fog computing: a systematic review,” Knowl. Inf. Syst., vol. 66, no. 11, pp. 6527-6560, 2024.
- M. Devi, P. Nandal, and H. Sehrawat, “Federated Learning-Enabled Lightweight Intrusion Detection System for Wireless Sensor Networks: A Cybersecurity Approach Against DDoS Attacks in Smart City Environments,” Intell. Syst. with Appl., p. 200553, 2025.
- R. Marin Machado de Souza, A. Holm, M. Biczyk, and L. N. de Castro, “A systematic literature review on the use of federated learning and bioinspired computing,” Electronics, vol. 13, no. 16, p. 3157, 2024.
- A. Ali, H. Jianjun, and A. Jabbar, “Recent Advances in Federated Learning for Connected Autonomous Vehicles: Addressing Privacy, Performance, and Scalability Challenges,” IEEE Access, 2025.
- M. Zhang et al., “WHHO: enhanced Harris hawks optimizer for feature selection in high-dimensional data,” Cluster Comput., vol. 28, no. 3, p. 186, 2025.
- T. E. T. Djaidja, B. Brik, S. M. Senouci, A. Boualouache, and Y. Ghamri-Doudane, “Early network intrusion detection enabled by attention mechanisms and RNNs,” IEEE Trans. Inf. Forensics Secur., 2024.
- G. Singh, K. Sood, P. Rajalakshmi, D. D. N. Nguyen, and Y. Xiang, “Evaluating federated learning-based intrusion detection scheme for next generation networks,” IEEE Trans. Netw. Serv. Manag., vol. 21, no. 4, pp. 4816-4829, 2024.
- A. Khraisat, M. A. Talukder, M. A. Uddin, and A. Alazab, “RF-FedAvg: Federated learning-based random forest model for intrusion detection in wireless sensor networks,” Cluster Comput., vol. 28, no. 13, p. 873, 2025.
- S. Wang, W. Xu, and Y. Liu, “Res-TranBiLSTM: An intelligent approach for intrusion detection in the Internet of Things,” Comput. Networks, vol. 235, p. 109982, 2023.
- A. Nazir et al., “Empirical evaluation of ensemble learning and hybrid CNN-LSTM for IoT threat detection on heterogeneous datasets,” J. Supercomput., vol. 81, no. 6, p. 775, 2025.
- A. A. Heidari, S. Mirjalili, H. Faris, I. Aljarah, M. Mafarja, and H. Chen, “Harris hawks optimization: Algorithm and applications,” Futur. Gener. Comput. Syst., vol. 97, pp. 849-872, 2019.
- P. Zhou, H. Zhang, and W. Liang, “Research on hybrid intrusion detection based on improved Harris Hawk optimization algorithm,” Conn. Sci., vol. 35, no. 1, p. 2195595, 2023.
- A. Alzaqebah, I. Aljarah, O. Al-Kadi, and R. Damaševičius, “A modified grey wolf optimization algorithm for an intrusion detection system,” Mathematics, vol. 10, no. 6, p. 999, 2022.
- K. Bonawitz et al., “Practical secure aggregation for privacy-preserving machine learning,” in Proc. ACM SIGSAC Conf. Computer and Communications Security, 2017, pp. 1175-1191.
|

HOME

- Conference
- Journal
- Paper Submission to Conference
- Paper Submission to Journal
- Fee Payment
- For Authors
- For Reviewers
- Important Dates
- Conference Committee
- Editorial Board
- Reviewers
- Last Proceeding

PROCEEDINGS
-
Volume 14, Issue 1 (ICAIIT 2026)
-
Volume 13, Issue 5 (ICAIIT 2025)
-
Volume 13, Issue 4 (ICAIIT 2025)
-
Volume 13, Issue 3 (ICAIIT 2025)
-
Volume 13, Issue 2 (ICAIIT 2025)
-
Volume 13, Issue 1 (ICAIIT 2025)
-
Volume 12, Issue 2 (ICAIIT 2024)
-
Volume 12, Issue 1 (ICAIIT 2024)
-
Volume 11, Issue 2 (ICAIIT 2023)
-
Volume 11, Issue 1 (ICAIIT 2023)
-
Volume 10, Issue 1 (ICAIIT 2022)
-
Volume 9, Issue 1 (ICAIIT 2021)
-
Volume 8, Issue 1 (ICAIIT 2020)
-
Volume 7, Issue 1 (ICAIIT 2019)
-
Volume 7, Issue 2 (ICAIIT 2019)
-
Volume 6, Issue 1 (ICAIIT 2018)
-
Volume 5, Issue 1 (ICAIIT 2017)
-
Volume 4, Issue 1 (ICAIIT 2016)
-
Volume 3, Issue 1 (ICAIIT 2015)
-
Volume 2, Issue 1 (ICAIIT 2014)
-
Volume 1, Issue 1 (ICAIIT 2013)

LAST CONFERENCE
ICAIIT 2026
-
Photos
-
Reports
PAST CONFERENCES
ETHICS IN PUBLICATIONS
ACCOMODATION
CONTACT US
|
|