Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
A zero-trust digital twin framework for privacy-preserving multi-dataset intrusion detection in industrial IoT with lightweight blockchain auditing
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 31 March 2026

A zero-trust digital twin framework for privacy-preserving multi-dataset intrusion detection in industrial IoT with lightweight blockchain auditing

  • Shailendra Mishra1,
  • Tariq Saleh M. Aldafas2 &
  • Naif S. Alshammari3 

Scientific Reports , Article number:  (2026) Cite this article

  • 44 Accesses

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

Industrial IoT (IIoT) environments face growing cyber threats due to device heterogeneity and cyber-physical integration. This study proposes a Zero Trust-enhanced intrusion detection framework integrating deep learning anomaly detection, differential privacy, lightweight blockchain-inspired hash-chained ledger and Digital Twin-based situational awareness and visualization of device trust states, designed for low-latency inference suitable for near-real-time IIoT monitoring .A unified dataset was constructed by merging NSL-KDD, CICIDS-2017, and IoT-23 (2,513,419 raw samples unified to 143 features, balanced to 100,000 samples across Normal, DoS, Probe, R2L, U2R classes using SMOTE). Mutual information-based feature selection reduced features to 25. Optimized Multilayer Perceptron (MLP) and CNN–BiLSTM models achieved 89–91% accuracy and 0.89–0.91 macro F1-score, with near-perfect rare-attack detection (F1 ≈ 1.00 for R2L/U2R). Differential privacy (Laplace, ε = 25) reduced accuracy to ~ 78%, quantifying the privacy-utility trade-off. The decoupled Zero-Trust Manager dynamically updates trust scores based on prediction confidence, with tamper-evident SHA-256 hash-chained logging adding negligible latency (~ 1.04–1.06 s for 500 samples). This lightweight, centralized design offers strong cross-domain generalization and deployability for resource-constrained IIoT.

Data availability

To promote transparency and reproducibility, all datasets, source code, and experimental output logs used in this study have been deposited in an openly accessible repository. These materials can be accessed at: [https://zenodo.org/records/18207414]

References

  1. Ullah, Z., Al-Turjman, F., Mostarda, L. & Gagliardi, R. Applications of artificial intelligence and machine learning in smart cities. Comput. Commun. 154, 313–323 (2020).

    Google Scholar 

  2. Torkura, K. A., Sukmana, M. I., Cheng, F. & Meinel, C. Continuous auditing and threat detection in multi-cloud infrastructure. Comput. Secur. 102, 102124 (2021).

    Google Scholar 

  3. Fatema, K. et al. Federated XAI IDS: An explainable and safeguarding privacy approach to detect intrusion combining federated learning and SHAP. Future Internet. 17 (6), 234 (2025).

    Google Scholar 

  4. Neto, E. C. et al. CICIoT2023: A real-time dataset and benchmark for large-scale attacks in IoT environment. Sensors 23 (13), 5941 (2023).

    Google Scholar 

  5. Harbi, Y., Medani, K., Gherbi, C., Aliouat, Z. & Harous, S. Roadmap of adversarial machine learning in Internet of Things-enabled security systems. Sensors 24(16), 5150 (2024).

    Google Scholar 

  6. Paul, B. & Rao, M. Zero-trust model for smart manufacturing industry. Appl. Sci. 13 (1), 221 (2022).

    Google Scholar 

  7. Federici, F., Martintoni, D. & Senni, V. A zero-trust architecture for remote access in industrial IoT infrastructures. Electronics 12 (3), 566 (2023).

    Google Scholar 

  8. Laghari, A. A. et al. A novel and secure artificial intelligence enabled zero trust intrusion detection in industrial internet of things architecture. Sci. Rep. 15 (1), 26843 (2025).

    Google Scholar 

  9. Onwubiko, A., Singh, R., Awan, S., Pervez, Z. & Ramzan, N. Enabling trust and security in digital twin management: A blockchain-based approach with Ethereum and IPFS. Sensors 23(14), 6641 (2023).

    Google Scholar 

  10. Mishra, S. & Sharma, S. K. Advanced contribution of IoT in agricultural production for the development of smart livestock environments. Internet Things 22(1), 100724 (2023).

    Google Scholar 

  11. Zanasi, C., Russo, S. & Colajanni, M. Flexible zero trust architecture for the cybersecurity of industrial IoT infrastructures. Ad Hoc Netw. 156(1), 103414 (2024).

    Google Scholar 

  12. Lilhore, U. K. et al. SmartTrust: a hybrid deep learning framework for real-time threat detection in cloud environments using zero-trust architecture. J. Cloud Comput. 14(1), 35 (2025).

    Google Scholar 

  13. Ali, S., Li, Q. & Yousafzai, A. Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: A survey. Ad Hoc Netw. 152(1), 103320 (2024).

    Google Scholar 

  14. Huma, Z. E., Jan, S. U., Ahmad, J., Buchanan, W. & Pitropakis, N. Adversarial machine learning in IoT security: A comprehensive survey. ACM Comput. Surv. (2025).

  15. Benjamin Franklin, I., Paul Arokiadass Jerald, M. & Bhuvaneswari, R. Machine learning-based trust management in cloud using blockchain technology. SN Comput. Sci. 3 (6), 429 (2022).

    Google Scholar 

  16. .Hong, Y., Wu, J. & Morello, R. LLM-Twin: mini-giant model-driven beyond 5G digital twin networking framework with semantic secure communication and computation. Sci. Rep. 14 (1), 19065 (2024).

    Google Scholar 

  17. Siraparapu, S. R. & Azad, S. M. Securing the IoT landscape: A comprehensive review of secure systems in the digital era. e-Prime-Adv. Electr. Eng. Electron. Energy 10(1), 100798 (2024).

    Google Scholar 

  18. Chen, X., Feng, W., Ge, N. & Zhang, Y. Zero trust architecture for 6G security. IEEE Netw. 38 (4), 224–232 (2023).

    Google Scholar 

  19. Lv, F. et al. Asynchronous federated learning based zero trust architecture for the next generation industrial control systems. Comput. Netw. 20, 111459 (2025).

    Google Scholar 

  20. Prasad, K. S. et al. A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security. Sci. Rep. 15 (1), 2235 (2025).

    Google Scholar 

  21. Sarhan, M., Lo, W. W., Layeghy, S. & Portmann, M. HBFL: A hierarchical blockchain-based federated learning framework for collaborative IoT intrusion detection. Comput. Electr. Eng. 103, 108379 (2022).

    Google Scholar 

  22. Sundar, K., Sasikumar, S. & Jayakumar, C. Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud. Quantum Inf. Process. 21 (3), 115 (2022).

    Google Scholar 

  23. Javeed, D., Saeed, M. S., Adil, M., Kumar, P. & Jolfaei, A. A federated learning-based zero trust intrusion detection system for Internet of Things. Ad Hoc Netw. 162, 103540 (2024).

    Google Scholar 

  24. Puviarasu, A. & Sudha, V. K. Enhanced IoT security: privacy-preserving federated learning model for accurate, real-time intrusion detection across devices. Ain Shams Eng. J. 17 (1), 103866 (2026).

    Google Scholar 

  25. Nawshin, F., Unal, D., Hammoudeh, M. & Suganthan, P. N. AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks. Ad Hoc Netw. 161, 103523 (2024).

    Google Scholar 

  26. Jamiri, H. & Zyane, A. Adversarial attacks in IoT: A performance assessment of ML and DL models. Eng. Proc. 112(1), 14–15 (2025).

    Google Scholar 

  27. Sharafaldin, I., Lashkari, A. H. & Ghorbani, A. A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. Proc. Int. Conf. Inf. Syst. Secur. Priv. (ICISSP). 108–116 (accessed Sept 10 2025). https://doi.org/10.5220/0006639801080116 (2018).

  28. Tavallaee, M., Bagheri, E., Lu, W. & Ghorbani, A. A. accessed Sept. 10, NSL-KDD dataset, University of New Brunswick (2009). (accessed 10 Sept 2025). https://www.unb.ca/cic/datasets/nsl.html

  29. IoT. (accessed 10 Sept 2025). https://www.unb.ca/cic/datasets/iotdataset-2023.html (2023).

  30. Kathole, A. B. et al. Enhanced security mechanism in vehicular networks using ensemble machine learning to detect malicious activity in VANETs. J. Discrete Math. Sci. Cryptogr. 27(7), 2005–2014 (2024).

    Google Scholar 

  31. Kathole, A. B. et al. A novel approach to IoT security for intrusion detection system using ensemble network and heuristic-assisted feature fusion. J. Discrete Math. Sci. Cryptogr. 27(7), 2207–2217 (2024).

    Google Scholar 

  32. Kathole, A. B., Jadhav, D., Vhatkar, K. N., Swapnaja, A. & Gandhewar, N. Solar energy prediction in IoT system based on optimized complex-valued spatio-temporal graph convolutional neural network. Knowledge Based Syst. 304, 112400 (2024).

    Google Scholar 

  33. Kathole, A. B. et al. Secure federated cloud storage protection strategy using hybrid heuristic attribute-based encryption with permissioned blockchain. IEEE Access 12, 117154–117169 (2024).

    Google Scholar 

Download references

Acknowledgements

The authors extend their appreciation to the Deanship of Postgraduate Studies and Scientific Research at Majmaah University for funding this research work through the project number (R-2026-70).

Author information

Authors and Affiliations

  1. Department of Computer Engineering, College of Computer and Information Sciences, Majmaah University, 11952, Al Majmaah, Saudi Arabia

    Shailendra Mishra

  2. Department of Information Technology, College of Computer and Information Sciences, Majmaah University, 11952, Al Majmaah, Saudi Arabia

    Tariq Saleh M. Aldafas

  3. Department of Computer Science, College of Computer and Information Sciences, Majmaah University, 11952, Al Majmaah, Saudi Arabia

    Naif S. Alshammari

Authors
  1. Shailendra Mishra
    View author publications

    Search author on:PubMed Google Scholar

  2. Tariq Saleh M. Aldafas
    View author publications

    Search author on:PubMed Google Scholar

  3. Naif S. Alshammari
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Conceptualization: Shailendra Mishra (S.M). and Naif S. Alshammari (NA), methodology: NA TA, SM., software: Tariq Saleh M Aldafas (TA), validation: TA, S.M, NA; formal analysis: NA, SM, investigation, TA and S.M., resources, NA., data curation, TA writing-original draft preparation, TA, SMwriting-review and editing, N.A., visualization, TA, SM., supervision, NA and S.M., project administration, SMand NA., funding acquisition, NA.

Corresponding authors

Correspondence to Shailendra Mishra or Naif S. Alshammari.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mishra, S., Aldafas, T.S.M. & Alshammari, N.S. A zero-trust digital twin framework for privacy-preserving multi-dataset intrusion detection in industrial IoT with lightweight blockchain auditing. Sci Rep (2026). https://doi.org/10.1038/s41598-026-42041-w

Download citation

  • Received: 16 January 2026

  • Accepted: 24 February 2026

  • Published: 31 March 2026

  • DOI: https://doi.org/10.1038/s41598-026-42041-w

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Industrial internet of things
  • Intrusion detection system
  • Zero trust architecture
  • Differential privacy
  • Lightweight blockchain
  • Digital twin
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com footer links

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics