Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2025 Aug 21;25(16):5188. doi: 10.3390/s25165188

BFL-SDWANTrust: Blockchain Federated-Learning-Enabled Trust Framework for Secure East–West Communication in Multi-Controller SD-WANs

Muddassar Mushtaq 1,*, Kashif Kifayat 2
Editors: Hyoungshick Kim, Herodotos Herodotou, Sheraz Aslam, Michalis Michaelides
PMCID: PMC12389910  PMID: 40872050

Abstract

Software-Defined Wide-Area Networks (SD-WAN) efficiently manage and route traffic across multiple WAN connections, enhancing the reliability of modern enterprise networks. However, the performance of SD-WANs is largely affected due to malicious activities of unauthorized and faulty nodes. To solve these issues, many machine-learning-based malicious-node-detection techniques have been proposed. However, these techniques are vulnerable to various issues such as low classification accuracy and privacy leakage of network entities. Furthermore, most operations of traditional SD-WANs are dependent on a third-party or a centralized party, which leads to issues such single point of failure, large computational overheads, and performance bottlenecks. To solve the aforementioned issues, we propose a Blockchain Federated-Learning-Enabled Trust Framework for Secure East–West Communication in Multi-Controller SD-WANs (BFL-SDWANTrust). The proposed model ensures local model learning at the edge nodes while utilizing the capabilities of federated learning. In the proposed model, we ensure distributed training without requiring central data aggregation, which preserves the privacy of network entities while simultaneously improving generalization across heterogeneous SD-WAN environments. We also propose a blockchain-based network that validates all network communication and malicious node-detection transactions without the involvement of any third party. We evaluate the performance of our proposed BFL-SDWANTrust on the InSDN dataset and compare its performance with various benchmark malicious-node-detection models. The simulation results show that BFL-SDWANTrust outperforms all benchmark models across various metrics and achieves the highest accuracy (98.8%), precision (98.0%), recall (97.0%), and F1-score (97.7%). Furthermore, our proposed model has the shortest training and testing times of 12 s and 3.1 s, respectively.

Keywords: blockchain, deep learning, east–west communication, federated learning, interplanetary file system, multi-controller, software-defined networks

1. Introduction

Software-Defined Wide-Area Networks (SD-WANs) have recently gained much attention due to their contributions in modern enterprise and cloud networking. SD-WANs ensure flexible and reliable programmable control over wide-area networks. They ensure easier configuration and management, which improves the performance of the network while simultaneously ensuring simple and efficient connectivity at multiple locations [1]. Communication between multiple SDN controllers over east–west interfaces plays a significant role in coordinated policy enforcement, routing, and control-plane synchronization across distributed domains [2]. However, these east–west interfaces are vulnerable to various issues such as data tampering, false policy injection, and unauthorized access, which affect the integrity of data and the privacy of network entities. The SDN-WANs are growing rapidly to meet the needs of various enterprises. Therefore, it is important to ensure trustworthy and reliable communication between the controllers to protect sensitive control-plane information [3]. However, these networks are vulnerable to various issues such as leakage of privacy of network entities, low security, and the presence of malicious entities [4], because of which the internal users are not comfortable sharing their data with other network entities. Similarly, external users are also not confident in joining and relying upon such networks. The malicious nodes disseminate faulty information in the network, which causes routing inconsistencies and affects the reliability of network services [5]. This raises concerns about the privacy of network entities and their sensitive and important information [6]. Therefore, a robust, privacy-preserving security framework is required that can efficiently detect malicious nodes, validate trust, and secure communication among SDN controllers in a decentralized manner.

During recent years, many studies have been conducted to solve the aforementioned issues of privacy leakage and the presence of malicious nodes in the SD-WANs while developing various ML/DL models [7,8,9]. Abdinasir et al. proposed a machine-learning-based malicious-node-detection mechanism, utilizes the capabilities of Logistic Regression (LR), Support Vector Machine (SVM), Random Forest (RF), K-nearest neighbour (KNN), and XGBoost [7]. Their model efficiently detects denial-of-service attacks and preserves the privacy of network entities. On similar lines, Manvitha et al. utilize the capabilities of deep learning algorithms for malicious-node detection while simultaneously ensuring effective and reliable quality of service-oriented routing [8]. This system uses a Deep Belief Network (DBN) that efficiently classifies malicious and benign entities within the network. The techniques mentioned above efficiently detect and remove malicious entities from SDNs; they are highly dependent on cloud servers and third-party trust management services such as controller authentication, policy synchronization, and behavioral analytics. The stated dependencies make these techniques vulnerable to single points of failure, low network scalability, and performance bottlenecks. To solve these issues, Satoshi Nakamoto proposed a decentralized Bitcoin-based mechanism in 2008 that authenticates all network entities and validates all their actions while utilizing the capabilities of decentralized consensus-based mechanisms [10]. Blockchain is a distributed network in which all network operations are distributed among network entities, without relying on any centralized or third-party [11,12,13], as shown in Figure 1. The blockchain utilizes the capabilities of various consensus algorithms and hashing techniques to establish trust among globally distributed network entities and ensure the integrity of their transferred data [14,15,16,17]. Besides this, it uses different cryptographic algorithms that convert the input data into fixed-sized ciphertexts, which helps in preserving the privacy of entities and ensures tamper resistance [18,19]. Various digital smart contracts are also integrated in a blockchain network that contains predefined business rules and conditions [20]. These smart digital contracts help in ensuring transparent and efficient execution of agreements without any involvement of a centralized party [21].

Figure 1.

Figure 1

A general blockchain layered architecture.

The blockchain-based security frameworks for SDNs proposed so far utilize various machine learning and deep learning techniques to classify malicious and legitimate nodes based on their inter-controller communication behaviors [22,23]. These techniques rely on various algorithms such as LR, SVM, RF, KNN, and XGBoost. All these techniques have a centralized model training structure in which east–west traffic logs, controller behavior analytics, and policy synchronization metadata from multiple domains are aggregated at a central server for training and inference. In these techniques, controllers need to transmit the sensitive operational and telemetry data of the network to a centralized entity, which makes them susceptible to issues such as privacy leakage and low detection accuracy. To solve these issues, we propose a Blockchain Federated-Learning-Enabled Trust Framework for Secure East–West Communication in Multi-Controller SD-WANs (BFL-SDWANTrust) in multi-controller SD-WANs [24,25,26,27]. In our proposed BFL-SDWANTrust, the edge SDN controllers are responsible for local training of malicious-node detection and trust evaluation models using their east–west interface traffic and policy synchronization metadata. After local model training, only essential model parameters such as encrypted gradients and weights are shared with a central aggregator unit for the generation of the federated global model [28,29]. In this way, the sensitive control-plane data and east–west communication logs are not shared outside the network, which helps in ensuring data privacy [30]. After the aggregation of the global trust model, it is sent to all participating SDN controllers, which ensures accurate and generalized trust evaluation across all east–west interfaces. In this way, our proposed model efficiently enhances the robustness and adaptability of trust evaluation in multi-controller SD-WAN environments [31]. This collaborative learning mechanism also enhances detection accuracy by utilizing diverse network-wide data without compromising the privacy of network entities. Besides this, our proposed model also ensures real-time malicious-node detection and significantly reduces response latency, as edge SDN controllers train their local trust models closer to the source of east–west traffic and control-plane interactions [32]. Furthermore, the transport layer security (TLS) channels between SDN controllers protect the SDN network against various attacks [33]. Although TLS provides mutual authentication for secure communication between SDN controllers, it cannot by itself prevent certain dynamic impersonation threats in distributed environments. For instance, if a legitimate controller is compromised after the TLS handshake or if its credentials are stolen, a rogue node can maintain a valid TLS session while exhibiting deviant behaviors during synchronization or policy enforcement. Our model targets such behaviors by analyzing control message patterns, response consistency, and policy compliance, factors outside the TLS scope. The impersonation threats described in our work refer to post-authentication trust degradation, wherein a once-authenticated controller begins to disseminate conflicting or faulty updates. This threat model reflects real-world zero-trust architectures where behavior-based trust scoring complements cryptographic guarantees, ensuring defense even when authentication channels are subverted post-establishment. In this way, SDN networks are still vulnerable to multiple attacks such as injection of falsified policy updates, misconfiguration propagation, replayed synchronization messages, and rogue controller impersonation. Our model addresses these risks by evaluating the trustworthiness of each controller through reputation scoring, behavioral validation, and real-time synchronization monitoring. The framework also identifies malicious controllers masquerading as legitimate nodes during collaborative processes, a threat not mitigated by transport layer security alone. The detection of such behaviors is central to our federated trust evaluation model. The major contributions of the proposed BFL-SDWANTrust are given as follows:

  • A BFL-SDWANTrust model is proposed that ensures reliable and privacy-preserving distributed local model training across multiple SDN controllers while utilizing the capabilities of Convolution Neural Networks (CNN) and SVM classifiers.

  • A distributed blockchain network is used to remove dependence on centralized authorities and efficiently solve various issues such as single points of failure, performance bottlenecks, and operational overheads in controller-to-controller communication.

  • CNN and SVM are integrated to extract spatial-temporal patterns and perform robust classification of east–west traffic behaviors. This hybrid technique not only enhances anomaly detection accuracy but also the controller trust prediction in heterogeneous and dynamic SD-WAN environments.

Table 1 provides the list of abbreviations used in this paper. The remainder of the manuscript is organized as follows: Section 2 presents a detailed review of related work in SD-WAN trust management and blockchain-based security. Section 3 introduces the BFL-SDWANTrust architecture, describing each of its four layers in detail. Section 4 and Section 5 outlines the experimental setup, discusses the evaluation metrics used to validate our model, and analyzes the experimental results. Section 6 concludes the paper and outlines potential directions for future work.

Table 1.

Abbreviations used in the proposed model.

   Abbreviation Description
   AUC Area Under the Curve
   CNN Convolutional Neural Network
   FL Federated Learning
   IPFS InterPlanetary File System
   PDR Packet Delivery Ratio
   PK Public Key
   PoA Proof of Authority
   SDN Software-Defined Network
   SD-WAN Software-Defined Wide-Area Network
   SK Secret Key
   SVM Support Vector Machine
   TLS Transport Layer Security
   VM Virtual Machine

2. Related Work

Many studies have been conducted to ensure effective and reliable deployment of SDN for remote and dispersed locations. Alrashede et al. state that existing techniques are not able to secure the east–west interface and communication between SDN controller nodes, which compromises the security of the overall network [34]. Therefore, the authors propose a blockchain-based distributed mechanism that ensures distributed credential-based access control and encrypted security of data while utilizing the capabilities of the Ethereum network and customized blockchain protocols [35]. The encryption mechanism ensures that the data are encrypted with a particular key and can only be decrypted by the receiver node, which solves the issues of man-in-the-middle and false data injection attacks. Furthermore, the proposed model utilizes the SHA-256 algorithm for data integrity. The proposed model ensures effective and reliable node authentication with swift registration and a mutual authentication mechanism. This model is evaluated by comparing it with various state-of-the-art and benchmark schemes. The performance of all the models is evaluated while considering the factors of authentication time, decentralization, scalability, authentication, system latency, authentication latency, registration latency, throughput, and access control. However, the model of [34] is highly dependent on the Ethereum network, which leads to large network overhead, such as increased latency and operational costs. Furthermore, the system is not scalable as the scalability performance of the proposed model is not evaluated in terms of node churn and dynamic SDN environments, which affects the real-world applicability of this network. While the model in [34] relies on Ethereum for its blockchain operations, our proposed model uses a customized PoA consensus mechanism optimized for controller-to-controller coordination. Ethereum-based systems often suffer from gas costs, execution latency, and unnecessary mining overhead. Our lightweight PoA system removes these constraints by selecting validators from known, high-reputation controllers, thus reducing delay and energy consumption. Furthermore, our system integrates IPFS for data distribution and applies federated learning for real-time trust adaptation that is not used in [34]. These architectural decisions make our model more suitable for scalable, real-time SD-WAN deployments.

Mao et al. [36] proposed a blockchain and federated-learning-enabled security protocol that efficiently detects the attacks and protects the network against them. Furthermore, the capabilities of the federated learning mechanism were utilized, which solved the issue of data privacy. The federated learning mechanism ensured that no raw data of network nodes was shared outside the networks, and local model training was performed within the subnetwork. This not only provided a privacy-preserving network for SDN controller devices but also enhanced the accuracy of the attack detection process as more generalized models were used by all subnetworks for attack detection. The performance of this model was evaluated while considering the factors of data flow rate, accuracy, true positive rate, recall, true negative rate, and velocity updates. However, the model faced performance degradation as this model has a large computational overhead of federated learning, especially in resource-constrained SDN edge devices. Besides this, the model does not efficiently detect poisoned and malicious local models in the federated setup, which affects the integrity of global models. Ahmad et al. [37] proposed a decentralized attribute-based access control mechanism that removes centralized entities from the network and ensures effective and reliable cross-domain access control. This model utilizes the capabilities of group signature, which helps in the secure exchange of attribute information while simultaneously preserving the privacy of network entities within a cross-domain. Each domain has its own predefined rules and polices, which establish a decentralized network and reduce the dependence on global trust models (Table 2).

Table 2.

Comprehensive analysis of existing approaches: Challenges, innovations, evaluations, and future directions.

Existing Model Addressed Limitations Performance Parameters Research Gaps
A blockchain-based distributed mechanism is proposed that ensures distributed credential-based access control and encrypted security of data while utilizing the capabilities of the Ethereum network and customized blockchain protocols [34]. Existing techniques are not able to secure the east–west interface and communication between SDN nodes, which compromises the security of the overall network. Authentication time, decentralization, scalability, authentication, system latency, authentication latency, registration latency, throughput, and access control. The proposed model is highly dependent on the Ethereum network, which leads to large network overhead, such as increased latency and operational costs due to blockchain processing overhead.
A blockchain and federated-learning-enabled security protocol is proposed that efficiently detects denial of services, distributed denial of services, and replay attacks and prevents the network from them [36]. The traditional techniques are not able to efficiently detect and safeguard the network against these attacks. SDN networks are vulnerable to several attacks due to the rapid increase in IoT devices. Data flow rate, accuracy, true positive rate, recall, true negative rate, and velocity updates. The proposed model is vulnerable to the issues of performance degradation, as the proposed model has a large computational overhead of federated learning.
A decentralized attribute-based access control mechanism is proposed that removes centralized entities from the network and ensures effective and reliable cross-domain access control [37]. Existing attribute-based access control mechanisms are not able to efficiently ensure security of cross-domain networks due to the involvement of a centralized attribute evaluation party. Number of predicates, number of attributes, model performance, and execution time. The proposed model is vulnerable to the issue of performance bottlenecks due to the large computational overhead of group signature schemes, especially when handling many attributes or predicates.
A blockchain-enabled adaptive fading reputation mechanism is proposed SDN networks are vulnerable to various attacks, such as false data injection attacks Detection rate, execution time, number of switches, number of hosts The operations of the proposed model are highly dependent on a master controller of a respective domain.
effective and optimal detection of malicious nodes in the network [38]. SDN networks are vulnerable to various attacks, such as false data injection attacks, denial of service, and distributed denial of service. Due to these attacks, the SDN networks are facing the issue of topology inconsistency among network controllers. detection time, reputation, and number of observation intervals. It causes the issue of a single point of failure within each domain, which compromises the decentralization objective of the proposed model.
A machine learning and blockchain-enabled SDN is proposed that ensures network security while simultaneously preserving the privacy of entities and the flexibility of the network [39]. Fifth-generation networks are vulnerable to various issues such as low data protection, entity privacy leakage, and data loss. Topology, bandwidth, throughput, node failure rate, computational delay, and bandwidth prediction. The proposed model has a large computational overhead and network latency due to the training of LSTM and MLP classifiers, especially in real-time high-speed fifth-generation networks.

Furthermore, the authors use a distributed consensus algorithm that evaluates the practical feasibility of the proposed model while simultaneously ensuring secure and reliable exchange of healthcare information in the cross-domain network. The performance of this model is evaluated while considering the factors of several predicates, the number of attributes, model performance, and the execution time. However, this model is vulnerable to the issues of performance bottlenecks due to the large computational overhead of group signature schemes, especially when handling multiple attributes or predicates. Furthermore, the model has a limited dynamic policy adaptation mechanism, which limits the flexibility in rapidly evolving cross-domain networks. Abdelouahid et al. [38] proposed a blockchain-based decentralized architecture in which the network is divided into various domains. Each domain has its master controller that is responsible for interacting with the master controllers of other domains. All the interactions and transactions of a respective domain are validated by its master controller. After the validation of each block, the master controller adds the block to the blockchain network. Furthermore, the model utilizes the capabilities of the fading reputation mechanism that ensures effective and optimal detection of malicious nodes in the network. The model was evaluated while considering the factors of detection rate, execution time, number of switches, number of hosts, detection time, reputation, and number of observation intervals. However, all the operations of this model are highly dependent on the master controller of the respective domain, which causes the issue of a single point of failure within each domain, compromising the decentralization objective of the proposed model. Furthermore, the fading reputation mechanism is vulnerable to evasion tactics, as some malicious entities can act normally for a short time to avoid detection. Furthermore, Rahman et al. [39] proposed a machine learning and blockchain-enabled SDN that ensures network security while simultaneously preserving the privacy of entities and the flexibility of the network. The authors divide the whole network into various data planes and control planes, which helps in efficient and reliable management of the network with low computational overhead. Furthermore, their model utilizes the capabilities of a distributed blockchain network to ensure network security and privacy of network entities with the help of SHA-256 hashing and Keccak encryption techniques, respectively. The model uses long short-term memory and multilayer perceptron classifiers for estimation of network bandwidth, which helps in quick and intelligent decision-making while simultaneously satisfying high-bandwidth demand. The performance of the proposed model was evaluated via experimental evaluation in terms of network topology, bandwidth, throughput, node failure rate, computational delay, and bandwidth prediction. However, this model has a large computational overhead and network latency due to the training of LSTM and MLP classifiers, especially in real-time high-speed fifth-generation networks. Furthermore, the model does not have any mechanism to consider interoperability challenges between heterogeneous fifth-generation network components during deployment.

3. Proposed BFL-Model

Figure 2 shows the hierarchical and distributed architecture of SDN controllers, where the east–west communication represents the exchange of control information among SDN controllers deployed across a nationwide SD-WAN infrastructure. Building on this architecture, Figure 3 presents the proposed BFL-SDWANTrust framework, which is specifically designed to enhance the security and trustworthiness of east–west communication in such multi-controller SD-WAN environments. Our proposed model is divided into four layers: sensing layer, blockchain layer, fog layer, and cloud layer. Each layer plays an important role in establishing a decentralized trust framework by utilizing the capabilities of blockchain for immutable record management and consensus-based validation [40]. Furthermore, federated learning and cryptographic techniques are used for distributed malicious-node detection without sharing raw data and authentication of network entities, respectively. This layered architecture enhances the trust across east–west interfaces of multiple SDN controllers in the SD-WANs while simultaneously enhancing the accuracy of the detection mechanism.

Figure 2.

Figure 2

Hierarchical and distributed SDN controller architecture.

Figure 3.

Figure 3

Proposed model for secure east–west communication in multi-controller SD-WANs.

3.1. Sensing Layer in East–West Interface Monitoring

In our proposed layered BFL-SDWANTrust network, the first layer is the sensing layer that is responsible for real-time environmental monitoring. Furthermore, this layer also extracts various trust-critical parameters from east–west traffic among distributed SD-WAN controllers Ci, where C={C1,C2,,Cn} represents the set of SDN controllers that operate within a multi-domain SD-WAN.

In this layer, various system parameters such as packet delivery ratio (PDR), transaction latency, control message integrity, response consistency, and behavior anomaly scores are collected for evaluating network behavior [41]. These metrics are collected over time and multi-dimensional time-series datasets M are generated, as represented in Equation (1).

M={(t1,m1),(t2,m2),,(tz,mz)} (1)

where, mz is a vector of trust parameters observed at time tz and z represents the number of observed data intervals. The metrics are collected by each controller at a defined interval based on a configurable probing frequency fp, which is formulated according to Equation (2).

fp=1Δt (2)

where, Δt is the time gap between two successive metric samples. When all sensors or nodes perform normally, then there is a lower frequency, while the monitoring frequency is increased for further observation in case of any unusual activity in the network. Furthermore, we utilize the capabilities of asymmetric encryption and the Keccak-256 hashing algorithm for protecting controller data, as represented in Equation (3), which ensures secure communication between all layers [42].

Ψenc=H(EncKpub(M)) (3)

where, EncKpub(M) represents the encrypted metric dataset using the public key Kpub of the corresponding blockchain verifier node and H(·) is a cryptographic Keccack-256 function, which ensures the integrity of data. After that, Ψenc is sent to the blockchain verification layer for further trust evaluation. Furthermore, we utilize the capabilities of lightweight encoding techniques such as Context-Adaptive Binary Arithmetic Coding (CABAC) for compressing encrypted data. It helps in ensuring efficient transmission and reducing congestion across the east–west interfaces. We also use hybrid SD-WAN communication protocols such as gRPC and NETCONF/YANG for reliable controller-to-controller communication. These protocols not only ensure high throughput and low latency but also provide an efficient and reliable model-driven communication [43].

In our proposed model, all SD-WAN controllers are registered with a trust unit at the blockchain layer by providing their credentials, such as identity certificates, resource capabilities, policy definitions, and operational thresholds. When any controller sends trust-critical updates, it also adds its registration credentials, operational logs, and communication signatures. Upon receiving the data, the blockchain layer triggers the smart contracts to authenticate the sender controller by matching its credentials [44]. If both records match, then the sending controller is considered to be a legitimate node, and an acknowledgment message is sent back to the respective sensor node to ensure the delivery of the data packet. On the other hand, if both records do not match, then these controller devices are considered to be malicious and immediately removed from the network [45]. The whole process of the sensing layer is described in Algorithm 1.

Algorithm 1 is designed to monitor and secure communication between distributed SDN controllers C={C1,C2,,Cn} within a multi-controller SD-WAN architecture. Each controller Ci collects trust-critical parameters at defined intervals governed by a probing frequency fp, which is the inverse of the time difference Δt between metric samples.

Algorithm 1 Sensing layer algorithm for east–west interface trust evaluation
  • Require: Set of SDN controllers C={C1,C2,,Cn}, Probing frequency fp=1Δt,

       Threshold trust value θ, Public key Kpub of blockchain node

  • Ensure: Encrypted trust dataset Ψenc, Trust evaluation report Tr

  •   1: Initialize metric set M=, timestamp t=0

  •   2: for each controller CiC do

  •   3:     Initialize local metric buffer Mi=

  •   4: end for

  •   5: while network is active do

  •   6:     for each controller CiC do

  •   7:         Sample trust-critical parameters mt=[PDRt,Lt,CMIt,RCt,BASt]

  •   8:         Record timestamp tt+Δt

  •   9:         Append (t,mt) to Mi

  •   10:        if anomaly detected in mt then

  •   11:            Increase probing frequency fpfp+δ

  •   12:        else

  •   13:            Restore probing frequency fp1Δt

  •   14:         end if

  •   15:         Compress mt using CABAC: m^tCABAC(mt)

  •   16:         Encrypt m^t: EtEncKpub(m^t)

  •   17:         Generate integrity hash: htH(Et)

  •   18:         Create secure packet: Ψenct{Et,ht}

  •   19:         Send Ψenct to blockchain verifier

  •   20:     end for

  •   21:     for each received Ψenct at blockchain layer do

  •   22:         Decrypt Et using Kpriv, validate hash ht

  •   23:         if H(Et)=ht then

  •   24:            Validate sender identity via smart contract SC

  •   25:            if identity ∈ registry and signature matches then

  •   26:                Approve trust record: TrTr{Ci,t,mt}

  •   27:                Send ACK to Ci

  •   28:            else

  •   29:               Mark Ci as malicious

  •   30:                Remove Ci from network set C

  •   31:            end if

  •   32:         else

  •   33:            Reject data: Integrity violation

  •   34:         end if

  •   35:     end for

  •   36: end while

  •   37: return Final encrypted trust dataset Ψenc and report Tr

These parameters include the packet delivery ratio (PDR), transaction latency Lt, control message integrity (CMI), response consistency (RC) and behavior anomaly score (BAS), collectively represented as the trust metric vector mt at time t. Each controller maintains a local metric buffer Mi which is populated with timestamped observations (t,mt). If any anomaly is detected in the observed metrics, the algorithm adaptively increases the probing frequency fp by a constant value δ to enhance monitoring sensitivity; otherwise, it restores the default sampling frequency. To reduce transmission overhead, each metric vector is compressed using Context-Adaptive Binary Arithmetic Coding (CABAC), producing a compressed vector m^t.

After that, the encrypted data are generated using asymmetric encryption EncKpub(·), where Kpub is the public key of the blockchain verifier node. This encrypted metric data Et is then hashed using a cryptographic Keccak-256 hash function H(·) to generate a secure digest ht, ensuring data integrity. The final encrypted and hashed pair is encapsulated into a secure packet Ψenct={Et,ht}, which is transmitted to the blockchain layer for validation. Upon receipt, the blockchain layer decrypts the packet using the corresponding private key Kpriv and validates the hash to confirm data integrity. If the hash matches, a smart contract SC is triggered to verify the sender controller’s credentials. If the identity and signature of the controller match those in the blockchain registry, the trust record is appended to the global trust report Tr and an acknowledgment is sent back to the controller. Conversely, if the identity verification fails, the controller is labeled as malicious and is excluded from the trusted network set C. If the hash check fails, indicating a tampered message, the packet is rejected. This algorithm ensures that encrypted and trustworthy behavioral data are continuously monitored and validated, preserving the confidentiality, integrity, and availability of east–west communications in a decentralized SD-WAN environment.

3.2. Blockchain Layer for Secure East–West Interface Communication

The second layer of our proposed BFL-SDWANTrust framework is the blockchain layer, which plays an important role in establishing trust and data immutability. Furthermore, this layer utilizes the capabilities of a blockchain decentralized ledger to ensure effective and secure east–west interface communications among SDN controllers in a multi-controller SD-WAN environment. This layer comprises various SDN controllers Ci, where each controller is responsible for managing its regional domain and communicates with other controllers over the east–west interface [46]. In our proposed model, the blockchain network is deployed over the controller network to maintain a tamper-resistant ledger that captures all communication data and routing coordination updates. In this layer, the blockchain smart contracts are also deployed, which ensure automated trust evaluation. Furthermore, we use the Proof-of-Authority (PoA) consensus algorithm to establish consensus among distributed controller nodes. Each SDN controller Ci is registered with the blockchain ledger by providing its credentials and cryptographic identity to the trusted node [2]. All the real-time transactions among controller nodes are validated by the PoA consensus algorithm. The block-wise control data RCt collected at time t is represented as Equation (4).

RCt={r1t,r2t,,rpt} (4)

where, rkt is the trust communication packet from controller k at time t and p is the number of communication packets aggregated for ledger update. Furthermore, the capabilities of digital signatures and Keccak-256 techniques are used to ensure the security and non-repudiation of the control data. In our proposed model, a secure hash Hblk is generated over the block content using the private key SKi of controller Ci, as shown in the Equation (5).

Hblk=Hash(RCtSKi) (5)

where, Hblk is the unique identifier of the control data block, RCt is the block of east–west control packets and SKi is the private cryptographic key of controller Ci, which ensures that only authorized controllers can issue valid transactions. Furthermore, the PoA consensus algorithm ensures that only trusted and pre-authorized SDN controllers can validate east–west communication transactions and add the blocks to the distributed blockchain ledger [47]. Each interested SDN controller Ci expresses its interest in becoming a validator for the current transactions. However, only controllers with a high reputation ρi and consistent historical behavior τi are selected for transaction validation and adding the block. After that, a weighted scoring function is used to rank the interested nodes, and only the controllers with high values are selected as validators. While the architecture shown in Figure 2 indicates logical centralization, the participating SDN controllers operate in federated domains with autonomy in runtime policy adaptation based on local conditions such as latency, route availability, and domain-specific service level agreements (SLAs). The logical controller acts as a high-level entity but does not override the local operational policies and behavioral thresholds enforced by each domain controller. Therefore, runtime metrics like policy enforcement accuracy and responsiveness can vary across controllers due to environmental and network conditions, justifying the differentiation in reputation scores. Our reputation framework is designed to capture such deviations and ensure controller behaviors are continuously validated in dynamic east–west interactions, even under logical central governance. The selection probability Pauth(Ci) for a controller Ci is calculated using Equation (6).

Pauth(Ci)=ω1·ρi+ω2·τij=1qω1·ρj+ω2·τj (6)

where, ρi represents the trust reputation of controller Ci, which is computed based on its audit compliance, policy enforcement accuracy, and network uptime. The variable τi shows the normalized number of successful transaction validations completed by controller Ci over a recent time. The weights ω1 and ω2 are important factors that contribute to trust, reputation, and transaction history, respectively. The denominator computes the total weighted score of all q interested controllers. In our proposed model, the reputation ρi of an SDN controller shows its historical compliance with network policies, responsiveness in synchronization, and availability. While policies are initially defined by administrators, their enforcement and consistency across east–west interfaces vary due to latency, partial failures, or configuration drift. Our trust framework evaluates these runtime behaviors to compute ρi, ensuring that validators in the blockchain layer are selected based not only on configuration but also on operational fidelity. This differentiation is crucial in dynamic SD-WAN environments where misbehaving or compromised controllers can propagate faulty policies. Once the validator nodes are selected based on Equation (6), the transaction verification process begins. Each selected validator Ck verifies the transaction set T and casts a vote on its own. A consensus is reached when the number of approval votes Vyes exceeds from predefined threshold θcons, as shown in Equation (7).

k=1vvk=Vyesθcons (7)

where, vk{0,1} is the binary vote of validator Ck, where 1 and 0 represent approval and rejection, respectively. The variable v represents the total number of validators in the current round, and θcons is the predefined minimum number of approvals that are required for adding a block to the blockchain ledger. If the consensus threshold is met, the verified block Bverified is added to the blockchain [48]. The process of adding a block is protected with asymmetric encryption and Keccak-256 hashing techniques [49]. This hash is made with all the approved transactions T and the signatures of the validators Σv, as shown in Equation (8).

Hcommit=H(T  Σv) (8)

where, H(·) is a secure cryptographic hash function, T is the concatenated list of verified transactions and Σv represents the combined digital signatures of all approving validators. This hash ensures the integrity of the entire block, which ensures that the transaction set and validators cannot be tampered with or altered. In this way, the PoA consensus algorithm ensures that only trustworthy and high-performing controllers participate in consensus, which ensures the reliability, scalability, and decentralization of the proposed BFL-SDWANTrust blockchain layer [50].

Furthermore, we utilize the capabilities of an external data storage platform, InterPlanetary File System (IPFS), to solve the issue of the high cost of blockchain storage. In our proposed model, only the hash of the east–west control data is stored on the blockchain, and the original data is stored on distributed nodes of IPFS. Our proposed model utilizes the capabilities of IPFS to offload storage from the blockchain, while maintaining verifiability of east–west communication logs. Each control data block, containing synchronization updates and policy actions, is hashed using Keccak-256 (with less transaction latency than SHA-256) and stored on IPFS. The corresponding hash is written to the blockchain, ensuring immutability. Access to these records requires signature verification of the requesting entity using smart contracts. This layered mechanism ensures that only registered and verified controllers can read or append to the communication log, preventing unauthorized access or tampering, thereby securing the east–west channel beyond standard encryption mechanisms. First, the controller calculates the hash of data and sends it to the IPFS storage platform, and the hash is stored on the blockchain ledger, as shown in Equation (9).

HIPFS=Hash(RCt)IPFS (9)

where, HIPFS denotes the hash of data that is used by IPFS to identify and retrieve the control data. After that, IPFS divides the data into fixed-size packets of 256 kB and stores these packets at its globally distributed nodes. The processes of segmentation and distribution of control data are expressed in Equation (10).

DCi=k=1wΠk,ΠkNIPFS (10)

where, DCi is the data from controller Ci, Πk is a segmented packet of 256 kB and NIPFS denotes the global IPFS node network. When a controller requests data from IPFS, it must provide the hash of the data stored on the blockchain. The IPFS verifies the authenticity of data with the hash and collects the segmented data from its distributed nodes. After that, all the segmented data are aggregated by IPFS and sent to the controller. Upon receiving the data, the controller again calculates the hash of the data and compares it with the stored blockchain hash. It helps in verifying the integrity of data, as represented in Equation (11).

Hverify=Hashk=1wΠk (11)

If Hverify=HIPFS, an acknowledgment is sent to ensure the integrity of data. Otherwise, the smart contract triggers an arbitration process to resolve the dispute. In this way, the blockchain layer of our proposed model ensures that only authenticated controllers and federated nodes can access the data. All entities must register through smart contracts to be considered legitimate participants. In the proposed model, the capabilities of digital signature validation are utilized to ensure the access control mechanism. When a controller Ci or a federated learner node requests access to data, its digital signature is verified. The access decision Actrl is defined in Equation (12).

Actrl=1,ifSig(PKnode)isvalid0,otherwise (12)

where, PKnode is the public key of the requesting entity and Sig(PKnode) is its submitted digital signature. If the signature is valid, only then is access given; otherwise, it is denied. The whole process of secure block formation, IPFS integration, consensus validation, and access control is described in Algorithm 2.

Algorithm 2 Blockchain layer algorithm for secure east–west communication
  • Require: East–west control packets RCt, controller set {C1,C2,,Cn}

  • Ensure: Verified block Bverified, access control decision Actrl

  •   1: for all controller Ci{C1,C2,,Cn} do

  •   2:     Collect trust communication packets rkt

  •   3:     Form control data block RCt={r1t,r2t,,rpt}

  •   4:     Compute hash Hblk=Hash(RCt  SKi)

  •   5:     Store Hblk for block verification

  •   6: end for

  •   7: PoA Validator Selection

  •   8: for all interested controller Ci do

  •   9:     Compute reputation score ρi and transaction history τi

  •   10:   Compute selection probability:

  •           Pauth(Ci)=ω1·ρi+ω2·τij=1q(ω1·ρj+ω2·τj)

  •   11: end for

  •   12: Select top-v validators based on Pauth(Ci)

  •   13: Consensus Voting

  •   14: for all validator Ck do

  •   15:    Verify transaction set T

  •   16:    Cast vote vk{0,1}

  •   17: end for

  •   18: Compute total approvals: Vyes=k=1vvk

  •   19: if Vyesθcons then

  •   20:    Compute commit hash Hcommit=H(T  Σv)

  •   21:    Form Bverified and append to blockchain

  •   22: else

  •   23:    Discard block and log failure

  •   24: end if

  •   25: IPFS Storage Integration

  •   26: Compute IPFS hash: HIPFS=Hash(RCt)IPFS

  •   27: Split RCt into chunks ΠkNIPFS

  •   28: DCi=k=1wΠk

  •   29: Store Πk on distributed IPFS nodes

  •   30: Data Retrieval and Integrity Check

  •   31: Controller sends retrieval request with HIPFS

  •   32: IPFS collects Πk, aggregates data and returns

  •   33: Controller computes verification hash: Hverify=Hashk=1wΠk

  •   34: if  Hverify=HIPFS  then

  •   35:     Send acknowledgment and continue

  •   36: else

  •   37:     Trigger arbitration process via smart contract

  •   38: end if

  •   39: Access Control via Signature Validation

  •   40: for all access requests by Ci or federated nodes do

  •   41:     Verify Sig(PKnode)

  •   42:     if Sig(PKnode) is valid then

  •   43:         Set Actrl1

  •   44:     else

  •   45:         Set Actrl0

  •   46:     end if

  •   47: end for

Algorithm 2 is designed to ensure secure, decentralized, and tamper-resistant communication among SDN controllers operating in a multi-controller SD-WAN environment. The algorithm begins by iterating over each controller Ci{C1,C2,,Cn}, where n is the total number of SDN controllers participating in the east–west trust evaluation. Each controller collects trust communication packets denoted as rkt, where k represents the index of the packet and t the current time instance. These packets are aggregated to form the control data block RCt={r1t,r2t,,rpt}, with p being the total number of collected packets. A cryptographic hash of the block is then generated using the controller’s private signing key SKi, represented as Hblk=Hash(RCt  SKi), where ‖ denotes concatenation. This hash serves as the fingerprint of the block and is preserved for verification during consensus. Subsequently, the algorithm proceeds with validator selection under the Proof-of-Authority (PoA) consensus mechanism, where interested controllers propose themselves as validators. Each candidate controller computes a reputation score ρi, based on historical behavior and transaction history τi. These values are weighted using coefficients ω1 and ω2, respectively, to calculate the validator selection probability Pauth(Ci)=ω1·ρi+ω2·τij=1q(ω1·ρj+ω2·τj), where q denotes the number of interested validators. The top v controllers with the highest Pauth values are selected as validators.

Once validators are selected, each validator Ck verifies the transaction set T and casts a binary vote vk{0,1}, where 1 indicates acceptance. The total number of affirmative votes is computed as Vyes=k=1vvk. If the approval count Vyes meets or exceeds the predefined consensus threshold θcons, a commit hash is generated as Hcommit=H(T  Σv), where Σv represents the aggregated validator votes. The verified block Bverified is then appended to the blockchain ledger. To optimize storage and enhance decentralization, the algorithm incorporates the IPFS. It computes an IPFS hash HIPFS=Hash(RCt)IPFS, splits the data block into chunks ΠkNIPFS and distributes them across IPFS nodes such that DCi=k=1wΠk, where w is the number of chunks. Retrieval is performed using HIPFS and the aggregated data are verified by recomputing the hash Hverify=Hashk=1wΠk. If Hverify=HIPFS, the data are deemed valid; otherwise, a smart contract is triggered for arbitration. Finally, access control is enforced by verifying the digital signature Sig(PKnode) of any requesting node. If valid, access control status is set to Actrl1; otherwise, it is denied by setting Actrl0. This process ensures both trustworthiness and data integrity in east–west controller communications.

3.3. Fog Layer in Multi-Controller SD-WAN

The fog layer of our proposed model plays an important role in the secure and distributed learning architecture of the BFL-SDWANTrust framework. At the fog layer, each VM is associated with its respective east–west controller node and is responsible for processing traffic metadata, flow records, and inter-controller communications [51]. Each virtual machine trains a local malicious-node-detection model while utilizing the capabilities of CNN and SVM classifiers with a federated learning mechanism. The input dataset Dctrlt at time t for a controller Ci, gathered from east–west links, is defined according to Equation (13).

Dctrlt={d1t,d2t,,dnt} (13)

where, dkt represents the traffic flow feature vector of k that is observed on east–west traffic at time t and n is the total number of observed interactions during that timespan. These data are not shared outside the local fog network and are kept within the virtual machine server, which helps in preserving the privacy of network entities. Each VM trains a local malicious-node-detection model Ti using lightweight neural network architectures, such as CNN and SVN, which helps in reliable and accurate malicious-node detection. The local model update for controller node Ci is performed using a gradient descent step, as shown in Equation (14).

Tit+1=Titμ·L(Tit,Di) (14)

where, Tit represents the current local model of controller Ci at iteration t, μ is the learning rate, L(·) is the gradient of the loss function and Di is the dataset collected by controller Ci from east–west traffic telemetry. On the other hand, the training of CNN-based models involves convolutional and fully connected layers that are optimized while utilizing the capabilities of backpropagation [52]. The model updates are updated according to Equation (15).

TCNN,it+1=TCNN,itμ·1Bj=1BLCNN(fθ(xj),yj) (15)

where, fθ is the CNN function parameterized by weights θ, xj and yj are the j-th input sample and its label, B is the batch size and LCNN is the cross-entropy loss used for classification. The main purpose of SVM-based models is to minimize the hinge loss function. The update rule is expressed in Equation (16).

TSVM,it+1=TSVM,itμ·λ·TSVM,ityjxj·I(yj·TSVM,it,xj<1) (16)

where, λ is the regularization parameter, ·,· represents the dot product between the weight vector and the input, I(·) is the indicator function, which has 1 output if the condition is true and yj{1,1} is the class label of the sample xj. These local updates ensure that each controller node can train an effective and privacy-preserving malicious-node-detection model while utilizing the data patterns of its respective east–west communication [53]. Furthermore, our proposed model uses asymmetric encryption to ensure that only authenticated and high-trust controllers contribute updates to the global trust model. Each VM digitally signs its locally trained model using the private key κprivi of controller Ci, as represented in Equation (17).

Σi=Sign(Tit+1,κprivi) (17)

where, Σi is the digital signature of the source for the model. After transmission of the model to the blockchain layer for global aggregation and verification, each update is checked using the public key κpubi of respective Ci and validated according to Equation (18).

Validate(Σi,κpubi)=Accepted,ifTit+1isverifiedRejected,otherwise (18)

This trust-preserving mechanism ensures that only legitimate east–west controller VMs can contribute to the aggregated model. In this way, our proposed BFL-SDWANTrust framework enhances the robustness and security of model convergence across the SD-WANs by ensuring only authenticated controllers have access to model updates [54]. The entire process of local model training at the fog layer is described in Algorithm 3. Algorithm 3 extends beyond conventional federated learning by incorporating domain-specific features for east–west trust evaluation. It integrates hybrid CNN+SVM training on localized east–west telemetry data, followed by digital signature-based authentication to ensure that only verified controllers contribute to the global model. Additionally, the model includes anomaly-aware sampling, encryption, and validation layers, tailored for decentralized controller networks. These additions distinguish our architecture from generic federated learning pipelines and address security-specific needs of SD-WAN controller planes.

Algorithm 3 Local model training at fog layer
  • Require:

  •   1: Set of controllers C={C1,C2,,Cn}

  •   2: Time step t, Learning rate μ, Batch size B, Regularization parameter λ

  •   3: Dataset Dctrlt={d1t,d2t,,dnt} from east–west traffic telemetry

  •   4: Initial local malicious detection models:

  •   5: CNN-based model TCNN,it, SVM-based model TSVM,it, General local model Tit

  •   6: Controller private keys κprivi and public keys κpubi

  • Ensure:

  •   7: Updated and signed local models Tit+1 with digital signatures Σi

  •   8: Prepared model updates for secure transmission to the blockchain layer

  •   9: for each controller node CiC do

  •   10:     Step 1: Data Collection

  •   11:     Load local traffic data Dctrlt from east–west interface flows

  •   12:     Extract feature vectors dktDctrlt

  •   13:     Step 2: Local Model Initialization

  •   14:     Retrieve previous local models Tit,TCNN,it,TSVM,it

  •   15:     Step 3: Gradient Computation for General Model

  •   16:     Compute gradient of loss: L(Tit,Dctrlt)

  •   17:     Step 4: General Model Update

  •   18:     Update local model weights:

  •   19:                Tit+1Titμ·L(Tit,Dctrlt)

  •   20:     Step 5: CNN Model Training

  •   21:     For each batch j=1B do

  •   22:                Extract batch samples (xj,yj)

  •   23:                Compute CNN gradient:

  •   24:                     LCNN(fθ(xj),yj)

  •   25:     end for

  •   26:     Update CNN model:

  •   27:                TCNN,it+1TCNN,itμ·1Bj=1BLCNN(fθ(xj),yj)

  •   28:     Step 6: SVM Model Training with Hinge Loss

  •   29:     For each sample (xj,yj)Dctrlt do

  •   30:                Compute indicator function:

  •   31:                     I(yj·TSVM,it,xj<1)

  •   32:                Calculate SVM gradient component:

  •   33:                     gj=λ·TSVM,ityjxj·I()

  •   34:     end for

  •   35:     Aggregate gradient over dataset and update:

  •   36:                TSVM,it+1TSVM,itμ·jgj

  •   37:     Step 7: Digital Signature Creation

  •   38:     Sign updated model using private key:

  •   39:                ΣiSign(Tit+1,κprivi)

  •   40:     Step 8: Secure Transmission

  •   41:     Transmit (Tit+1,Σi) to blockchain layer

  •   42:     Step 9: Signature Verification

  •   43:     Verify signature with public key:

  •   44:                Validate(Σi,κpubi)

  •   45:     if validation accepted then

  •   46:         Accept model update for global aggregation

  •   47:     else

  •   48:         Reject update, log security alert

  •   49:     end if

  •   50: end for

Algorithm 3 is designed to perform local training of malicious-node-detection models at the fog layer of the proposed BFL-SDWANTrust framework within a multi-controller SD-WAN environment. The input to the algorithm includes a set of controllers C={C1,C2,,Cn}, where each controller Ci collects east–west traffic data at discrete time steps t. These data are represented as Dctrlt={d1t,d2t,,dnt}, where each dkt is a feature vector corresponding to an observed traffic flow at time t. The local training process for each controller involves three model types: a general local model Tit, a convolutional neural network (CNN)-based model TCNN,it and a support vector machine (SVM)-based model TSVM,it. The learning rate μ controls the step size for gradient descent updates, while B denotes the batch size used during CNN training and λ is the regularization parameter applied to the SVM updates to avoid overfitting. At each iteration, the algorithm first computes the gradient L(Tit,Dctrlt) of the loss function L over the local dataset, which quantifies the error between the model predictions and the true labels. Using this gradient, the general local model is updated by taking a step proportional to the learning rate and gradient magnitude, following the rule Tit+1=Titμ·L(Tit,Dctrlt). For the CNN model, training proceeds in batches: for each batch of samples (xj,yj), the gradient of the CNN-specific loss LCNN is computed and aggregated across all batches. The CNN model is then updated by subtracting the average batch gradient scaled by the learning rate, as expressed by TCNN,it+1=TCNN,itμ·1Bj=1BLCNN(fθ(xj),yj), where fθ represents the CNN function parameterized by weights θ. The SVM model update involves minimizing the hinge loss, which aims to maximize the margin between classes. For each sample, the algorithm evaluates the indicator function I(yj·TSVM,it,xj<1), where ·,· denotes the dot product between the model weights and input vector and yj{1,1} is the binary class label. The update rule combines a regularization term λ·TSVM,it with a correction term proportional to misclassified samples, following TSVM,it+1=TSVM,itμ·jλ·TSVM,ityjxj·I() [55].

Once the local models have been updated, security and trust are ensured via digital signatures. Each controller Ci signs its updated general model Tit+1 using its private key κprivi, producing a signature Σi=Sign(Tit+1,κprivi). This cryptographic operation guarantees the authenticity and integrity of the model updates before transmission to the blockchain layer for global aggregation. Upon receiving updates, the blockchain nodes verify signatures using the corresponding public keys κpubi through the validation function Validate(Σi,κpubi). If the signature verification succeeds, the model update is accepted and incorporated into the global model aggregation process; otherwise, it is rejected and flagged for security review. This mechanism protects against malicious or unauthorized controllers submitting false or corrupted model updates. Overall, the algorithm integrates federated learning with secure cryptographic operations to enable privacy-preserving, distributed training of malicious-node-detection models, maintaining robustness and trust across the SD-WAN controllers while respecting data locality and confidentiality.

3.4. Cloud Aggregation Layer in SD-WAN Controller Plane

The fourth layer of our proposed BFL-SDWANTrust architecture is the cloud layer, which is responsible for securely collecting and integrating the local trust models trained by each distributed SD-WAN controller node. After local model training, each virtual machine encrypts its malicious-node-detection model and securely transmits it to the cloud layer, which helps in ensuring end-to-end confidentiality and integrity, as shown in Equation (19).

Ci=Encrypt(Ti,Ki) (19)

where, Ti represents the locally trained trust model of controller Ci and Ki is its encryption key. This encryption mechanism ensures that model updates cannot be accessed by unauthorized entities in the network, which solves the issue of man in a middle attack. On the other hand, the cloud server receives encrypted model updates and decrypts each locally trained model with the decryption key Ki1, which ensures effective and reliable verification of digital signatures. After the verification step, the cloud server integrates all the locally trained models and generates a unified global model. In this step, the proposed model utilizes the capabilities of the federated averaging process on all verified and authenticated local models for generating a unified global malicious-node-detection model. The averaging process is performed based on control-plane events and east–west traffic logs used in the training of each local model. The aggregated global model Tglobalt+1 is computed according to Equation (20).

Tglobalt+1=i=1NviV·Tit (20)

where, vi is the volume of valid control-plane telemetry entries used in training by controller Ci, V=i=1Nvi is the total volume across all nodes and Tit is the local model from node i at aggregation round t. This weighted aggregation ensures that nodes with more participation have a high influence in the aggregation of the unified model, which ensures the fairness of the model aggregation process. Furthermore, our proposed model efficiently identifies compromised updates by analyzing deviation patterns from the expected score gradients. If any locally trained model Ti deviates from the average model gradient g¯ and exceeds the predefined threshold θ, then it is considered to be malicious node, as represented in Equation (21).

Tig¯>θTiflaggedasmalicious (21)

where, θ is a hyperparameter that is derived via grid search on validation telemetry datasets. Its optimal value is 1.2×σ, where σ is the standard deviation of all trust gradient vectors. The models that have deviations below this threshold are considered to be legitimate, while models with higher deviations are considered to be faculty models. In this way, our proposed model ensures that only authentic and legitimate local models can take part in the global malicious-node-detection model. Once the global model is successfully aggregated, it is encrypted and sent back to all participating controller VMs. Each VM then integrates the global malicious-node-detection knowledge into its local decision-making process, which helps in real time, distributed, and secure malicious-node detection in east–west communication. The entire process of model aggregation at the cloud layer is described in Algorithm 4.

Algorithm 4 operates within the SD-WAN controller plane to securely aggregate locally trained trust models received from distributed SDN controllers. The set of controllers is denoted by C={C1,C2,,CN}, where each controller Ci trains a local trust model represented by Ti. These local models are encrypted into ciphertexts Ci=Encrypt(Ti,Ki) using the encryption key Ki associated with each controller, ensuring confidentiality against unauthorized access or man-in-the-middle attacks. The cloud layer receives these encrypted models and utilizes the corresponding decryption keys Ki1 to decrypt and retrieve the original trust models T^i=Decrypt(Ci,Ki1). Before inclusion in the global aggregation process, each decrypted model undergoes signature verification to authenticate the source and ensure data integrity. Models that fail verification are discarded, and their respective controllers are flagged for potential malicious activity. The telemetry volume vi reflects the quantity of valid control-plane data entries used by each controller Ci for training its local model. The total telemetry volume across all controllers is computed as V=i=1Nvi, which serves as the normalization factor for weighted aggregation. Verified local models and their corresponding volumes are collected into sets V and W, respectively.

Algorithm 4 Cloud aggregation layer algorithm for global trust model aggregation
  • Require: Set of controllers C={C1,,CN}, encrypted local models {Ci}, encryption

       keys {Ki}, decryption keys {Ki1}, threshold θ, telemetry volumes {vi}

  • Ensure: Encrypted global trust models {Cglobali}

  •   1: Compute total volume Vi=1Nvi

  •   2: Initialize verified models V, volumes W

  •   3: for i=1 to N do

  •   4:     Receive encrypted model Ci

  •   5:     Decrypt T^iDecrypt(Ci,Ki1)

  •   6:     if Signature verification of T^i succeeds then

  •   7:         Add T^i to V

  •   8:         Add vi to W

  •   9:     else

  •   10:         Discard T^i and flag Ci

  •   11:     end if

  •   12: end for

  •   13: Compute weighted average gradient:
    g¯1wjjwj·T^j,T^jV,wjW
  •   14: for each T^iV do

  •   15:     Compute deviation diT^ig¯

  •   16:     if di>θ then

  •   17:         Flag T^i as malicious

  •   18:         Remove T^i and corresponding wi from V,W

  •   19:     end if

  •   20: end for

  •   21: Recompute total volume Vwj

  •   22: Aggregate global model:
    Tglobalt+1jwjV·T^j
  •   23: for i=1 to N do

  •   24:     Encrypt global model for controller i:
    CglobaliEncrypt(Tglobalt+1,Ki)
  •   25:     Transmit Cglobali to Ci

  •   26: end for

  •   27: return {Cglobali}

The aggregation process begins by calculating the weighted average gradient g¯, which represents the average model update across controllers and is computed as g¯=1jwjjwjT^j, where T^jV and weights wjW correspond to telemetry volumes. This weighted approach ensures that controllers with larger training data have a proportionally greater impact on the global model, enhancing fairness and robustness. Next, the algorithm identifies malicious or faulty local models by measuring the deviation di=T^ig¯ of each local model from the average gradient. If the deviation exceeds a predefined threshold θ, determined by prior empirical tuning and typically set to a multiple of the standard deviation of model gradients, the local model T^i is flagged as malicious and excluded from further aggregation. Following the removal of anomalous models, the total volume V is recalculated over the remaining valid models and a final weighted aggregation is performed to generate the updated global trust model Tglobalt+1=jwjVT^j. The global model is then encrypted individually for each controller using their respective encryption keys Ki to produce Cglobali=Encrypt(Tglobalt+1,Ki), ensuring confidentiality in transmission back to controllers. By securely distributing the global model updates, this algorithm facilitates a trusted, distributed, and collaborative malicious-node-detection system across the SD-WAN east–west interfaces. Algorithm 4 performs cryptographic operations at each layer, sensing, fog, blockchain, and cloud to ensure the authenticity and integrity of control data exchanged between controllers. While these layers perform similar operations like hashing and signing, their purposes differ. At the sensing and fog layers, signatures ensure that telemetry and detection data originate from a valid controller. At the blockchain layer, signatures authenticate model updates before committing to the ledger, while at the cloud layer, they validate model aggregation results. This stratified security model ensures resilience against replay, injection, and impersonation attacks across the trust architecture. Furthermore, we use selective signature verification using smart contract triggers to reduce cryptographic redundancy, which ultimately ensures that only differential updates or trust-critical communications are signed and validated. Instead of verifying every packet or message, the smart contracts monitor metadata fields such as timestamp, sender identity, and semantic difference with the last committed state to determine whether revalidation is necessary. This dynamic triggering mechanism eliminates unnecessary digital signature generation and validation operations during routine or low-risk controller interactions. Furthermore, hash chaining is employed instead of full rehashing where applicable; by linking only modified blocks or deltas with the preceding hash, we reduce redundant hashing computations while preserving data integrity and traceability across the blockchain and IPFS layers. These techniques are particularly effective in environments with frequent east–west synchronization events, where unchanged control states would otherwise undergo full cryptographic processing. By adopting this optimization strategy, the system significantly reduces processing latency and resource utilization without compromising the security model. These optimizations ensure a balance between layered security and performance efficiency, ensuring the system remains scalable under varying telemetry loads and adaptable to real-time operational requirements.

4. Experimental Results and Analysis

To evaluate the effectiveness of the proposed BFL-SDWANTrust model, we utilized the publicly available InSDN dataset, which emulates real-world SDN scenarios involving various types of attacks and benign traffic across controller communication channels [56]. The dataset includes telemetry traces, control messages, and inter-controller coordination logs, allowing for a realistic emulation of east–west traffic patterns in multi-domain SD-WAN environments. To align with our architecture, we applied a preprocessing pipeline that extracted relevant features such as packet delivery ratio, control message anomalies, latency fluctuations, and behavioral divergence, which are critical for trust evaluation. Furthermore, to simulate diverse and evolving network conditions, we introduced controlled variations in node behavior such as partial policy compliance, delayed synchronization, and replayed update messages using a network emulator. These modifications enriched the dataset’s heterogeneity, enabling robust training of the federated detection models and allowing for the evaluation of our system under both normal and adversarial operational dynamics. However, the InSDN dataset was originally constructed using a single SDN controller environment and lacks explicit east–west controller communication flows; we employ it to simulate inter-controller malicious node behaviors using distributed virtual environments. In our extended simulation environment, we replicate the east–west communication by deploying multiple logically independent ONOS controller instances, each with virtualized interlinks mimicking the east–west plane. We utilize these setups to synthesize inter-controller communication logs from the original telemetry by assigning directional flows, configuration exchanges, and behavior consistency patterns. Though the dataset does not natively provide east–west interactions, our framework reinterprets and restructures the control-plane behaviors to evaluate the trustworthiness and detection of potentially malicious east–west transactions, consistent with real-world SD-WAN deployments that extend single-controller telemetry into logically federated controller architectures. The main objective of our model is to ensure effective and reliable malicious-node detection in multi-controller SD-WAN environments while simultaneously preserving the privacy of network entities. We evaluate the performance of our proposed model while considering the factors of accuracy, precision, recall, F1-score, Area Under the Curve (AUC), PDR, average latency, transaction latency, training time, testing time, and blockchain gas consumption. We compare our proposed model with LR, SVM, RF, KNN, XGBoost [7], and DBN [8]. Table 3 provides the simulation parameters and performance results of our proposed model.

Table 3.

Simulation parameters and performance metrics for proposed BFL-SDWANTrust using the InSDN dataset.

Parameter Name Values
Dataset Used InSDN Dataset (2020)
Number of Network Flows Over 2 million labeled telemetry records
Network Environment Multi-controller SD-WAN with east–west communication
Data Features Telemetry metrics, flow statistics, device logs, network metadata
Data Preprocessing Normalization, feature encoding, imputation, dimensionality reduction
Federated Learning Setup 10 ONOS SDN controllers as distributed clients
Communication Rounds 150 federated training rounds
Model Architecture BFL-SDWANTrust: CNN + SVM with Blockchain-based Federated Learning
Optimizer Adam optimizer (learning rate = 0.001) for CNN; Grid search for SVM
Loss Function Cross-Entropy Loss (CNN); Hinge Loss (SVM)
Evaluation Metrics Accuracy, Precision, Recall, F1-Score, AUC, Transaction Latency, Training Time, Testing Time, Packet-Drop Ratio
Accuracy Achieved 99.8% (on test data)
Precision 98.0%
Recall 97.0%
F1-Score 97.5%
AUC Score 0.998
Transaction Latency 13.6 ms (lowest among all compared models)
Training Time 12.0 s (lowest)
Testing Time 3.1 s (lowest)
Packet-Drop Ratio 0.8% (lowest)
Comparison Models LR (91.5%), SVM (93.2%), RF (94.0%), KNN (90.8%), XGBoost (94.5%), DBN (95.2%), BFL-SDWANTrust (99.8%)
Privacy Preservation Blockchain-integrated model aggregation with smart contract enforcement
Hardware Used NVIDIA RTX 4090, 128 GB RAM

4.1. Dataset Details

The InSDN Dataset is designed to support research on security and anomaly detection in SDN-WANs, especially in scenarios involving east–west communication between controllers [56]. It is created using Mininet and POX controllers and includes around 70,000 records with both normal and attack traffic. Each record contains important features such as control packet types (e.g., packet_in, flow_mod), source and destination IDs, timestamps, and flow rule actions. In our proposed model, we use this dataset in a federated learning environment where each controller trains its local model using InSDN telemetry. This allows the system to detect abnormal controller behavior without sharing raw data, preserving privacy and reducing bandwidth. The combination of controller-level control-plane data and attack scenarios makes InSDN a strong fit for testing our trust framework for east–west communication security. There are various flow-level network statistics, device logs, and system metrics in the dataset that make it effective and reliable for the evaluation of intrusion detection and malicious-node-detection models in SD-WANs. The dataset captures various heterogeneous network traffic patterns. These patterns come from multiple SDN controllers and edge devices. This helps reflect real-world deployment challenges. The traffic flows are often noisy, imbalanced, and dynamic. This dataset is suitable for a federated-learning-based malicious-node-detection mechanism, where sensitive and important telemetry data remains localized within each SDN controller domain to ensure privacy preservation and effective model training. In our proposed model, we simulate a federated learning mechanism over various SDN controllers, where local model updates are securely aggregated without sending any raw telemetry data outside the network.

4.2. Experimental Results

Figure 4 presents the comparison of our proposed BFL-SDWANTrust framework and various machine learning algorithms in terms of accuracy, precision, recall, and F1-score. The figure shows that our proposed model outperforms all benchmark schemes in all four performance metrics, which shows that our model is effective and reliable for secure east–west communication in multi-controller SD-WAN environments. The accuracy of our proposed model is 98.8%, which is higher than all other classifiers, as shown in Table 4. This is because our proposed model utilizes the capabilities of blockchain and federated learning. The federated learning enables decentralized training across distributed SD-WAN nodes, which preserves the privacy of data while simultaneously learning localized trust behaviors. On the other hand, the blockchain distributed network efficiently ensures data integrity and immutability, which further enhances the accuracy and reliability of the model. Besides this, the precision of our proposed model is 98.0%, which shows our model has a very low false positive rate. Our model has better precision than all other classifiers, which have accuracies of 89.4% and 88.9%, respectively. The reason for the low accuracy of these models is that these classifiers are vulnerable to various issues, such as outliers and static decision boundaries. Our proposed model is very effective and reliable for malicious-node detection in SD-WANs because misclassification of legitimate controllers as malicious nodes can affect the overall performance of the model.

Figure 4.

Figure 4

Comparison of various performance metrics among malicious-node-detection models on InSDN dataset.

Table 4.

Performance metrics comparison of BFL-SDWANTrust and benchmark models.

Model Accuracy (%) Precision (%) Recall (%) F1-Score (%)
LR 91.5 89.4 87.6 88.5
SVM 93.2 90.5 89.0 89.7
RF 94.0 91.2 90.1 90.6
KNN 90.8 88.9 86.5 87.7
XGBoost 94.5 92.7 91.5 92.1
DBN 95.2 93.4 92.1 92.7
BFL-SDWANTrust 98.8 98.0 97.0 97.5

Furthermore, Figure 4 shows that our model has the highest recall value of 97.0%, which shows that our model has a better capability to identify actual malicious behaviors. This is the federated learning mechanism and the blockchain-based decentralized consensus algorithms in which malicious-node-detection models are aggregated from multiple nodes, which reduces bias and enhances threat coverage. Lastly, our proposed model achieves the highest F1-score of 97.5%. The reason for the low F1-score of other classifiers is that these models are not scalable and adaptive in dynamic SD-WAN topologies. In this way, our proposed model is not only accurate but also more precise, sensitive, and resilient for malicious-node-detection in SD-WANs. Furthermore, the blockchain architecture makes it very suitable for scalable, real-time malicious-node-detection in multi-controller SD-WANs.

Figure 5 provides the confusion matrix for the proposed BFL-SDWANTrust model on the InSDN dataset for Scenario 1. The matrix evaluates the classification performance of our proposed model across four distinct traffic categories: normal, DDoS, recon, and backdoor. The results show that our model has high accuracy and strong classification capabilities. Furthermore, the results show that our model efficiently identified 240 out of 243 normal entities, with only 2 misclassified as DDoS attackers and 1 as a recon attacker. For the DDoS class, 230 out of 238 entities were correctly classified, with 3 misclassifications as normal entities, 4 recon attackers, and 1 backdoor attacker, as shown in Table 5. The reason for these minor errors is the overlapping of packet-level attributes with legitimate traffic. Furthermore, it can be easily predicted that the recon attacker class has a strong classification performance, with 225 true positives out of 230. Only 2 instances are misclassified as normal entities and 3 as backdoor attackers, which shows that our model is efficient and reliable in identifying malicious nodes. Lastly, the model efficiently classifies backdoor attacker samples, as 216 samples are correctly identified out of 219, with 1 misclassification as normal entities and 2 as DDoS attackers. Overall, the results show that our proposed model has high precision and recall across all classes, making the model effective and reliable in classifying various types of attackers while simultaneously preserving the privacy of network entities.

Figure 5.

Figure 5

Proposed BFL-SDWANTrust confusion matrix for Scenario 1 malicious-node detection on InSDN dataset.

Table 5.

Confusion matrix for BFL-SDWANTrust on InSDN dataset (Scenario 1).

Actual / Predicted Normal DDoS Recon Backdoor
Normal 240 2 1 0
DDoS 3 230 4 1
Recon 2 0 225 3
Backdoor 1 2 0 216

Figure 6 shows the confusion matrix of the proposed BFL-SDWANTrust model for Scenario 2 on the InSDN dataset. There are five classes in this scenario: normal, DDoS, recon, backdoor, and injection, which show a reliable entity in the network. The results show that our model correctly predicts 190 normal entities out of 194 and misclassifies only 3 as DDoS attackers and 1 as an injection attacker, as shown in Table 6. This shows that our proposed model is effective and reliable for malicious-node-detection for all these node types. In the DDoS category class, 180 samples are correctly identified; however, only 5 are misclassified, which shows that our model has a high recall value in the detection of various attacks. Besides this, the recon class has 175 correct classifications from 180 samples. However, the class overlaps with backdoor and injection, which is due to packet-level similarities and common patterns in both attacks. Furthermore, the backdoor class has 170 correct samples out of 174. However, there are a few misclassifications, which show that the backdoor traffic has some resemblance to other attack patterns in SD-WAN environments. Lastly, the injection class has effective and reliable results with 180 true positives out of 184, which shows that our fine-grained model is efficiently able to identify various attacks on the application layer. The results show that our model effectively classifies almost all legitimate and malicious nodes in the network. The reason is that in our model, the models are locally trained at edge nodes with class-balanced data. Due to this, our model has high accuracy, reduced poisoning, and data privacy, which makes BFL-SDWANTrust a robust and reliable solution for secure malicious-node-detection in east–west SD-WANs.

Figure 6.

Figure 6

Proposed BFL-SDWANTrust confusion matrix for Scenario 2 malicious-node detection on InSDN dataset.

Table 6.

Confusion matrix for BFL-SDWANTrust on InSDN dataset (Scenario 2).

Actual / Predicted Normal DDoS Recon Backdoor Injection
Normal 190 3 0 0 1
DDoS 2 180 1 2 0
Recon 0 1 175 3 1
Backdoor 0 2 2 170 1
Injection 1 0 1 2 180

Figure 7 provides the PDR comparison of our proposed BFL-SDWANTrust model and six benchmark models: LR, SVM, RF, KNN, XGBoost, and DBN. The figure shows that our proposed model has the lowest PDR of 0.8% and outperforms all models. The reason is that our model efficiently integrates blockchain and a federated learning mechanism. The blockchain ensures data immutability while simultaneously ensuring reliable and trusted data transmission across east–west SD-WAN controllers. On the other hand, the distributed federated learning not only reduces transmission overhead local trained model but also preserves the privacy of users. KNN has the highest PDR of 3.5%, which is higher than LR (3.2%) and SVM (2.9%). The reason is that KNN is efficiently able to accurately classify malicious and legitimate nodes based on their local patterns. Furthermore, our proposed model efficiently minimizes network congestion and ensures that there is no redundant packet forwarding in the network, which leads to fewer dropped packets. The results in Table 7 show the reliability and efficiency of our proposed BFL-SDWANTrust model in handling traffic in complex SD-WANs.

Figure 7.

Figure 7

Comparison of PDR among malicious-node-detection models on InSDN dataset.

Table 7.

Packet-drop ratio comparison of BFL-SDWANTrust and baseline models.

   Model Packet-Drop Ratio (%)
   BFL-SDWANTrust 0.8
   LR 3.2
   SVM 2.9
   RF 2.5
   KNN 3.5
   XGBoost 2.2
   DBN 1.9

Figure 8 provides the latency comparison of our proposed BFL-SDWANTrust model and six benchmark models: LR, SVM, RF, KNN, XGBoost, and DBN. The results shows that our proposed model has lowest latency of 12.4 ms and outperforms all benchmark classification models: KNN (39.8 ms), LR (35.6 ms), SVM (32.1 ms), RF (28.7 ms), DBN (23.9 ms) and XGBoost (27.5 ms), as shown in Table 8 because our proposed model utilizes the capabilities of blockchain and federated learning that ensure quick and reliable malicious-node detection across SD-WAN controllers. Furthermore, our model solves the issues of performance bottlenecks as there is no involvement of any centralized or third party in our proposed model. Besides this, we also use lightweight locally trained models in the east–west communication layer, which helps in faster packet handling and reduces end-to-end delay. Hence, our proposed BFL-SDWANTrust model is efficient and reliable for real-time malicious-node-detection in SD-WANs.

Figure 8.

Figure 8

Comparison of latency among malicious-node-detection models on InSDN dataset.

Table 8.

Latency comparison of BFL-SDWANTrust and baseline models.

   Model Latency (ms)
   BFL-SDWANTrust 12.4
   LR 35.6
   SVM 32.1
   RF 28.7
   KNN 39.8
   XGBoost 27.5
   DBN 23.9

Figure 9 shows the comparison of our proposed BFL-SDWANTrust model and benchmark schemes in terms of precision–recall (PR) curves. Our model achieves an AUC of 0.998, which shows that our model has high classification performance and robustness against class imbalance. The DBN model has an AUC of 0.932, while XGBoost and RF achieve AUCs of 0.915 and 0.907, respectively because DBN can learn hierarchical representations, which helps in better feature extraction and capturing complex attack patterns. On the other hand, SVM (0.893), LR (0.881), and KNN (0.874) have low AUC values, as shown in Table 9 because our models are not able to efficiently handle complex patterns of various attacker nodes in SD-WANs. The high AUC value indicates that our model has a high true positive rate and low false positives due to the effective and reliable integration of federated learning and blockchain trust mechanisms. In this way, our model not only achieves high malicious-node-detection accuracy but also ensures secure and privacy-preserving east–west controller communication in multi-controller SD-WANs.

Figure 9.

Figure 9

Comparison of AUC among malicious-node-detection models on InSDN dataset.

Table 9.

Area under precision–recall curve (AUC) Comparison.

   Model AUC (PR)
   BFL-SDWANTrust 0.998
   DBN 0.932
   XGBoost 0.915
   RF 0.907
   SVM 0.893
   LR 0.881
   KNN 0.874

Figure 10 provides a comparative analysis of gas consumption in Gwei across ten virtual machines (VMs) within the SD-WANs (VM-1 to VM-10) in terms of PoW (23,000–25,700 Gwei) and PoA (22,500–25,500 Gwei) consensus algorithms. The figures show that PoW requires higher gas usage compared to PoA across all 10 VMs. The figure shows that VM-4 and VM-9 have the highest gas consumption for PoW (25,700 Gwei), while PoA has lower gas consumption (25,500 Gwei). Furthermore, the average consumption across all VMs for PoW is around 24,790 Gwei, whereas PoA averages around 24,250 Gwei, as depicted in Table 10. The reason is that PoW selects a miner VM based on its computational capabilities. This miner node is responsible for validating the transaction across network entities and adding the blocks into the blockchain. This miner VM is selected through a competition among all interested VMs; each VM needs to solve a computational puzzle, and only one VM is selected as the miner HU. The resources of all other participants are wasted. On the other hand, the PoA consensus algorithm ensures that only trusted and pre-authorized SDN controllers can validate east–west communication transactions and add the blocks to the distributed blockchain ledger. Each interested SDN controller shows its interest in becoming a validator for the current transactions. However, only controllers with a high reputation and consistent historical behavior are selected for transaction validation and adding the block without the utilization of large network computational resources, as compared to the traditional PoW consensus algorithm. It is the reason that PoA is a more scalable and reliable consensus algorithm for inter-controller communication in the SD-WAN malicious-node-detection mechanism.

Figure 10.

Figure 10

Comparison of consensus algorithms among malicious-node-detection models.

Table 10.

Gas consumption comparison (PoW vs. PoA).

  VM Instance PoW (Gwei) PoA (Gwei)
  VM-1 25,000 24,000
  VM-2 24,000 23,000
  VM-3 23,000 22,500
  VM-4 25,700 25,500
  VM-5 25,500 25,000
  VM-6 24,500 24,000
  VM-7 24,000 23,500
  VM-8 25,000 24,500
  VM-9 25,700 25,500
  VM-10 25,500 25,000

Figure 11 compares the transaction latency of two cryptographic hashing algorithms, Keccak-256 and SHA-256, for various transactions in our proposed BFL-SDNWanTrust model. The latency for both algorithms increases linearly with the number of transactions, which shows that the computational overhead is associated with the processing of transactions with a larger workload. In our proposed model, we utilize the capabilities of the Keccak-256 hashing algorithm for ensuring the security and integrity of data, in contrast with the benchmark schemes [7,8] that use SHA-256. The results show that Keccak-256 has lower transaction latency as compared to SHA-256 for all transactions. For instance, Keccak-256 has a latency of approximately 225 s at 13,000 transactions while SHA-256 has a higher latency of around 250 s, as shown in Table 11. The reason is that the Keccak-256 hashing algorithm uses sponge construction, which takes a very small amount of time to hash as compared to the SHA-256 Markel tree technique. This latency difference shows that Keccak-256 is efficient and reliable in quick and intelligent decision-making in the blockchain network. In this way, our proposed model utilizes the capabilities of blockchain and ensures the optimization of malicious-node-detection mechanisms in SD-WANs.

Figure 11.

Figure 11

Comparison of transaction latency among malicious-node-detection models.

Table 11.

Transaction latency comparison of Keccak-256 and SHA-256.

No. of Transactions Keccak-256 Latency (s) SHA-256 Latency (s)
1500 100,000 110,000
3000 125,000 130,000
5500 150,000 160,000
8000 175,000 190,000
10,500 200,000 220,000
13,000 225,000 250,000

Figure 12 and Figure 13 show a comparison of our proposed model and benchmark schemes in terms of training times and testing times, respectively. Figure 12 shows that our proposed model achieves the shortest training time of 12 s. This is faster than other models, such as XGBoost and DBN, which take over 40 s to train the model, as shown in Table 12 because our proposed model uses a lightweight architecture and a decentralized learning mechanism, which minimizes redundant computations. Furthermore, the federated learning mechanism reduces data transmission overhead, which ensures faster convergence and scalable training across distributed SD-WAN nodes. In this way, our proposed BFL-SDWANTrust model is effective and reliable for real-time malicious-node detection in SD-WANs. On the other hand, Figure 13 shows that our proposed BFL-SDWANTrust model has the most efficient performance with the lowest testing time of 3.1 s, as shown in Table 12. The reason for this is that our proposed decentralized architecture of BFL-SDWANTrust enables parallel computation and model training across federated nodes. Furthermore, our model has a lightweight design, which minimizes computational latency during a real-time malicious-node-detection mechanism. This reduced testing time shows that our proposed BFL-SDWANTrust model is highly suitable for real-time malicious detection mechanisms where low latency is very significant.

Figure 12.

Figure 12

Comparison of training time among malicious-node-detection models.

Figure 13.

Figure 13

Comparison of testing time among malicious-node-detection models.

Table 12.

Training and testing time comparison of different models.

  Model Training Time (s) Testing Time (s)
  LR 20.0 5.2
  SVM 28.0 6.8
  RF 35.0 7.5
  KNN 25.0 6.1
  XGBoost 42.0 8.0
  DBN 40.0 7.2
  BFL-SDWANTrust 12.0 3.1

Figure 14 shows a comparative analysis of key performance metrics such as latency, throughput, and accuracy between scenarios with and without cryptographic modules in the BFL-SDWANTrust framework. The figure shows that the cryptographic operations, such as digital signatures, hashing, and verification mechanisms, increase latency from 80 ms to 90.16 ms, representing a 12.7% rise. This is due to the additional computation time required for encrypting east–west controller messages, verifying identities through smart contracts, and hashing control packets stored in IPFS. On the other hand, throughput experiences a reduction from 120 Mbps to 110 Mbps (an 8.3% decrease), primarily due to CPU contention and queuing delays introduced by cryptographic tasks. These include real-time signature generation, validation, and hash recalculations across multilayer controller communications, which consume compute resources and reduce packet processing speed.

Figure 14.

Figure 14

Performance metrics with and without cryptographic operations.

Besides this, the accuracy improves significantly from 85.0% to 98.8%. This improvement is due to the integration of hybrid CNN+SVM classification in the federated learning pipeline. The cryptographic mechanisms enhance data integrity and authenticity, resulting in more reliable training data and better global model convergence. Signature verification acts as a filtering layer, discarding poisoned or manipulated telemetry data before aggregation, thus boosting the detection accuracy of malicious controllers. The trade-off shown in this plot highlights a well-justified balance between security and performance. The minor overheads in latency and throughput are acceptable in light of the substantial gain in accuracy, proving the feasibility of secure, real-time east–west trust validation in SD-WAN environments (Table 13).

Table 13.

Performance metrics comparison with and without cryptographic modules in BFL-SDWANTrust.

Scenario Latency (ms) Throughput (Mbps) Accuracy (%)
Without Cryptographic Operations 80.00 120.00 85.0
With Cryptographic Operations 90.16 110.00 98.8

5. Discussion

The BFL-SDWANTrust framework integrates federated learning and blockchain technologies to establish a privacy-preserving trust evaluation mechanism specifically tailored for multi-controller SD-WAN environments. This design ensures that sensitive data are kept local to each domain while enabling collaborative learning across distributed controllers. The layered architecture of BFL-SDWANTrust introduces inherent robustness, decentralization, and scalability by distributing tasks across the edge, fog, and cloud layers. However, this layered approach also brings certain trade-offs in terms of latency and computational overhead, particularly due to the cryptographic operations such as digital signatures, hash chaining, and data encryption applied at multiple stages. These security mechanisms significantly enhance data integrity and trustworthiness, albeit with increased resource consumption, especially in the fog and cloud layers where aggregation and verification tasks are computationally intensive.

Despite these overheads, empirical evaluations show that the trade-offs are well justified by the substantial improvements in malicious-node-detection accuracy, precision, and recall. The system achieves this through the deployment of a hybrid CNN+SVM classifier, which combines the deep feature extraction capabilities of CNNs with the discriminative properties of SVMs for precise threat detection. The classifier is locally trained at each controller and validated collaboratively through federated aggregation, ensuring both performance and data privacy. To address the latency issues commonly associated with blockchain, the framework employs a PoA consensus mechanism, which eliminates the need for energy-intensive mining processes and reduces block confirmation times. This makes the system lightweight, scalable, and suitable for real-time SD-WAN operations. Additionally, the integration of IPFS for distributed off-chain storage significantly reduces the storage burden on the blockchain ledger, allowing efficient management of logs, models, and audit trails without bloating the chain. The BFL-SDWANTrust model also emphasizes modularity and adaptability, enabling easy integration into other critical infrastructures such as smart grids, healthcare systems, and intelligent transportation networks, where secure inter-domain communication and trust validation are paramount. Nevertheless, tuning the hybrid detection model across heterogeneous controllers introduces challenges in terms of model convergence, data heterogeneity, and resource synchronization, which need continuous validation and performance monitoring. Overall, BFL-SDWANTrust achieves a balanced integration of security, performance, and scalability, offering a promising direction for the development of secure, intelligent, and collaborative SD-WAN infrastructures.

6. Conclusions and Future Work

In this paper, a novel malicious-node-detection model, BFL-SDWANTrust, was proposed that solves the issues of centralized malicious-node-detection schemes and third-party-based multi-controller SD-WANs. The issues of privacy leakage, performance bottlenecks, and single points of failure were solved while utilizing the capabilities of federated learning and blockchain techniques. In our proposed model, the distributed model training was ensured at edge nodes without central data aggregation. This distributed model training not only enhances the accuracy of the malicious-node-detection process but also preserves the privacy of network entities. Furthermore, we utilized the capabilities of blockchain to ensure transparent and tamper-proof validation of node activities and network communication transactions. We compared our proposed model with various benchmark schemes on the InSDN dataset. The results show that BFL-SDWANTrust outperforms all existing benchmark models in terms of accuracy (98.8%), precision (98.0%), recall (97.0%), and F1-score (97.7%). Moreover, our model achieves the lowest training (12 s) and testing times (3.1 s) as compared to other classification models. In this way, our proposed model minimizes network overhead by eliminating centralized entities and ensures effective and reliable malicious-node detection while simultaneously preserving the privacy of network entities in east–west communication in SD-WANs. The proposed framework is applicable in nationwide SD-WAN deployments, where decentralized coordination between controllers is critical. This includes large-scale enterprise networks, internet service provider (ISP) backbones, and cross-domain smart city infrastructures. Additionally, the model is suitable for privacy-sensitive sectors such as healthcare, defense, and finance, where secure trust evaluation and policy consistency are essential. The ability to detect misbehaving controllers in real time while preserving data privacy makes BFL-SDWANTrust suitable for next-generation networked systems operating across distributed environments.

Our model has a large computational overhead due to the integration of blockchain with federated learning, which leads to increased latency and resource consumption in large-scale SD-WANs. Furthermore, the proposed model is not adaptive to concept drift and changes in attack patterns over time, which reduces the accuracy of the detection mechanism in evolving networks. As future work, we propose robust aggregation methods such as Krum or trimmed mean in the federated learning framework to solve the issues of poisoning attacks and improve the trustworthiness of local model updates. Furthermore, we propose the integration of Hyperledger Fabric as a permissioned blockchain layer to improve transaction throughput, reduce energy consumption, and provide fine-grained access control in multi-controller SD-WAN environments. Additionally, adaptive learning mechanisms can also be integrated into the federated model to dynamically handle concept drift and evolving attack vectors, which will ensure effective detection accuracy over time.

Author Contributions

M.M. is the primary author and was responsible for proposing the methodology, implementing the system, and conducting the mathematical modeling. K.K., as the PhD supervisor, provided continuous supervision throughout the project and was responsible for evaluating the research findings and offering critical feedback. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

Funding Statement

This research received no external funding.

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

  • 1.Liu J., Chen C., Li Y., Sun L., Song Y., Zhou J., Jing B., Dou D. Enhancing trust and privacy in distributed networks: A comprehensive survey on blockchain-based federated learning. Knowl. Inf. Syst. 2024;66:4377–4403. doi: 10.1007/s10115-024-02117-3. [DOI] [Google Scholar]
  • 2.Lakhlef H., Lerner T., Kebir A., El Atia N., Du X., Ingardin V. Blockchain-Enabled SDN Solutions for IoT: Advancements, Discussions and Strategic Insights; Proceedings of the 2024 IEEE Symposium on Computers and Communications (ISCC); Paris, France. 26–29 June 2024; pp. 1–6. [DOI] [Google Scholar]
  • 3.Solis W.V., Parra-Ullauri J.M., Kertesz A. Exploring the synergy of fog computing, blockchain and federated learning for IoT applications: A systematic literature review. IEEE Access. 2024;12:68015–68060. doi: 10.1109/ACCESS.2024.3398034. [DOI] [Google Scholar]
  • 4.Hallaji E., Razavi-Far R., Saif M., Wang B., Yang Q. Decentralized federated learning: A survey on security and privacy. IEEE Trans. Big Data. 2024;10:194–213. doi: 10.1109/TBDATA.2024.3362191. [DOI] [Google Scholar]
  • 5.Ahmad J., Zia M.U., Naqvi I.H., Chattha J.N., Butt F.A., Huang T., Xiang W. Machine learning and blockchain technologies for cybersecurity in connected vehicles. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 2024;14:e1515. doi: 10.1002/widm.1515. [DOI] [Google Scholar]
  • 6.Cai Z., Chen J., Fan Y., Zheng Z., Li K. Blockchain-empowered federated learning: Benefits, challenges and solutions. IEEE Trans. Big Data. 2025:1–20. doi: 10.1109/TBDATA.2025.3541560. [DOI] [Google Scholar]
  • 7.Hirsi A., Audah L., Salh A., Alhartomi M.A., Ahmed S. Detecting DDoS threats using supervised machine learning for traffic classification in software defined networking. IEEE Access. 2024;12:166675–166702. doi: 10.1109/ACCESS.2024.3486034. [DOI] [Google Scholar]
  • 8.Gali M., Mahamkali A. Deep Learning Based Attack Detection and QoS Aware Secure Routing Protocol for SDN-IoT Network. Concurr. Comput. Pract. Exp. 2025;37:e70045. doi: 10.1002/cpe.70045. [DOI] [Google Scholar]
  • 9.Huang W., Li T., Cao Y., Lyu Z., Liang Y., Yu L., Li Y. Safe-NORA: Safe Reinforcement Learning-Based Mobile Network Resource Allocation for Diverse User Demands; Proceedings of the 32nd ACM International Conference on Information and Knowledge Management (CIKM ’23); Birmingham, UK. 21–25 October 2023; [DOI] [Google Scholar]
  • 10.Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System. Mod. Econ. 2008;6:1–9. [Google Scholar]
  • 11.Luo H., Zhang Q., Sun G., Yu H., Niyato D. Symbiotic Blockchain Consensus: Cognitive Backscatter Communications-Enabled Wireless Blockchain Consensus. IEEE/ACM Trans. Netw. 2024;32:5372–5387. doi: 10.1109/TNET.2024.3462539. [DOI] [Google Scholar]
  • 12.Luo H., Sun G., Chi C., Yu H., Guizani M. Convergence of Symbiotic Communications and Blockchain for Sustainable and Trustworthy 6G Wireless Networks. IEEE Wirel. Commun. 2025;32:18–25. doi: 10.1109/MWC.001.2400245. [DOI] [Google Scholar]
  • 13.Yang J., Yang K., Xiao Z., Jiang H., Xu S., Dustdar S. Improving Commute Experience for Private Car Users via Blockchain-Enabled Multitask Learning. IEEE Internet Things J. 2023;10:21656–21669. doi: 10.1109/JIOT.2023.3317639. [DOI] [Google Scholar]
  • 14.Farah M.B., Ahmed Y., Mahmoud H., Shah S.A., Al-Kadri M.O., Taramonli S., Bellekens X., Abozariba R., Idrissi M., Aneiba A. A survey on blockchain technology in the maritime industry: Challenges and future perspectives. Future Gener. Comput. Syst. 2024;157:618–637. doi: 10.1016/j.future.2024.03.046. [DOI] [Google Scholar]
  • 15.Dai M., Sun G., Yu H., Wang S., Niyato D. User Association and Channel Allocation in 5G Mobile Asymmetric Multi-Band Heterogeneous Networks. IEEE Trans. Mob. Comput. 2025;24:3092–3109. doi: 10.1109/TMC.2024.3503632. [DOI] [Google Scholar]
  • 16.Zhou W., Xia C., Wang T., Liang X., Lin W., Li X., Zhang S. HIDIM: A Novel Framework of Network Intrusion Detection for Hierarchical Dependency and Class Imbalance. Comput. Secur. 2025;148:104155. doi: 10.1016/j.cose.2024.104155. [DOI] [Google Scholar]
  • 17.Zeng Y., Zhang R., Zhang H., Qiao S., Huang F., Tian Q., Peng Y. GCCNet: A Novel Network Leveraging Gated Cross-Correlation for Multi-View Classification. IEEE Trans. Multimed. 2025;27:1086–1099. doi: 10.1109/TMM.2024.3521733. [DOI] [Google Scholar]
  • 18.Heo J.W., Ramachandran G.S., Dorri A., Jurdak R. Blockchain data storage optimisations: A comprehensive survey. ACM Comput. Surv. 2024;56:1–27. doi: 10.1145/3645104. [DOI] [Google Scholar]
  • 19.Rebello G.A.F., Camilo G.F., de Souza L.A.C., Potop-Butucaru M., de Amorim M.D., Campista M.E.M., Costa L.H.M. A survey on blockchain scalability: From hardware to layer-two protocols. IEEE Commun. Surv. Tutor. 2024;26:2411–2458. doi: 10.1109/COMST.2024.3376252. [DOI] [Google Scholar]
  • 20.Rani P., Sharma P., Gupta I. Toward a greener future: A survey on sustainable blockchain applications and impact. J. Environ. Manag. 2024;354:120273. doi: 10.1016/j.jenvman.2024.120273. [DOI] [PubMed] [Google Scholar]
  • 21.Ressi D., Romanello R., Piazza C., Rossi S. AI-enhanced blockchain technology: A review of advancements and opportunities. J. Netw. Comput. Appl. 2024;225:103858. doi: 10.1016/j.jnca.2024.103858. [DOI] [Google Scholar]
  • 22.Söğüt E., Tekerek A., Erdem O.A. Machine Learning-Based DDoS Attack Detection on SDN-Based SCADA Systems. Gazi MüHendislik Bilim. Derg. 2024;9:596–611. doi: 10.30855/gmbd.0705090. [DOI] [Google Scholar]
  • 23.Alotaibi J. A hybrid software-defined networking approach for enhancing IoT cybersecurity with deep learning and blockchain in smart cities. Peer-to-Peer Netw. Appl. 2025;18:123. doi: 10.1007/s12083-025-01935-8. [DOI] [Google Scholar]
  • 24.Xu G., Lei L., Mao Y., Li Z., Chen X., Zhang K. CBRFL: A Framework for Committee-Based Byzantine-Resilient Federated Learning. J. Netw. Comput. Appl. 2025;238:104165. doi: 10.1016/j.jnca.2025.104165. [DOI] [Google Scholar]
  • 25.Liu Z., Jiang G., Wu Y., Wang T., Liu S., Ouyang Z. K-Coverage Estimation for Irregular Targets in Wireless Visual Sensor Networks Deployed in Complex Region of Interest. IEEE Sens. J. 2025;25:18370–18383. doi: 10.1109/JSEN.2025.3558041. [DOI] [Google Scholar]
  • 26.Li T., Kouyoumdjieva S.T., Karlsson G., Hui P. Data collection and node counting by opportunistic communication; Proceedings of the 2019 IFIP Networking Conference (IFIP Networking); Warsaw, Poland. 20–22 May 2019; [DOI] [Google Scholar]
  • 27.Xiao Z., Li T., Cheng W., Wang D. Apollonius Circles Based Outbound Handover in Macro-Small Wireless Cellular Networks; Proceedings of the 2016 IEEE Global Communications Conference (GLOBECOM); Washington, DC, USA. 4–8 December 2016; [DOI] [Google Scholar]
  • 28.Liu B., Lv N., Guo Y., Li Y. Recent advances on federated learning: A systematic survey. Neurocomputing. 2024;597:128019. doi: 10.1016/j.neucom.2024.128019. [DOI] [Google Scholar]
  • 29.Wang X., Zhao Y., Huang Z. A Survey of Deep Transfer Learning in Automatic Modulation Classification. IEEE Trans. Cogn. Commun. Netw. 2025;11:1357–1381. doi: 10.1109/TCCN.2025.3558027. [DOI] [Google Scholar]
  • 30.Huang W., Ye M., Shi Z., Wan G., Li H., Du B., Yang Q. Federated learning for generalization, robustness, fairness: A survey and benchmark. IEEE TRansactions Pattern Anal. Mach. Intell. 2024;46:9387–9406. doi: 10.1109/TPAMI.2024.3418862. [DOI] [PubMed] [Google Scholar]
  • 31.Ali S., Li Q., Yousafzai A. Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: A survey. Ad Hoc Netw. 2024;152:103320. doi: 10.1016/j.adhoc.2023.103320. [DOI] [Google Scholar]
  • 32.Chen J., Yan H., Liu Z., Zhang M., Xiong H., Yu S. When federated learning meets privacy-preserving computation. ACM Comput. Surv. 2024;56:1–36. doi: 10.1145/3679013. [DOI] [Google Scholar]
  • 33.Manikumar S.L., Savitha K. Design and Implementation of Secure DataTransmission Using SDN and Advanced Cryptographic Techniques. Int. J. Adv. Netw. Appl. 2025;16:6670–6676. [Google Scholar]
  • 34.Alrashede H., Eassa F., Ali A.M., Albalwy F., Aljihani H. A Blockchain-Based Security Framework for East-West Interface of SDN. Electronics. 2024;13:3799. doi: 10.3390/electronics13193799. [DOI] [Google Scholar]
  • 35.Zhang J., Sui H., Sun X., Ge C., Zhou L., Susilo W. GrabPhisher: Phishing Scams Detection in Ethereum via Temporally Evolving GNNs. IEEE Trans. Serv. Comput. 2024;17:3727–3741. doi: 10.1109/TSC.2024.3411449. [DOI] [Google Scholar]
  • 36.Hsu M.H., Liu C.C. A Decentralized Framework for the Detection and Prevention of Distributed Denial of Service Attacks Using Federated Learning and Blockchain Technology. Eng. Proc. 2025;92:48. doi: 10.3390/engproc2025092048. [DOI] [Google Scholar]
  • 37.Shahraki A.S., Rudolph C., Alavizadeh H., Kayes A.S.M., Rahayu W., Tari Z. Securing cross-domain data access with decentralized attribute-based access control. Ad Hoc Netw. 2025;173:103807. doi: 10.1016/j.adhoc.2025.103807. [DOI] [Google Scholar]
  • 38.Derhab A., Guerroumi M., Belaoued M., Cheikhrouhou O. BMC-SDN: Blockchain-Based Multicontroller Architecture for Secure Software-Defined Networks. Wirel. Commun. Mob. Comput. 2021;2021:9984666. doi: 10.1155/2021/9984666. [DOI] [Google Scholar]
  • 39.Rahman A., Khan M.S.I., Montieri A., Islam M.J., Karim M.R., Hasan M., Kundu D., Nasir M.K., Pescapè A. BlockSD-5GNet: Enhancing security of 5G network through blockchain-SDN with ML-based bandwidth prediction. Trans. Emerg. Telecommun. Technol. 2024;35:e4965. doi: 10.1002/ett.4965. [DOI] [Google Scholar]
  • 40.Ajithraj R.A., Rajagopalan N. A method of preventing endpoint exploits in healthcare with block-chain token authorization implementation in SDN stack. AIP Conf. Proc. 2024;3031:020013. doi: 10.1063/5.0197755. [DOI] [Google Scholar]
  • 41.Bajpai N., Dhingra M., Chaurasia N. Advances in Artificial Intelligence and Machine Learning: Select Proceedings of ICAAAIML 2023, Volume 1. Volume 1264. Springer; Singapore: 2025. A Review on Internet of Things (IoT) Environment Using Software-Defined Networking (SDN) Based on Different; p. 471. [DOI] [Google Scholar]
  • 42.Indrason N., Saha G. Exploring Blockchain-driven security in SDN-based IoT networks. J. Netw. Comput. Appl. 2024;224:103838. doi: 10.1016/j.jnca.2024.103838. [DOI] [Google Scholar]
  • 43.Haritha K., Vellela S.S., Vuyyuru L.R., Malathi N., Dalavai L. Distributed Blockchain-SDN Models for Robust Data Security in Cloud-Integrated IoT Networks; Proceedings of the 2024 3rd International Conference on Automation, Computing and Renewable Systems (ICACRS); Pudukkottai, India. 4–6 December 2024; pp. 623–629. [DOI] [Google Scholar]
  • 44.Rahman A., Wadud M.A.H., Islam M.J., Kundu D., Bhuiyan T.A.U.H., Muhammad G., Ali Z. Internet of medical things and blockchain-enabled patient-centric agent through SDN for remote patient monitoring in 5G network. Sci. Rep. 2024;14:5297. doi: 10.1038/s41598-024-55662-w. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 45.Wijesekara P.A.D.S.N. Intrusion Detection Using Blockchain in Software-Defined Networking: A Literature Review. J. Eng. Sci. Technol. Rev. 2025;18:57–79. doi: 10.25103/jestr.181.07. [DOI] [Google Scholar]
  • 46.Ohri P., Daniel A., Guha Neogi S., Muttoo S.K. Blockchain-based security framework for mitigating network attacks in multi-SDN controller environment. Int. J. Inf. Technol. 2024:1–13. doi: 10.1007/s41870-024-01933-8. [DOI] [Google Scholar]
  • 47.Hakiri A., Sellami B., Ben Yahia S. Joint energy efficiency and network optimization for integrated blockchain-SDN-based internet of things networks. Future Gener. Comput. Syst. 2025;163:107519. doi: 10.1016/j.future.2024.107519. [DOI] [Google Scholar]
  • 48.Zhao D., Zhang D., Pei Q., Liu L., Yue P. Blockchain-Based Security Deployment and Resource Allocation in SDN-Enabled MEC System. IEEE Internet Things J. 2024;11:40417–40430. doi: 10.1109/JIOT.2024.3455425. [DOI] [Google Scholar]
  • 49.Okon A.A., Sallam K., Hossain M.F., Jagannath N., Jamalipour A., Munasinghe K.S. Enhancing Multi-Operator Network Handovers with Blockchain-Enabled SDN Architectures. IEEE Access. 2024;12:82848–82866. doi: 10.1109/ACCESS.2024.3411708. [DOI] [Google Scholar]
  • 50.Karakus M. GATE-BC: Genetic algorithm-powered QoS-aware cross-network traffic engineering in blockchain-enabled SDN. IEEE Access. 2024;12:36523–36545. doi: 10.1109/ACCESS.2024.3374213. [DOI] [Google Scholar]
  • 51.Mateus J., Lusilao Zodi G.A., Bagula A. Federated Learning-Based Solution for DDoS Detection in SDN; Proceedings of the 2024 International Conference on Computing, Networking and Communications (ICNC); Big Island, HI, USA. 19–22 February 2024; pp. 875–880. [Google Scholar]
  • 52.Ma J., Su W. Collaborative DDoS defense for SDN-based AIoT with autoencoder-enhanced federated learning. Inf. Fusion. 2025;117:102820. doi: 10.1016/j.inffus.2024.102820. [DOI] [Google Scholar]
  • 53.Mahmod A., Pace P., Iera A. SDN-Assisted Client Selection to Enhance the Quality of Federated Learning Processes; Proceedings of the 2024 IEEE Wireless Communications and Networking Conference (WCNC); Dubai, United Arab Emirates. 21–24 April 2024; pp. 1–6. [Google Scholar]
  • 54.Raza M., Saeed M., Riaz M., Sattar M. Federated learning for privacy preserving intrusion detection in software defined networks. IEEE Access. 2024;12:69551–69567. doi: 10.1109/ACCESS.2024.3395997. [DOI] [Google Scholar]
  • 55.Tran H.A., Tran D. FL4SDN: A Fast-Convergent Federated Learning for Distributed and Heterogeneous SDN. IEEE Intell. Syst. 2024;40:68–79. doi: 10.1109/MIS.2024.3453308. [DOI] [Google Scholar]
  • 56.Javaid M.U. InSDN Dataset 2020. 2023. [(accessed on 30 June 2025)]. Available online: https://www.kaggle.com/datasets/muhammadumarjavaid/insdn-dataset-2020.

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES