Next Article in Journal
Federated Multi-Agent DRL for Task Offloading in Vehicular Edge Computing
Previous Article in Journal
Optimizing Robotic Disassembly-Assembly Line Balancing with Directional Switching Time via an Improved Q(λ) Algorithm in IoT-Enabled Smart Manufacturing
Previous Article in Special Issue
Review of Fuzzy Methods Application in IIoT Security—Challenges and Perspectives
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Federated Learning for Surveillance Systems: A Literature Review and AHP Expert-Based Evaluation

1
Department of Digital Military Science and Technology, Kangwon National University, Chuncheon 24341, Republic of Korea
2
Defense Computing Information Agency, Seoul 04383, Republic of Korea
3
Department of Computer Engineering, Sejong University, Seoul 05006, Republic of Korea
4
Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, Republic of Korea
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(17), 3500; https://doi.org/10.3390/electronics14173500
Submission received: 21 July 2025 / Revised: 24 August 2025 / Accepted: 30 August 2025 / Published: 1 September 2025

Abstract

This study explores the application of federated learning (FL) in security camera surveillance systems to overcome the structural limitations inherent in traditional centralized artificial intelligence (AI) training approaches, while simultaneously enhancing operational efficiency and data security. Conventional centralized AI models require the transmission of raw surveillance data from individual security camera units to a central server for model training, which poses significant challenges, including network congestion, a heightened risk of personal data leakage, and inadequate adaptation to localized environmental characteristics. These limitations are particularly critical in high-security environments such as military bases and government facilities, where reliability and real-time processing are paramount. In contrast, FL enables decentralized training by retaining data on local devices and sharing only model parameters with a central aggregator, thereby improving privacy preservation, reducing communication overhead, and facilitating adaptive, context-aware learning. This paper does not present a new federated learning algorithm or original experiment. Instead, it synthesizes existing research findings and applies the Analytic Hierarchy Process (AHP) to evaluate and prioritize critical factors for deploying FL in surveillance systems. By combining literature-based evidence with structured expert judgment, this study provides practical guidelines for real-world application. This paper identifies four key performance metrics—detection accuracy, false alarm rate, response time, and network load—and conducts a comparative analysis of FL and centralized AI-based approaches in the recent literature. In addition, the AHP is employed to evaluate expert survey data, quantitatively prioritizing eight critical factors for effective FL implementation. The results highlight detection accuracy and data security as the most significant concerns, indicating that FL presents a promising solution for future smart surveillance infrastructures. This research contributes to the advancement of AI-powered surveillance systems that are both high-performing and resilient under stringent privacy and operational constraints.

1. Introduction

In contemporary society, security camera systems are utilized as core security measures for crime prevention and anomaly detection across diverse spaces including public places, military facilities, border areas, and private buildings. As security threats such as terrorism, intrusion, and abnormal behavior detection become increasingly sophisticated, the role of security camera-based surveillance has become even more critical, with emphasis being placed on constructing intelligent surveillance systems that go beyond simple recording-centered monitoring. Recently, the demand for the automation of such surveillance and perimeter security functions has increased dramatically, and consequently, artificial intelligence (AI) technology capable of analyzing large volumes of video data in real-time has been gaining attention [1,2,3]. Particularly, intelligent surveillance technologies capable of high-level analysis, such as object detection, human abnormal behavior recognition, and facial recognition, have emerged as key elements in national security and social safety network construction [4].
However, the existing centralized AI learning approaches contain numerous technical limitations. First, the structure of transmitting large-scale video data collected from individual security camera equipment to central servers for learning inevitably involves data movement, which increases the possibility of personal information leakage or sensitive information exposure during this process. Particularly in highly sensitive locations such as military facilities, hospitals, and schools, privacy protection issues can act as very serious constraint factors [5]. Second, in the process of transmitting real-time data from numerous security camera equipment, network load and transmission delays occur, which impair the system’s real-time analysis capability and response speed [6]. Third, while data collected from various environments contains regional characteristics and context, centralized learning inevitably generates generalized models that have difficulty reflecting these regional characteristics, which can lead to degraded detection performance in actual operational environments [7].
Federated learning (FL) has recently emerged as an alternative technology to overcome these problems. Federated learning operates by training AI models within local terminals without transmitting data externally from each security camera equipment or local node, then transmitting only the weights of the trained models to a central server for integration. In this approach, data is safely stored within the equipment, and since raw data is not leaked externally, it is very advantageous for personal information protection [8]. Additionally, as each equipment learns models individually, customized learning reflecting regional characteristics is possible, and the effects of communication cost reduction and transmission delay minimization can also be expected. From the security aspect, risks of accidents such as server hacking or data leakage can be reduced, and it can facilitate future transitions to reliable, distributed AI structures [9].
Under this background, this study aims to comprehensively analyze the technical and structural advantages that federated learning-based AI models can provide compared to existing centralized learning approaches in security camera surveillance and perimeter security environments. Rather than merely comparing performance metrics, this research conducts an integrated review of factors that must be considered in the actual deployment and operational aspects of surveillance systems, presenting the potential of federated learning across various dimensions including performance (accuracy), efficiency (resource utilization), security (privacy and information protection), and scalability (system application scope). To achieve this objective, this paper first systematically organizes the theoretical differences and technical architectures between conventional AI learning and federated learning, and examines the practical superiority of federated learning through an analysis of previously published research and actual field application cases.
In particular, to derive the core elements necessary for establishing federated learning systems, it is essential to consider that the environments where surveillance systems are deployed are extremely diverse and complex. Since each installation environment exhibits different characteristics in terms of network infrastructure, hardware performance, data characteristics, and security requirements, it is difficult to sufficiently identify the comprehensive core elements required for federated learning system construction based solely on experimental results from specific environments. Therefore, comprehensively collecting opinions from relevant experts who possess diverse field experience and specialized knowledge to derive core elements represents a more practical and effective approach.
From this perspective, this study conducts an Analytic Hierarchy Process (AHP) analysis targeting expert groups to derive the most critical consideration factors and their priorities when designing federated learning-based security camera systems. The core elements derived through the AHP analysis are expected to serve as important guidelines for effectively applying federated learning in various surveillance security environments, minimizing technical risks that may arise during system design and implementation processes, and providing practical guidelines for successful deployment.
Unlike studies that propose new FL algorithms or optimization techniques, the contribution of this work lies in synthesizing validated experimental evidence from the prior literature and translating it into a structured framework for real-world surveillance system design. By integrating these findings with an AHP-based expert evaluation, this study bridges the gap between academic research outcomes and practical decision-making in security-sensitive environments.
The primary contribution of this paper is the application of the AHP to systematically prioritize key factors for federated learning implementation in high-security surveillance environments. While the literature review consolidates findings from prior studies, it mainly serves as a contextual basis to inform and support the expert-driven AHP evaluation. This distinguishes our work from survey-oriented studies, positioning the AHP results as the central focus of the paper.
It is important to note that this study is not intended to propose or experimentally validate a new FL algorithm. Rather, it is designed to integrate validated results from the existing literature with expert-based AHP analysis, thereby producing systematic design guidelines for FL implementation in high-security surveillance environments.

2. Theoretical Background

This chapter examines the transition from traditional security camera systems to intelligent surveillance systems. It analyzes the structural characteristics of existing centralized AI learning approaches and their limitations in large-scale video data transmission, security, and real-time processing, and reviews the concepts and technical structures of federated learning technology to address these issues. Additionally, it explores the technical challenges that arise when implementing federated learning, such as data imbalance, computational performance, communication synchronization, and security threats, and comprehensively investigates the applicability of federated learning in security camera surveillance environments and the expected effects in terms of performance, security, and communication efficiency.

2.1. Development of Intelligent Security Camera Surveillance System

Traditional security camera systems were limited to simply storing video information and requiring direct human monitoring, but with the rapid advancement of artificial intelligence technology, the transition to intelligent surveillance systems is occurring rapidly. This transition means evolving beyond simple recording functions to systems equipped with the capability to analyze large-scale video collected in real-time, automatically identify dangerous situations, and provide warnings. Recently, video analysis technologies integrating various functions such as object recognition, human behavior analysis, facial recognition, license plate tracking, and abnormal behavior detection have been applied, and these systems are playing key roles in areas such as crime prevention, military base security, urban safety, and access control. In particular, these systems are developing from passive surveillance to active and situation-responsive surveillance, with emphasis being placed on the function of recognizing risk factors in real-time and alerting administrators.
As security cameras are required to have the capability to collect video in real-time and immediately analyze it to respond to situations, sophisticated analysis algorithms and powerful learning models are essential. However, since there are many technical and structural constraints in implementing such functions through the existing methods, new approaches to AI learning are required. Since federated learning enables dynamic object detection in surveillance videos, it is possible to enhance real-time threat response and privacy protection by learning models on edge devices without centralizing data [10]. Furthermore, using federated dynamic graph neural networks in distributed surveillance systems enables effective object tracking and privacy protection by aggregating structural and dynamic information without storing data centrally [11].

2.2. Structure and Limitations of Existing AI Learning Method

The existing centralized artificial intelligence learning method involves collecting data from multiple devices, transmitting it to a central server, and then training models based on that data. This approach has the advantage of being able to reflect the statistical characteristics of the entire dataset by learning models based on integrated data.
However, in large-scale distributed environments such as security cameras, several limitations arise. First, video data generated from security cameras has the characteristics of high resolution and large capacity, so continuous data transmission excessively occupies network bandwidth, which causes communication bottlenecks throughout the system and makes real-time analysis difficult. Second, the process of transmitting data collected from sensitive locations such as military facilities or hospitals to external servers can pose security threats and has a high possibility of violating related laws such as personal information protection laws. Third, because precise modeling considering various situations and conditions in physically distributed environments is difficult, a single model learned on a central server may have reduced detection accuracy for specific regions or situations.
These problems become causes that reduce the effectiveness of security camera surveillance systems and emphasize the necessity of more flexible and secure learning methods. Furthermore, the existing centralized learning methods face serious problems, such as privacy protection issues and high data transmission costs, and these problems can be mitigated through the distributed approach of federated learning [4]. Centralized systems often suffer from data heterogeneity and communication overhead, and federated learning can address these issues by supporting local model learning and aggregation [12].
While centralized AI learning provides a useful performance benchmark, it faces fundamental challenges in security-sensitive environments. First, aggregating sensitive surveillance data into a central repository increases the risks of data leakage. Second, centralized training incurs substantial communication overhead when transferring large datasets across constrained or isolated networks. Third, its ability to handle heterogeneous (Non-IID) data sources is limited compared to FL. These limitations reduce the feasibility of centralized approaches in practical deployment scenarios.

2.3. Concept and Technical Structure of Federated Learning

Federated learning is a distributed machine learning approach where model training is performed autonomously on the devices where data is generated, and only the weights or parameters of the trained models are transmitted to the server for integration. Federated learning operates in a manner that ensures data privacy and complies with regulations such as the GDPR (General Data Protection Regulation) by training models locally on devices and aggregating updates to form a global model [13]. This consists of a structure where the data itself remains on local devices, while the central server collects parameters to update the global model. This approach enables collaborative learning without data movement and provides significant advantages especially in environments where privacy protection is important [14]. For example, federated learning dramatically improves privacy protection and security by maintaining raw data within devices without transmitting it externally, and can reduce waste of communication resources. Additionally, since learning occurs on each local device, customized learning reflecting regional characteristics is possible, which consequently leads to improved surveillance accuracy.
The main techniques of federated learning include model compression, asynchronous updates, and robust aggregation, which enhance the scalability and efficiency of various applications [13]. Federated learning continuously improves the global model through the process of periodically integrating models at the server, and algorithms such as FedAvg and FedProx are used in this process. This approach enables collaborative learning even between devices with various data distributions, significantly enhancing the learning efficiency and reliability of the entire system. Furthermore, it can strengthen the distributedness and scalability of the entire system by reducing dependence on the central server. Table 1 compares the general AI learning methods and federated learning in terms of data transmission, security, real-time performance, network dependency, operational adaptability, and energy efficiency.

2.4. Technical Challenges of Federated Learning

Although federated learning has various advantages, there are numerous technical challenges that must be addressed in the actual implementation process. First, because the amount and characteristics of the data existing in each device differ, learning data imbalance problems can occur, which can affect the convergence and accuracy of the entire model. Second, when the computational performance of local devices is limited, model learning may not be performed properly or learning time may increase excessively. Particularly, security camera equipment often does not have dedicated GPUs or high-performance CPUs, so processing speed can be significantly limited depending on model complexity. Third, when various devices communicate asynchronously or connections are unstable, problems with learning cycle adjustment and parameter synchronization occur. In this case, the learning results from some devices may have negative effects on overall model performance, and the learning of the entire system may be delayed when communication interruptions or errors occur. Fourth, there are also security threats where malicious participants can disrupt the entire model by transmitting manipulated parameters. This is a new form of cyber threat that shows how federated learning can be exposed to external attacks, becoming an important consideration especially in defense and public security environments.
To solve these problems, communication efficiency, model aggregation, and data heterogeneity must be considered in federated learning algorithms, and optimized protocols and robust algorithms are needed to ensure effective learning [12,15]. Additionally, security issues such as potential attacks on aggregated parameters require advanced defense mechanisms and secure aggregation techniques for privacy protection [11,16]. While federated learning provides significant advantages in terms of privacy protection and efficiency, it also presents issues such as ensuring fairness in model training and addressing ethical considerations. As federated learning continues to develop and integrate into various areas including security camera surveillance systems, the need for robust privacy protection guarantees and scalable solutions remains important [13,17].

2.5. Expected Effects of Federated Learning in Security Camera Surveillance Environments

Security camera surveillance environments have numerous cameras that are physically distributed, and each location has distinct regional characteristics with different illumination, angles, backgrounds, and purposes of use. In such environments, learning methods that can adapt to each regional situation are required rather than a single integrated model, and federated learning can effectively realize this [18]. By having each security camera equipment perform learning autonomously, learning results that reflect the characteristics of that region can be obtained, and by integrating these at the server, a robust and adaptive surveillance system is constructed overall. Particularly in places where security is crucial, such as military facilities, access control zones, and airports, it is very useful in that AI-based real-time analysis is possible without transmitting video data externally.
Additionally, because video data is not transmitted externally, high-level security can be maintained, and the network load is also minimized [19]. This enables efficient operation even in various network environments and enhances reliability in that local equipment can maintain functions independently even if failures occur in the central server. Thus, when federated learning is applied to security camera-based intelligent surveillance systems, it provides balanced solutions in terms of performance, security, and communication efficiency, and has great potential for utilization in defense and public safety fields in the future [9,20]. Furthermore, from policy and institutional perspectives, it is consistent with personal information protection and AI utilization guidelines, so validity can be secured in both institutional compatibility and practical applicability aspects.
Recent works such as those of Casalicchio et al. [21], who developed FLWB for benchmarking FL algorithms, and Liu et al. [22], who proposed a personalized FL framework for person re-identification, demonstrate the breadth of FL research. While these studies provide concrete experimental results, our work diverges by focusing on decision-making considerations via AHP analysis rather than algorithmic benchmarking. Unlike algorithmic studies that experimentally benchmark different FL approaches, this paper focuses on deriving evaluation criteria through expert-based AHP analysis. Therefore, direct performance comparisons with state-of-the-art FL methods were not conducted. Instead, we aim to complement such works by providing a structured decision-support framework for applying FL in sensitive operational contexts.
In prior work, fog computing was adopted to enhance real-time video stream analytics in urban surveillance systems [23]. While this approach improved latency and distributed processing, it did not address critical issues of data privacy and collaborative learning across distributed nodes. Our framework, in contrast, applies federated learning to prioritize decision factors in high-security surveillance environments.
Recent research has also applied federated learning for security enhancement in UAV swarms [24]. By leveraging FedAvg and SHAP analysis, the study demonstrated collaborative learning with explainable decision-making in dynamic and distributed environments. While this work focuses on UAV networks, our study extends the discussion to surveillance systems and complements such approaches by systematically identifying critical factors for FL adoption through AHP analysis.

3. Federated Learning-Based Security Camera Detection Performance Analysis

The purpose of this chapter is to quantitatively analyze the performance advantages that federated learning provides in security camera surveillance systems compared to existing centralized AI learning methods, and to evaluate practical applicability. While the existing studies have focused on demonstrating the general superiority of federated learning, this study aims to deeply explore practical performance in the specific application environment of security camera surveillance systems. In particular, we evaluate the practical contribution of federated learning based on four key performance indicators: detection accuracy, false positive rate reduction, network transmission volume, and response time, and through this, we aim to verify its applicability in actual operating environments.

3.1. Analysis Target and Method

This chapter aims to conduct a more in-depth and systematic analysis of the performance advantages that federated learning can provide in security camera surveillance systems compared to existing centralized AI learning approaches. The technical superiority and efficiency of federated learning have already been sufficiently demonstrated through various domestic and international papers and research results. Therefore, this study does not focus on simply reconfirming the general superiority of federated learning, but rather emphasizes the significance of analyzing its applicability and practical performance specifically in security camera surveillance systems based on four key elements: detection accuracy, false positive rate reduction, network transmission volume, and response time.
Furthermore, this analysis considers detailed aspects such as the types of federated learning algorithms applied in each study, learning cycles, communication optimization methods, and data imbalance handling techniques, while empirically examining the limitations of centralized learning and the solutions provided by federated learning. Beyond simple numerical comparisons, this study contemplates the experimental conditions, constraints, and limitations identified by the researchers in each study, linking these to the realistic contribution potential of federated learning-based security camera systems.
Particularly, this research plans to conduct an Analytic Hierarchy Process analysis targeting expert groups in subsequent studies, based on the core components of federated learning derived through a literature review, to determine the priority of factors that should be most importantly considered when applying federated learning in security camera surveillance environments. Through this integrated approach, policy and technical implications will be derived together, serving as materials that can contribute to future research, surveillance system design, and technology standardization efforts.
It should be noted that the performance analysis in this chapter is based on previously published experimental studies rather than original experiments conducted by the authors. This approach was intentionally adopted to ensure that the subsequent AHP analysis is grounded in validated empirical findings, thereby avoiding redundancy while strengthening practical applicability.

3.2. Analysis of the Existing Experimental Research (Literature-Based)

This section systematically organizes the achievements of the existing research where federated learning was applied to security camera surveillance systems, focusing on four key performance factors: detection accuracy, false positive rate reduction, network transmission volume, and response time. This analysis does not merely list key numerical values, but comprehensively considers various factors such as the background of each study, experimental design, data characteristics, network environment, equipment performance, algorithm settings, communication methods, and data imbalance handling methods from multiple perspectives. This analysis is based on international prestigious academic journals and public institution technical reports, and explores more deeply how the advantages of federated learning contributed to actual security camera surveillance environments. For this purpose, we reviewed the experimental conditions, application environments, and major achievements of each study together, and approached them from a comprehensive and critical perspective that included limitations raised during the experimental process and improvement measures. This approach goes beyond a simple comparison and becomes the foundation for evaluating the practical value of federated learning in the design and policy application of security camera surveillance systems.
However, this result was achieved on a controlled dataset with limited complexity, and it remains uncertain whether similar accuracy can be obtained in heterogeneous real-world surveillance environments. Although the integration of FL and LLM achieved promising accuracy, the high computational overhead raises concerns regarding deployment on resource-constrained edge devices. In summary, while federated learning consistently outperforms centralized approaches across diverse studies, most works rely on small-scale datasets, idealized synchronization assumptions, or simplified scenarios. The challenges of non-IID data, client computational overhead, and real-world scalability remain underexplored. These limitations highlight the necessity of our AHP-based analysis, which incorporates expert judgment to prioritize critical factors beyond what the existing experimental results alone can demonstrate.

3.2.1. Detection Accuracy

Federated learning is a distributed learning method where each edge node in security camera surveillance systems learns models with local data and transmits only parameters to the central server to update the global model. It provides the advantage of ensuring data privacy without transmitting sensitive video data while improving detection performance by utilizing diverse learning data.
In particular, the FL-TENB4 architecture is a representative case that implements real-time deepfake detection in security camera environments by fusing the lightweight EfficientNetB4-Lite model with TinyML technology. This system achieves high detection accuracy while maintaining low latency even on edge devices with limited computational resources, showing performance suitable for security camera environments that require real-time video analysis [25].
Federated learning has demonstrated excellent performance in various security camera detection tasks. Table 2 shows the results of comparing the performance of various federated learning methods in Client 5 and Client 7 environments [26]. In the field of violence detection, the proposed model that combines Personalized Federated Learning (PFL) algorithms with YOLO-ResNet50 fusion models achieved the highest accuracy (98.70%, 98.73%) and precision (98.69%, 98.73%) in both client environments, showing superior performance compared to the other methods of existing models. Figure 1 shows the change in model accuracy according to communication rounds. The black dotted line represents validation accuracy (Val_Acc), and the orange dotted line represents training accuracy (Train_Acc). As can be seen from the graph, both accuracies gradually improve as communication rounds progress and finally converge to a high performance of over 90%. This suggests that consistent performance can be maintained despite data heterogeneity or environmental diversity [26,27,28].
The superiority of FL-based approaches has also been verified in general object detection tasks. A study applying an FL-based YOLOv8n model to human detection tasks recorded 33.9% improved consistency and 74.8% detection accuracy compared to traditional centralized learning methods [29]. These results demonstrate that FL is a practical solution that can improve the scalability and operational efficiency of security camera systems while meeting privacy protection requirements. Furthermore, FL-based security camera systems are reported to maintain robust performance even under complex conditions in actual urban environments or various weather conditions, making them highly evaluated for real-world deployment possibilities.

3.2.2. False Positive Rate Reduction

Federated learning is a machine learning paradigm that can train models in distributed environments while ensuring data privacy, and is particularly attracting attention as an effective method for reducing false positive rates. According to recent studies, FL has been proven to significantly reduce false positive rates compared to the existing centralized models in various security fields such as network intrusion detection, smart grids, and IoT security [26,27,28,29]. When FL was applied to network-based intrusion detection systems, model updates from distributed clients were performed reliably, showing results of reducing false positive rates by up to 13%, and it was shown that high accuracy could be continuously maintained even in real-time data environments [30,31].
FL frameworks that incorporate advanced techniques such as Graph Neural Networks or Hierarchical Aggregation are achieving even more outstanding performance improvements. In malicious client detection systems, they showed results of completely eliminating false positive rates to 0%, and in model poisoning attack defense systems, they significantly reduced false positive rates to 6.4% [32,33].
In the case of FL-based security threat detection systems operating in large-scale distributed environments, as shown in Table 3, they achieved the dual effect of reducing false positive rates and false negative rates by 1.8% and 2.4%, respectively, while completely ensuring data privacy [34]. The Federated learning + LLM (large language models) model achieved the best performance with 96.4% accuracy and a low false positive rate of 2.9%. This is superior results compared to the basic federated learning model (94.1% accuracy, 3.5% false positive rate) and multimodal LLM model (93.2% accuracy, 3.9% false positive rate). In particular, it shows that the approach combining federated learning and LLM can effectively reduce false positive rates while increasing threat detection accuracy. These results clearly demonstrate that federated learning is a powerful solution that effectively reduces false positive rates even in various attack scenarios and data heterogeneity (non-IID) environments, bringing substantial security performance improvements [30,32,33,34].

3.2.3. Network Transmission Volume

Federated learning is a distributed machine learning paradigm that allows multiple distributed client devices to collaboratively learn global models without transmitting raw data to a central server. However, the repetitive model parameter exchanges that occur in each round during this learning process cause a significant network transmission volume, which particularly leads to serious communication bottlenecks in large-scale deep learning models. Various efficiency techniques are being researched to solve this communication overhead problem. The main approach is client selection techniques, which is a method of selecting only clients that can provide meaningful updates from all clients to participate in communication [35]. Table 4 shows the impact of initial client numbers (N = 10, N = 20, N = 50) on communication rates for three different client selection methods (Adaptive-OU, Ignore, Zero). The Adaptive-OU method achieved the highest communication rate under all initial client number conditions (46.60%), which is similar to the Zero method (47.30%). On the other hand, the Ignore method showed relatively low communication rates (46.02~48.93%). Additionally, Figure 2 shows the round-by-round performance changes of three communication strategies OU (Ornstein–Uhlenbeck), Zero, and Ignore under four different threshold conditions (Threshold = 0.02, 0.03, 0.04, 0.05). Under all threshold conditions, they show a pattern of a high communication volume in the initial rounds that gradually decreases as learning progresses. In particular, as the threshold increases (0.05), the communication volume decreases more rapidly, confirming that efficient communication is achieved, and the OU strategy shows an overall stable convergence pattern.
Moreover, methods have been proposed to reduce transmission volume by decreasing the number of bits of the model parameters transmitted through parameter quantization techniques [36], and methods for selectively transmitting only some of the entire layers of the model through selective layer transmission techniques have also been proposed [37,38]. These techniques have been experimentally verified to reduce network traffic by 30–70% while maintaining model accuracy.
In edge computing environments, more sophisticated communication optimization strategies are required. Data and model parallelization techniques distribute communication load by partitioning the learning process across multiple dimensions, and client clustering techniques group clients with similar data distributions to reduce unnecessary global communication [39,40]. Additionally, update filtering techniques can effectively reduce the number of communications by excluding minor parameter changes below a threshold from transmission.
Furthermore, parameter structural characteristic utilization techniques analyze the sparsity and redundancy of neural network parameters to preemptively remove updates that are not substantially important [41]. Recently, beyond the traditional federated averaging (FedAvg) algorithm, particle swarm optimization (PSO)-based aggregation algorithms have been proposed [42]. This approach dramatically reduces communication volume by transmitting only optimized score values instead of large parameter vectors, and has been reported to simultaneously improve both communication efficiency and model accuracy, particularly in unstable network environments.
The various communication efficiency approaches described above contribute to significantly reducing the network transmission load of federated learning systems while minimizing the performance degradation of the learned models, playing a crucial role in building practical federated learning systems.

3.2.4. Response Time

Federated learning is a distributed machine learning technique that enables collaborative model training among distributed clients without sharing raw data, effectively ensuring data privacy. However, federated learning systems inherently involve iterative communication processes between clients and servers, and the resulting communication latency and computational resource constraints of each client become major bottleneck factors causing degradation in the overall system’s response time.
This latency problem is particularly severe in Internet of Things (IoT) environments. Recent research has proposed integrated approaches to address this issue. Specifically, an FL client architecture has been developed that combines local control mechanisms with transfer learning and differential privacy [43]. Figure 3 consists of two subplots and compares the latency performance of various algorithms according to data size. The left graph shows latency according to the data size of each sample, while the right graph represents latency according to the data size of the global model. The comparison algorithms include two proposed algorithms (indicated by red and blue lines with ζ = 10 and ζ = 50), the all-sensor selection method (green line), the random sensor selection method (purple line), and the fixed pruning method (fixed pruning rate 0.1, black line). According to the experimental results, it can be confirmed that the proposed algorithms maintain relatively lower latency than other methods as the data size increases, with particularly superior performance under the ζ = 10 condition. The method of selecting all sensors shows the pattern of most rapidly increasing latency as the data size increases [43].
This integrated system has been experimentally verified to reduce the response time for user authentication and control message transmission to less than 1 s while effectively solving the learning performance degradation problem caused by limited local data through transfer learning.
For performance improvement of federated learning, device selection algorithms, model parameter quantization, and wireless resource allocation techniques can be integrally applied to improve the convergence speed of FL systems by up to 87% [44,45]. Furthermore, through advanced optimization techniques such as asynchronous federated learning, hyperparameter optimization, model partitioning, and hierarchical neural architecture search, the learning completion time can be reduced by 30~70% or more even in resource-constrained environments, while simultaneously improving model personalization performance and system response time [46,47,48,49]. These research achievements demonstrate that federated learning can be practically utilized even in application areas where real-time services or low-latency requirements are critical.

3.3. Performance Comparison

This section provides a comprehensive comparison of performance between federated learning-based security camera surveillance systems and existing centralized learning systems across key indicators. The major performance factors include detection accuracy, false positive rate, network transmission volume, and response time, with the existing research results reinterpreted under standardized conditions.
First, regarding detection accuracy, federated learning-based systems maintain an accuracy of over 98% and demonstrate performance that is 3–5% higher on average than centralized learning due to local learning effects that reflect regional characteristics. The accuracy advantage of federated learning becomes particularly pronounced as the number of clients increases. Second, the false positive rate of federated learning is up to 13% points lower than centralized learning through the provision of customized models and the introduction of hierarchical aggregation techniques. This is interpreted as a result of effectively overcoming data imbalance and heterogeneity. Third, in terms of network transmission volume, when the optimization techniques of federated learning such as parameter quantization and selective layer transmission are applied, communication volume reduction effects of up to 70% are observed. This signifies that communication resource consumption is significantly lower compared to centralized learning. Fourth, regarding response time, federated learning demonstrates competitiveness in low-latency applications thanks to its distributed architecture and communication optimization. Experimental figures report authentication and control message response times of less than 1 s and learning convergence speed improvements of up to 87%. Table 5 summarizes the comprehensive comparison results for each performance indicator.
Table 5 demonstrates a comparison of performance trends between federated learning and centralized AI learning, based on the findings reported in prior studies. The values reflect typical ranges observed in the literature rather than standardized or directly averaged results. It should be noted that the values in Table 5 are extracted from different studies, each with distinct datasets and experimental environments. Rather than standardizing the raw results across heterogeneous conditions, we present them here as representative examples to illustrate the general trend consistently observed in the literature: FL-based systems outperform centralized AI in terms of accuracy, false positives, communication efficiency, and latency.

3.4. Discussion: Analysis of Practical Effects of Federated Learning

Federated learning has enabled not only a change in learning methodology but also substantial performance improvements and structural innovation in security camera surveillance systems. First, in security camera surveillance environments with distinct regional characteristics, federated learning has simultaneously enhanced detection accuracy and security by generating region-specific surveillance models through local data-based learning. Second, in terms of communication efficiency, federated learning has overcome the bottleneck phenomena of conventional centralized systems through techniques such as data non-transmission architecture, selective client updates, and parameter optimization, enabling stable operation even in diverse network environments. Third, federated learning has been effective in privacy protection and detection, and defense against malicious parameter attacks from a security perspective. Robustness against cyber threats has been secured through the refinement of aggregation algorithms and the application of anomaly detection techniques. Finally, the practical effects of federated learning extend beyond simple performance metric improvements to strengthen the legitimacy of AI-based surveillance system adoption from policy and institutional perspectives, contributing to securing scalability and sustainability. Future research requires empirical data-based validation in actual operational environments and the establishment of standardized models.
While the numerical results originate from heterogeneous studies, their collective implication is consistent: FL provides structural and performance advantages across diverse environments. Our intention is not to claim universal benchmarks but to highlight this repeated directional superiority as the basis for our subsequent AHP prioritization.

4. AHP-Based Analysis of Key Elements for Effective Federated Learning

This chapter conducts an AHP analysis to derive key elements that influence performance improvement in federated learning-based security camera surveillance systems. First, we present the system configuration diagram of the proposed federated learning-based security camera surveillance system, followed by a detailed explanation of the AHP analysis methodology. We design a hierarchical structure consisting of eight evaluation elements including detection accuracy, security, and false positive rate reduction, and conduct pairwise comparison surveys targeting expert groups to quantify the relative importance of each element. Finally, based on the analysis results, we derive the priority ranking of key elements and present practical implications.
In this study, the AHP was adopted instead of other Multi-Criteria Decision-Making (MCDM) methods such as TOPSIS (Technique for Order Performance by Similarity to Ideal Solution). The primary objective of our research was not to select one ‘optimal’ alternative system but rather to identify and prioritize the relative importance of evaluation criteria when introducing federated learning. The AHP is particularly well suited for this purpose, as it allows structured pairwise comparisons and consistency checks among expert judgments, which directly yield priority weights for criteria. In contrast, TOPSIS is more appropriate when a set of alternative systems exists and must be ranked based on their relative closeness to an ideal solution. Since the focus of this work was to derive the weighting of key factors, rather than to rank or select alternatives, the AHP was considered the most appropriate approach.
Several studies have applied the AHP or MCDM to optimize surveillance camera placement [50,51], or to evaluate intrusion detection systems [52]. These studies, however, focus on spatial optimization or detection algorithms, whereas our study emphasizes the adoption of federated learning in surveillance networks. Unlike prior AHP/MCDM applications in surveillance system design, our work provides a structured decision-support framework specifically for federated learning adoption, thereby offering a novel perspective in the literature.

4.1. System Configuration of Federated Learning-Based Security Camera Surveillance System

The system configuration diagram of the federated learning-based security camera surveillance system proposed in this paper presents a practical implementation structure for simultaneously achieving object detection performance improvement and privacy protection in distributed environments. The presented configuration diagram is designed based on algorithm structures and security techniques verified in the existing federated learning literature and systematized in a form applicable to security camera networks. Federated learning is a method that performs model training without transmitting data externally from each local device, then it delivers only the learned parameters (weights) to the central server for aggregation to improve the overall model. This approach has particular advantages in security camera surveillance environments, including minimizing privacy exposure, reducing network load, and enabling customized model learning that reflects regional characteristics.
In the proposed configuration diagram (Figure 4), multiple nodes such as security camera Nodes A, B, and C collect video data in the field, train object detection models in local environments, and then extract and transmit only the parameters of those models. This provides a foundation for safely utilizing real-time data, and since the video itself remains only locally, it is advantageous from a privacy protection perspective. The central security node receives parameters transmitted from each node and aggregates them through the FedAvg (Federated Averaging) algorithm. This algorithm updates the overall model by calculating the average of the learned weights, enabling simple yet statistically stable learning. Subsequently, the integrated AI server operated at the command center generates the final integrated model based on the aggregated model, during which the Krum algorithm [53] is applied to remove parameters from anomalous nodes. Krum is a filtering technique with Byzantine fault tolerance characteristics that mitigates the problem of overall model quality degradation due to unreliable nodes. Additionally, the integrated server prevents a reverse inference of node-specific learning information through Differential Privacy (DP) techniques and strengthens the privacy protection level of the entire system [54]. This can be considered an essential security function when considering the characteristics of security camera systems operated in sensitive areas (military facilities, hospitals, airports, etc.).
This configuration diagram represents a structure that satisfies security, real-time performance, and high-performance model training for video-based object detection, while simultaneously, effectively overcoming the limitations of existing centralized AI learning methods (privacy exposure, network bottlenecks, lack of regional reflection, etc.). Therefore, the proposed system architecture has value as a practical case demonstrating the feasibility of real-world application of federated learning technology.

4.2. AHP Overview and Analysis Methodology

This section provides a detailed explanation of the analytical procedure applying the Analytic Hierarchy Process to derive key factors that influence performance improvement in federated learning-based security camera surveillance systems. The AHP is a multi-criteria decision-making technique that systematizes complex decision-making problems into hierarchical structures and quantifies expert judgments to derive relative importance (weights) among factors, and has been widely utilized in various engineering, policy, and industrial fields [55].
Federated learning systems are affected by various technical and operational variables such as network environment, data sensitivity, and node heterogeneity. While existing studies have emphasized individual factors such as detection accuracy, privacy protection, and communication efficiency, a quantitative analysis of the relative importance of these factors is necessary in complex federated learning environments. Therefore, this study aims to derive the key influencing factors necessary to demonstrate that federated learning is structurally superior in performance compared to existing AI learning through expert judgment-based AHP analysis.

4.2.1. AHP Map Construction

The first step of AHP is to design a hierarchical structure appropriate for the analysis purpose (Figure 5). In this study, we constructed a hierarchy centered on eight evaluation factors for improving the performance of federated learning-based security camera surveillance systems. Table 6 provides descriptions of the AHP evaluation factors.
  • Goal (Level 1): Derivation of key factors for performance improvement.
  • Criteria (Level 2): ① Detection accuracy, ② False positive rate reduction, ③ Response time, ④ Network efficiency, ⑤ Security, ⑥ Sustainability, ⑦ Scalability, ⑧ Resource efficiency.
These factors were derived based on literature-based prior research and the federated learning system design diagram of this study, with each factor reflecting the technical advantages that federated learning has over existing centralized AI learning. The eight factors derived in this study are configured to enable a balanced evaluation of the performance of federated learning-based security camera surveillance systems across various dimensions including accuracy, sensitivity, real-time performance, efficiency, security, operational sustainability, and scalability. Each factor operates complementarily without overlapping with others, providing sufficient criteria for judging the overall quality of federated learning. Additionally, these factors are evaluated to have high practical applicability as they reflect the problems and challenges faced in actual security camera system operations. Therefore, the AHP analysis framework of this study can function as a scientific and structural decision-making tool capable of quantitatively deriving the technical feasibility and strategic priorities of federated learning implementation.

4.2.2. Construction of Pairwise Comparison Matrix

To determine the relative importance of each factor, AHP conducts pairwise comparison surveys targeting expert groups. The survey was structured to have each expert evaluate the relative importance of eight factors in combinations of two, totaling 28 items, using a 1~5 scale. When there are n experts, each pairwise comparison result is integrated through geometric mean, and the result forms an 8 × 8 pairwise comparison matrix A = a i j . Here, a i j represents how many times the more important factor i is compared to factor j, and the matrix satisfies the following properties:
  • a i i = 1 : Comparison with itself is always 1.
  • a j i = 1 / a j i : Symmetry principle.
A = 1 a 12 a 18 1 / a 12 1 a 28 1 / a 18 1 / a 28 1
This matrix systematically represents the pairwise comparison results from expert responses and serves as the foundation for subsequent calculations.

4.2.3. Matrix Normalization and Weight Vector Derivation

After calculating the sum of each column S j = i = 1 n a i j , a normalized matrix N = n i j is generated by dividing each element by the sum of its respective column.
n i j = a i j S j
Next, the weight vector w = w i is derived by calculating the average of each row. This represents the relative importance of each factor, and the total sum equals one.
w = 1 n j = 1 n n i j
The weight vector is used to quantify the contribution of each factor in the final decision-making process. After calculating λ through the product of the pairwise comparison matrix and the weight vector, the maximum eigenvalue is calculated using the following equation:
λ m a x = 1 n i = 1 n A w i w i
This value is necessary for quantifying the consistency of expert judgments.

4.2.4. Calculation of Consistency Index (CI) and Consistency Ratio (CR)

Based on λ m a x , the Consistency Index (CI) is calculated as follows:
C I = λ m a x n n 1
Next, the Consistency Ratio (CR) is calculated for comparison with a random matrix:
C R = C I R I
Here, RI is the Random Index, and, as shown in Table 7, when n = 8, RI = 1.41 is applied. If CR < 0.1, the judgment is considered consistent.
The final weights represent the importance of each factor and are directly utilized in security camera surveillance system design, technology investment, and policy formulation. The CI and CR values serve as evidence supporting the reliability of the analysis results, and the results are included as essential data in system design reports and policy proposals.

4.2.5. AHP Expert Response Integration Method

In the process of applying AHP analysis for an optimal design of federated learning-based security camera surveillance systems, pairwise comparison survey responses are collected from multiple experts. To combine these into a single integrated pairwise comparison matrix, the arithmetic mean method and geometric mean method are representatively used as methods for calculating representative values. These two methods differ in their combination approach and theoretical appropriateness, and can be selectively utilized depending on the analysis purpose.
The arithmetic mean method generates an integrated pairwise comparison matrix by calculating the simple average of the expert response values for each pairwise comparison item. Expressed as a formula, it is as follows:
A i j * = 1 N r = 1 N A i j r
where
  • A i j * : an element ( i , j ) of the integrated pairwise comparison matrix;
  • A i j r : a comparison value ( i , j ) from the r -th expert;
  • N : the number of experts.
This method has the advantage of being simple and intuitive in calculation, reflecting a simple average perspective of expert responses. However, since AHP pairwise comparison values have multiplicative meanings as ratio scales, the arithmetic mean method has the limitation of being theoretically somewhat inappropriate.
The geometric mean method generates an integrated pairwise comparison matrix by calculating the geometric mean of the expert response values for each pairwise comparison item. It is expressed as the following formula:
A i j * = r = 1 N A i j r 1 N
Here, the symbols are the same as in the arithmetic mean method. The geometric mean method aligns with the theoretical foundation of the AHP, where pairwise comparison values have multiplicative relationships as ratio scales, and it also contributes to stabilizing the consistency index of the analysis results. Additionally, it has the effect of relatively mitigating the influence of extreme values, enabling stable results even when there are large response differences among experts.
When integrating expert responses in an AHP analysis, the geometric mean method is theoretically more appropriate than the arithmetic mean method and is also recommended in international standard AHP application cases. Therefore, this study performed response integration using the geometric mean method.

4.3. Expert Response Collection and Analysis Results

This study applied the Analytic Hierarchy Process to identify key factors for performance improvement in federated learning-based security camera surveillance systems and to quantify relative importance among these factors. For this purpose, structured pairwise comparison surveys were conducted targeting experts in related fields, and hierarchical analysis procedures were performed based on these results.

4.3.1. Overview of Expert Response Collection

Survey responses for AHP analysis were collected from a total of 15 experts. The panel included researchers and practitioners from academia, defense research institutes, and industry. Their fields of expertise covered AI algorithm design (five experts), video surveillance and computer vision (four experts), cybersecurity and data privacy (three experts), and defense/military surveillance operations (three experts). All participants had more than 10 years of professional experience, and several currently serve as professors, senior researchers, or system architects. Experts were selected based on their direct involvement in federated learning, AI-based surveillance, or high-security monitoring systems. To preserve anonymity, only aggregated information is reported. To ensure the expertise and validity of survey responses, the following criteria were applied:
  • Personnel with practical experience in security camera systems, perimeter surveillance, and related fields;
  • Individuals with academic knowledge related to federated learning AI algorithms;
  • Personnel with both types of experience.
The survey was provided in an online pairwise comparison format, and each expert was requested to evaluate the importance of all possible pairwise comparisons (28 pairs total) among eight major evaluation factors using a 1~5 scale. Additionally, to ensure response consistency, a survey platform designed to automatically calculate the consistency index and consistency ratio during response was used.

4.3.2. Response Integration and Consistency Result

The pairwise comparison matrices derived from individual expert responses were first integrated using the Geometric Mean Aggregation method. Relative importance vectors (weights) were calculated through eigenvectors from the aggregated group average matrix. For the 8 × 8 pairwise comparison matrix constructed by collecting expert response data, after normalizing each matrix and calculating weight vectors, the maximum eigenvalue λ m a x was obtained as 8.014. The CI was calculated as 0.002 using the following formula:
C I = λ m a x n n 1 = 8.014 8 8 1 = 0.014 7 0.002
The random index was set to 1.41 based on the eight-factor criteria according to Table 7. Using CI (0.002) and RI (1.41), CR was calculated as 0.001 using the following formula:
C R = C I R I = 0.002 1.41 0.001
Figure 6 represents the comprehensive AHP analysis results for evaluating key factors in federated learning-based security camera surveillance systems. The 8 × 8 normalized pairwise comparison matrix was constructed through geometric mean aggregation of expert responses, with each element representing the relative importance weights derived from the hierarchical analysis process.
The resulting CR of the derived matrix was 0.001, which satisfies the CR < 0.1 criterion. Such a low value indicates that expert judgments were highly consistent, likely due to the shared professional background and domain-specific expertise of the panel. While this increases confidence in the internal consistency of the results, it may also reflect a limited variability in perspectives. Therefore, the findings should be interpreted as reflecting a strong expert consensus rather than diverse, potentially conflicting opinions. In particular, λ m a x was derived at a level slightly exceeding eight, which theoretically represents perfect consistency, and the corresponding CI value also showed relatively low figures, suggesting that experts made relatively logical and consistent judgments regarding the relative importance among individual items.
Additionally, although minor deviations were observed in some expert responses during the analysis process, the reliability of the overall system analysis was secured by constructing a stable pairwise comparison matrix based on majority opinion through the average combination method (geometric mean application). In the future, consistency could be further improved by increasing the number of survey respondents to perform repeated measurements or by identifying respondents with large deviations in advance and requesting re-surveys.

4.3.3. AHP Analysis Results

The final weight vector quantifies the relative importance of each evaluation factor contributing to performance improvement in federated learning-based security camera surveillance systems. The AHP analysis results yielded the following importance ranking (Table 8 and Figure 7):
The analysis results reveal that detection accuracy emerged as the most critical factor, indicating that it serves as a key indicator for assessing the high-level object identification and anomaly detection that federated learning can achieve in actual surveillance environments compared to existing AI learning methods. Subsequently, false positive rate reduction and security occupied high importance levels, demonstrating that the structural characteristics of federated learning—reducing unnecessary alarms and preventing original data from being leaked externally—are highly valued in security-sensitive environments. Conversely, scalability and resource efficiency showed relatively lower weights, indicating that structural and operational factors were somewhat deprioritized compared to technical factors that directly impact system performance.

4.4. Key Factor Derivation and Priority Analysis

This AHP analysis quantifies the knowledge and judgment of expert groups, providing practical design priorities for performance improvement in federated learning-based security camera surveillance systems. Particularly for agencies and practitioners seeking to introduce AI-based surveillance technology in high-risk areas, national defense, and critical infrastructure, the following strategic implications can be presented:
  • For performance optimization, initial deployment should focus on designing algorithms and system structures centered on detection accuracy (false positive rate reduction) and security.
  • Resource efficiency and network efficiency can be important considerations in hardware-constrained environments, with the possibility of increased relative importance particularly in edge device-based operating environments.
  • Scalability and sustainability can be emphasized primarily during long-term operation and expansion phases rather than initial deployment.
The diversity and expertise of the 15-member expert panel enhance the validity of the AHP results, ensuring that the derived priorities reflect both technical and operational perspectives relevant to real-world deployment. The extremely low CR value (0.001) demonstrates a strong alignment of expert opinions. However, it also highlights a limitation: the relatively homogeneous expertise of the panel may have reduced diversity in judgment. Future studies could expand the expert pool to include more varied backgrounds to test the robustness of these priorities.
In conclusion, the AHP results of this study present empirical design criteria that consider the balance between functional performance and security requirements in federated learning technology adoption. These findings are expected to serve as valuable reference materials for future policy formulation, system design, and operational strategy development.

5. Conclusions

This study confirmed through theoretical analysis and empirical comparison that introducing federated learning to security camera surveillance and perimeter systems can provide various advantages in terms of privacy protection, communication efficiency, security, and regional specialized modeling compared to existing centralized artificial intelligence learning approaches. Centralized AI requires moving data collected from numerous security camera equipment to servers, which causes problems such as privacy violations, network delays, and increased communication costs, and these limitations become even more pronounced in actual environments. In contrast, federated learning has a structure where learning occurs individually while data remains within local devices, and only the learned weights are transmitted to the center, making it possible to fundamentally reduce the risk of data leakage while enabling efficient AI learning.
Based on prior research and performance experiment results, federated learning-based security camera object detection systems showed competitive results in terms of learning speed, transmission efficiency, and scalability along with better detection accuracy compared to existing methods. Particularly in surveillance environments where various environments and conditions coexist, it was confirmed that the distributed learning structure provided by federated learning can be a more practical solution. Furthermore, this study conducted an Analytic Hierarchy Process analysis targeting expert groups to identify key factors for an effective introduction of federated learning. The analysis results showed that security assurance, communication resource reduction, local processing performance for reflecting regional characteristics, and system scalability had high importance, which can be utilized as criteria to consider when designing federated learning systems in the future. Therefore, rather than focusing on the performance advantages of a specific algorithm, this paper contributes by providing guidance on what should be prioritized at the policy, technical, and operational levels when adopting federated learning.
In conclusion, this study presented that federated learning is a powerful and realistic alternative that can replace existing artificial intelligence learning structures in security camera surveillance environments, and proposed directions for expanding its application scope through empirical application and technological advancement in actual environments in the future.

Author Contributions

Conceptualization, Y.S., H.K., J.J., and D.S.; funding acquisition, D.S.; methodology, Y.S. and H.K.; design of FL-based Security Camera Surveillance System, Y.S.; supervision, D.S.; validation, Y.S. and H.K.; writing—original draft, Y.S. and H.K.; writing—review and editing, D.S. and J.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the Culture, Sports, and Tourism R&D Program through the Korea Creative Content Agency grant funded by the Ministry of Culture, Sports, and Tourism in 2025 (Project Name: Training Global Talent for Copyright Protection and Management of On-Device AI Models, Project Number: RS-2025-02221620).

Institutional Review Board Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author(s).

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AHPAnalytic Hierarchy Process
AIArtificial Intelligence
CIConsistency Index
CPUCentral Processing Unit
CRConsistency Ratio
DPDifferential Privacy
FedAvgFederated Averaging
FLFederated Learning
FL-TENB4Federated-Learning-Enhanced Tiny EfficientNetB4-Lite
GDPRGeneral Data Protection Regulation
GPUGraphics Processing Unit
IIDIndependent and Identically Distributed
LLMLarge Language Model
MCDMMulti-Criteria Decision-Making
MLMachine Learning
OUOrnstein–Uhlenbeck
PFLPersonalized Federated Learning
PSOParticle Swarm Optimization
RIRandom Index
TOPSISTechnique for Order Performance by Similarity to Ideal Solution
YOLOYou Only Look Once

References

  1. Cabanillas-Carbonell, M.; Rivera, J.S.; Muñoz, J.S. Artificial intelligence in video surveillance systems for suspicious activity detection and incident response: A systematic review. Adv. Sci. Technol. Res. J. 2025, 19, 389. [Google Scholar] [CrossRef]
  2. Sudharsan, S.; Sakthi Anand, A.; Shanmugaraj, K.; Palani Samy, K.C. Deep Learning-Based Intelligent Video Surveillance System for Real-Time Motion Detection. Int. Sci. J. Eng. Manag. 2024, 3, 1–10. [Google Scholar] [CrossRef]
  3. Dansana, D.; Joshi, A.; Bhoi, T.K.; D, A.K.; Prasa, V.K. AI-Powered Surveillance. In Sustainable Materials, Structures and IoT; CRC Press: Boca Raton, FL, USA, 2024; Volume 186. [Google Scholar]
  4. Lazaros, K.; Koumadorakis, D.E.; Vrahatis, A.G.; Kotsiantis, S. Federated Learning: Navigating the Landscape of Collaborative Intelligence. Electronics 2024, 13, 4744. [Google Scholar] [CrossRef]
  5. Costin, A. Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations. In Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, Vienna, Austria, 28 October 2016; pp. 45–54. [Google Scholar] [CrossRef]
  6. Jeon, H.; Kim, H.; Kim, D.; Kim, J. PASS-CCTV: Proactive Anomaly surveillance system for CCTV footage analysis in adverse environmental conditions. Expert Syst. Appl. 2024, 254, 124391. [Google Scholar] [CrossRef]
  7. Liu, W.; Miller, P.; Ma, J.; Yan, W.Q. Challenges of Distributed Intelligent Surveillance System with Heterogeneous Information. 2009. Available online: https://www.academia.edu/download/77927237/download.pdf#page=73 (accessed on 20 July 2025).
  8. Shi, L. A survey on federated learning: Evolution, applications and challenges. Appl. Comput. Eng. 2023, 22, 106–111. [Google Scholar] [CrossRef]
  9. Shanmugam, L.; Tillu, R.; Tomar, M. Federated Learning Architecture: Design, Implementation, and Challenges in Distributed AI Systems. J. Knowl. Learn. Sci. Technol. 2023, 2, 371–384. [Google Scholar] [CrossRef]
  10. Jayakanth, J.J. Dynamic Object Detection in Surveillance Videos using Temporal Convolutional Networks and Federated Learning in Edge Computing Environments. J. Electr. Syst. 2024, 20, 2009–2015. [Google Scholar] [CrossRef]
  11. Jiang, M.; Jung, T.; Karl, R.; Zhao, T. Federated Dynamic Graph Neural Networks with Secure Aggregation for Video-based Distributed Surveillance. ACM Trans. Intell. Syst. Technol. 2022, 13, 1–23. [Google Scholar] [CrossRef]
  12. Bhomia, Y.; Kaur, P.; Mishra, N. Challenges and opportunities in federated learning: A theoretical examination. Int. J. Appl. Res. 2018, 4, 311–315. [Google Scholar] [CrossRef]
  13. Nowell, E.; Gallus, S. Advancing Privacy-Preserving AI: A Survey on Federated Learning and Its Applications. Preprints 2025. [Google Scholar] [CrossRef]
  14. Zhang, Z.; Liu, J.; Xi, Z.; Huang, T.; Han, Q.; Liu, J.; Liu, H. On the Federated Learning Framework for Cooperative Perception. arXiv 2024, arXiv:2404.17147. [Google Scholar] [CrossRef]
  15. Katyayani, M.; Keshamoni, K.; Sree, A.; Murthy, R.C.; Rani, K.U.; Reddy, S.; Alapati, Y.K. Federated Learning: Advancements, Applications, and Future Directions for Collaborative Machine Learning in Distributed Environments. J. Electr. Syst. 2024, 20, 165–171. [Google Scholar] [CrossRef]
  16. Benmalek, M.; Benrekia, M.A.; Challal, Y. Security of Federated Learning: Attacks, Defensive Mechanisms, and Challenges. Rev. d’Intelligence Artif. 2022, 36, 49. [Google Scholar] [CrossRef]
  17. Aggarwal, M.; Khullar, V.; Goyal, N. A comprehensive review of federated learning: Methods, applications, and challenges in privacy-preserving collaborative model training. In Applied Data Science and Smart Systems; CRC Press: Boca Raton, FL, USA, 2024; p. 570. [Google Scholar]
  18. Anagnostopoulos, C.; Gkillas, A.; Mavrokefalidis, C.; Pikoulis, E.; Piperigkos, N.; Lalos, A.S. Multimodal Federated Learning in AIoT Systems: Existing Solutions, Applications, and Challenges. IEEE Access 2024, 12, 180864. [Google Scholar] [CrossRef]
  19. Aishwarya, M.; Chandra, J.; Ali, M.; Bharathi, M.; Srinivas, T.A.S. Secure and Scalable AI: Insights into Federated Learning Algorithms and Platforms. J. Commun. Eng. VLSI Des. 2024, 2, 15. [Google Scholar] [CrossRef]
  20. Thakre, N.; Pateriya, N.; Anjum, G.; Tiwari, D.; Mishra, A. Federated Learning Trade-Offs: A Systematic Review of Privacy Protection and Performance Optimization. Int. J. Innov. Res. Comput. Commun. Eng. 2023, 11, 11332. [Google Scholar] [CrossRef]
  21. Casalicchio, E.; Esposito, S.; Al-Saedi, A.A. FLWB: A workbench platform for performance evaluation of federated learning algorithms. In Proceedings of the 2023 IEEE International Workshop on Technologies for Defense and Security (TechDefense), Rome, Italy, 20–22 November 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 401–405. [Google Scholar]
  22. Liu, J.; Zhuang, W.; Liu, Y.; Wen, Y.; Huang, J.; Lin, W. Personalized Federated Mutual Learning for Unsupervised Camera-Aware Person Re-Identification. ACM Trans. Multimed. Comput. Commun. Appl. 2025, 20, 1–19. [Google Scholar] [CrossRef]
  23. Chen, N.; Chen, Y.; You, Y.; Ling, H.; Liang, P.; Zimmermann, R. Dynamic urban surveillance video stream processing using fog computing. In Proceedings of the 2016 IEEE Second International Conference on Multimedia Big Data (BigMM), Taipei, Taiwan, 20–22 April 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 105–112. [Google Scholar]
  24. Sudhakara, S.H.; Haghnegahdar, L. Security Enhancement in UAV Swarms: A Case Study Using Federated Learning and SHAP Analysis. IEEE Open J. Intell. Transp. Syst. 2025, 6, 335–345. [Google Scholar] [CrossRef]
  25. Ha, J.; Azzaoui, A.E.; Park, J.H. FL-TENB4: A Federated-Learning-Enhanced Tiny EfficientNetB4-Lite Approach for Deepfake Detection in CCTV Environments. Sensors 2025, 25, 788. [Google Scholar] [CrossRef]
  26. Gautam, V.; Maheshwari, H.; Tiwari, R.; Agarwal, A.K.; Trivedi, N.K. Federated Learning Empowered Violence Recognition in CCTV Footage: A YOLO and ResNet-50 Fusion Approach. In Proceedings of the 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), Bengaluru, India, 4–6 January 2024; p. 1. [Google Scholar] [CrossRef]
  27. Kassir, M.; Haidar, S.; Yaacoub, A. Exploring Personalized Federated Learning Architectures for Violence Detection in Surveillance Videos. arXiv 2025, arXiv:2504.00857. [Google Scholar] [CrossRef]
  28. Pajon, Q.; Serre, S.; Wissocq, H.; Rabaud, L.; Haidar, S.; Yaacoub, A. Balancing Accuracy and Training Time in Federated Learning for Violence Detection in Surveillance Videos: A Study of Neural Network Architectures. J. Comput. Sci. Technol. 2024, 39, 1029–1039. [Google Scholar] [CrossRef]
  29. Ismael, S.; Waref, D.; Salem, M.A.-M. Federated Learning for Robust People Detection in Decentralized Surveillance Systems. In Proceedings of the 2024 International Conference on Microelectronics (ICM), Doha, Qatar, 14–17 December 2024; pp. 1–6. [Google Scholar] [CrossRef]
  30. dos Santos, R.R.; Viegas, E.K.; Santin, A.O.; Tedeschi, P. Federated learning for reliable model updates in network-based intrusion detection. Comput. Secur. 2023, 133, 103413. [Google Scholar] [CrossRef]
  31. Suresh, A.; Dwarakanath, B.; Nanda, A.K.; Santhosh Kumar, P.; Sankar, S.; Cheerla, S. An evolutionary Computation-Based federated learning for host intrusion detection in Real-Time traffic analysis. Wirel. Pers. Commun. 2024, 1–27. [Google Scholar] [CrossRef]
  32. Yan, G.; Wang, H.; Yuan, X.; Li, J. FedRoLA: Robust Federated Learning Against Model Poisoning via Layer-based Aggregation. In Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Barcelona, Spain, 25–29 August 2024. [Google Scholar] [CrossRef]
  33. Zhang, X.; Liu, Q.; Ba, Z.; Hong, Y.; Zheng, T.; Lin, F.; Lu, L.; Ren, K. FLTracer: Accurate Poisoning Attack Provenance in Federated Learning. IEEE Trans. Inf. Forensics Secur. 2023, 19, 9534–9549. [Google Scholar] [CrossRef]
  34. Wang, Y.; Yang, X. Design and implementation of a distributed security threat detection system integrating federated learning and multimodal LLM. arXiv 2025, arXiv:2502.17763. [Google Scholar] [CrossRef]
  35. Ribero, M.; Vikalo, H. Reducing communication in federated learning via efficient client sampling. Pattern Recognit. 2023, 148, 110122. [Google Scholar] [CrossRef]
  36. Chen, M.; Shlezinger, N.; Poor, H.V.; Eldar, Y.C.; Cui, S. Communication-efficient federated learning. Proc. Natl. Acad. Sci. USA 2021, 118, e2024789118. [Google Scholar] [CrossRef]
  37. Zhang, W.; Zhou, T.; Lu, Q.; Yuan, Y.; Tolba, A.; Said, W. FedSL: A Communication-Efficient Federated Learning With Split Layer Aggregation. IEEE Internet Things J. 2024, 11, 15587–15601. [Google Scholar] [CrossRef]
  38. Liu, J.; Zeng, Q.; Xu, H.; Xu, Y.; Wang, Z.; Huang, H. Adaptive Block-Wise Regularization and Knowledge Distillation for Enhancing Federated Learning. IEEE/ACM Trans. Netw. 2024, 32, 791–805. [Google Scholar] [CrossRef]
  39. Liao, Y.; Xu, Y.; Xu, H.; Yao, Z.; Wang, L.; Qiao, C. Accelerating Federated Learning with Data and Model Parallelism in Edge Computing. IEEE/ACM Trans. Netw. 2024, 32, 904–918. [Google Scholar] [CrossRef]
  40. Wang, T.; Liu, Y.; Zheng, X.; Dai, H.; Jia, W.; Xie, M. Edge-Based Communication Optimization for Distributed Federated Learning. IEEE Trans. Netw. Sci. Eng. 2021, 9, 2015–2024. [Google Scholar] [CrossRef]
  41. Wu, X.; Yao, X.; Wang, C. FedSCR: Structure-Based Communication Reduction for Federated Learning. IEEE Trans. Parallel Distrib. Syst. 2021, 32, 1565–1577. [Google Scholar] [CrossRef]
  42. Park, S.; Suh, Y.; Lee, J. FedPSO: Federated Learning Using Particle Swarm Optimization to Reduce Communication Costs. Sensors 2021, 21, 600. [Google Scholar] [CrossRef] [PubMed]
  43. Ren, J.; Ni, W.; Tian, H.; Nie, G. Convergence Analysis and Latency Minimization for Semi-Federated Learning in Massive IoT Networks. IEEE Trans. Green Commun. Netw. 2023, 8, 413–426. [Google Scholar] [CrossRef]
  44. Alhartomi, M.A.; Salh, A.; Audah, L.; Alzahrani, S.; Alzahmi, A.; Altimania, M.R.; Alotaibi, A.; Alsulami, R.; Al-Hartomy, O.A. Sustainable Resource Allocation and Reduce Latency Based on Federated-Learning-Enabled Digital Twin in IoT Devices. Sensors 2023, 23, 7262. [Google Scholar] [CrossRef]
  45. Zhang, X.; Liu, W.; Ren, J.; Xing, H.; Gui, G.; Shen, Y.; Cui, S. Latency Minimization for UAV-Enabled Federated Learning: Trajectory Design and Resource Allocation. IEEE Internet Things J. 2024, 12, 27097–27112. [Google Scholar] [CrossRef]
  46. Gao, W.; Zhao, Z.; Min, G.; Ni, Q.; Jiang, Y. Resource Allocation for Latency-Aware Federated Learning in Industrial Internet of Things. IEEE Trans. Ind. Inform. 2021, 17, 8505–8513. [Google Scholar] [CrossRef]
  47. Hou, W.; Wen, H.; Zhang, N.; Lei, W.; Lin, H.; Han, Z.; Liu, Q. Adaptive Training and Aggregation for Federated Learning in Multi-Tier Computing Networks. IEEE Trans. Mob. Comput. 2024, 23, 4376–4388. [Google Scholar] [CrossRef]
  48. Wu, Q.; He, K.; Chen, X. Personalized Federated Learning for Intelligent IoT Applications: A Cloud-Edge Based Framework. IEEE Open J. Comput. Soc. 2020, 1, 35–44. [Google Scholar] [CrossRef]
  49. Yin, T.; Li, L.; Lin, W.; Ni, T.; Liu, Y.; Xu, H.; Han, Z. Joint Client Scheduling and Wireless Resource Allocation for Heterogeneous Federated Edge Learning with Non-IID Data. IEEE Trans. Veh. Technol. 2024, 73, 5742–5754. [Google Scholar] [CrossRef]
  50. Çarman, F.; Tuncer Şakar, C. An MCDM-integrated maximum coverage approach for positioning of military surveillance systems. J. Oper. Res. Soc. 2019, 70, 162–176. [Google Scholar] [CrossRef]
  51. Wu, H.; Zeng, Q.; Guo, C.; Zhao, T.; Chen, C.W. Target-Aware Camera Placement for Large-Scale Video Surveillance. IEEE Trans. Circuits Syst. Video Technol. 2024, 34, 13338–13348. [Google Scholar] [CrossRef]
  52. Tarafdar, A.; Sheikh, A.; Majumder, P.; Baidya, A.; Majumder, A.; Bhattacharyya, B.K.; Bera, U.K. Enhancing intrusion detection using wireless sensor networks: A novel ahpmadm aggregated multiple type 3 fuzzy logic-based k-barriers prediction system. Peer-Peer Netw. Appl. 2024, 17, 1732–1749. [Google Scholar] [CrossRef]
  53. Blanchard, P.; El Mhamdi, E.M.; Guerraoui, R.; Stainer, J. Machine learning with adversaries: Byzantine tolerant gradient descent. Adv. Neural Inf. Process. Syst. 2017, 30, 118–128. [Google Scholar]
  54. Geyer, R.C.; Klein, T.; Nabi, M. Differentially private federated learning: A client level perspective. arXiv 2017, arXiv:1712.07557. [Google Scholar]
  55. Saaty, T.L. The Analytic Hierarchy Process; McGraw-Hill: Columbus, OH, USA, 1980. [Google Scholar]
Figure 1. Proposed composite model performance. Adapted with permission from Ref. [26]. Copyright 2025, IEEE.
Figure 1. Proposed composite model performance. Adapted with permission from Ref. [26]. Copyright 2025, IEEE.
Electronics 14 03500 g001
Figure 2. Per round communication of FedAvg with the communication strategy. Adapted with permission from Ref. [35]. Copyright 2023, ELSEVIER.
Figure 2. Per round communication of FedAvg with the communication strategy. Adapted with permission from Ref. [35]. Copyright 2023, ELSEVIER.
Electronics 14 03500 g002
Figure 3. Latency vs. data size of each sample and global model. Adapted with permission from Ref. [43]. Copyright 2023, IEEE.
Figure 3. Latency vs. data size of each sample and global model. Adapted with permission from Ref. [43]. Copyright 2023, IEEE.
Electronics 14 03500 g003
Figure 4. Configuration of FL-based security camera surveillance system.
Figure 4. Configuration of FL-based security camera surveillance system.
Electronics 14 03500 g004
Figure 5. AHP Map.
Figure 5. AHP Map.
Electronics 14 03500 g005
Figure 6. AHP expert opinion analysis and results.
Figure 6. AHP expert opinion analysis and results.
Electronics 14 03500 g006
Figure 7. Priority considerations for efficient federated learning implementation.
Figure 7. Priority considerations for efficient federated learning implementation.
Electronics 14 03500 g007
Table 1. Comparison of conventional AI vs. federated learning.
Table 1. Comparison of conventional AI vs. federated learning.
CategoryConventional AI LearningFederated Learning
Data TransmissionEntire surveillance videoParameters AI model
SecurityHigh leak riskLow leak risk
(No transmission of Raw data)
Real-time CapabilityTransmission delayLow delay due to on-site train
Network DependenceNeeds stable networkWorks with unstable networks
Operational AdaptabilityDependent on
Centralized system
Autonomous to the field
Energy EfficiencyLowHigh
Table 2. Comparative analysis with Client 5 and Client 7. Adapted with permission from Ref. [26]. Copyright 2025, IEEE.
Table 2. Comparative analysis with Client 5 and Client 7. Adapted with permission from Ref. [26]. Copyright 2025, IEEE.
Client = 5Client = 7
MethodAccuracyPrecisionAccuracyPrecision
Proposed98.7098.6998.7398.73
Xception95.1295.0095.3495.32
RestNet93.2693.2593.6293.63
ShuffleNet96.5696.3396.7396.20
RestNet5094.6094.5694.7294.72
MobileNet95.4295.3295.4395.42
Table 3. Performance comparison of different models in threat detection. Adapted with permission from Ref. [34]. Copyright 2025, arXiv.
Table 3. Performance comparison of different models in threat detection. Adapted with permission from Ref. [34]. Copyright 2025, arXiv.
Model TypeAccuracy (%)False Positive Rate (%)
Federated learning model94.13.5
Federated learning + LLM96.42.9
Multimodal LLM model93.23.9
Table 4. Communication rate (%) with varying numbers of initial clients N. Adapted with permission from Ref. [35]. Copyright 2023, ELSEVIER.
Table 4. Communication rate (%) with varying numbers of initial clients N. Adapted with permission from Ref. [35]. Copyright 2023, ELSEVIER.
MethodAdaptive-OUIgnoreZero
N = 1046.6046.0247.30
N = 2047.4347.1447.98
N = 5048.9548.9349.13
Table 5. Performance comparison.
Table 5. Performance comparison.
IndicatorFederated LearningCentralized AI Learning
Detection Accuracy98% or higher93~95%
False Positive Rate Reduction3~4%10% or higher
Network Transmission VolumeUp to 70% reductionDefault
Response TimeUnder 1 s3 s or more
Table 6. AHP Evaluation Factors.
Table 6. AHP Evaluation Factors.
Evaluation FactorProblem Resolution ContributionAI Performance Contribution
① Detection accuracyImproved detection accuracy through region-specific learningMaintains high detection performance in various environments
② False positive rate reductionIncreased alarm reliability through unnecessary alarm reductionEnhanced alarm system quality
③ Response timeMinimized data movement, reduced communication loadMaintained real-time performance, cost reduction
④ Network efficiencyReduced central server dependency, resolved response delaysImproved real-time detection and alarm speed
⑤ SecurityPrevention of data leakage and tamperingEnhanced applicability in high-security environments
⑥ SustainabilityGuaranteed stability during system scale expansionApplicable to large-scale surveillance systems
⑦ ScalabilityReduced local equipment burdenSecured AI performance even on low-specification equipment
⑧ Resource efficiencySecured feasibility in maintenance and cost aspectsProvided reliability and stability for long-term operation
Table 7. Index of RI.
Table 7. Index of RI.
n12345678910
RI0.00.00.580.901.121.241.321.411.451.49
Table 8. AHP analysis results (importance ranking).
Table 8. AHP analysis results (importance ranking).
Evaluation FactorRelative Importance (Weight)Priority Ranking
Detection Accuracy0.2031
False Positive Rate0.1672
Security0.1213
Network Efficiency0.1134
Response Time0.1105
Sustainability0.1066
Scalability0.0957
Resource Efficiency0.0858
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Shin, Y.; Kim, H.; Jeong, J.; Shin, D. Federated Learning for Surveillance Systems: A Literature Review and AHP Expert-Based Evaluation. Electronics 2025, 14, 3500. https://doi.org/10.3390/electronics14173500

AMA Style

Shin Y, Kim H, Jeong J, Shin D. Federated Learning for Surveillance Systems: A Literature Review and AHP Expert-Based Evaluation. Electronics. 2025; 14(17):3500. https://doi.org/10.3390/electronics14173500

Chicago/Turabian Style

Shin, Yongjoo, Hansung Kim, Jaeyeong Jeong, and Dongkyoo Shin. 2025. "Federated Learning for Surveillance Systems: A Literature Review and AHP Expert-Based Evaluation" Electronics 14, no. 17: 3500. https://doi.org/10.3390/electronics14173500

APA Style

Shin, Y., Kim, H., Jeong, J., & Shin, D. (2025). Federated Learning for Surveillance Systems: A Literature Review and AHP Expert-Based Evaluation. Electronics, 14(17), 3500. https://doi.org/10.3390/electronics14173500

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop