Reputation-Based Federated Learning for Secure Wireless Networks

被引:53
|
作者
Song, Zhendong [1 ]
Sun, Hongguang [1 ]
Yang, Howard H. [2 ,3 ,4 ]
Wang, Xijun [5 ]
Zhang, Yan [6 ]
Quek, Tony Q. S. [7 ]
机构
[1] Northwest A&F Univ, Coll Informat Engn, Yangling 712100, Shaanxi, Peoples R China
[2] Zhejiang Univ, Zhejiang Univ Univ Illinois Urbana Champaign Inst, Haining 314400, Peoples R China
[3] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310007, Peoples R China
[4] Univ Illinois, Dept Elect & Comp Engn, Champaign, IL 61820 USA
[5] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangzhou 510006, Peoples R China
[6] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[7] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore 487372, Singapore
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Convergence; Data models; Communication system security; Training; Scheduling; Reliability; Wireless networks; Convergence analysis; federated learning (FL); malicious users; reputation-based scheduling policy; secure wireless networks; PRIVACY; FRAMEWORK;
D O I
10.1109/JIOT.2021.3079104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The dilemma between the ever-increasing demands for data processing, and the limited capabilities of mobile devices in a wireless communication system calls for the appearance of federated learning (FL). As a distributed machine learning (ML) method, FL executes in an iterative manner by distributing the global model parameters and aggregating the local model parameters, which avoids the transmission of huge raw data and preserves data privacy during the training process. However, since FL cannot control the local training and transmission process, this gives malicious users the opportunity to deteriorate the global aggregation. We adopt a reputation model based on beta distribution function to measure the credibility of local users, and propose a reputation-based scheduling policy with user fairness constraint. By taking into account the impact of wireless channel conditions and malicious attack features, we derive tractable expressions for the convergence rate of FL in a wireless setting. Moreover, we validate the superiority of the proposed reputation-based scheduling policy via numerical analysis and empirical simulations. The results show that the proposed secure wireless FL framework can not only distinguish malicious users from normal users but also effectively defend against several typical attack types featured in attack intensity and attack frequency. The analysis also reveals that the effect of average attack intensity on the convergence performance of FL is dominated by the percentage of malicious user equipments (UEs), and imposes even greater negative effect on the convergence performance of FL as the percentage of malicious UEs increases.
引用
收藏
页码:1212 / 1226
页数:15
相关论文
共 50 条
  • [1] Reputation-Based Secure Sensor Localization in Wireless Sensor Networks
    He, Jingsha
    Xu, Jing
    Zhu, Xingye
    Zhang, Yuqiang
    Zhang, Ting
    Fu, Wanqing
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [2] A Reputation-based Metric for Secure Routing in Wireless Mesh Networks
    Oliviero, Francesco
    Romano, Simon Pietro
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [3] RSDA: Reputation-based Secure Data Aggregation in Wireless Sensor Networks
    Alzaid, Hani
    Foo, Ernest
    Nieto, Juan Gonzalez
    PDCAT 2008: NINTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2008, : 419 - 424
  • [4] UAVs and Blockchain Synergy: Enabling Secure Reputation-Based Federated Learning in Smart Cities
    Abbas, Syed M. Aqleem
    Khattak, Muazzam A. Khan
    Boulila, Wadii
    Kouba, Anis
    Khan, M. Shahbaz
    Ahmad, Jawad
    IEEE ACCESS, 2024, 12 : 154035 - 154053
  • [5] Reputation-based trust in wireless sensor networks
    Chen, Haiguang
    Wu, Huafeng
    Zhou, Xi
    Gao, Chuanshan
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 603 - +
  • [6] Reputation-based Trust Management in Wireless Sensor Networks
    Zia, Tanveer A.
    ISSNIP 2008: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS, AND INFORMATION PROCESSING, 2008, : 163 - 166
  • [7] Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks
    Alzaid, Hani
    Foo, Ernest
    Nieto, Juan Gonzalez
    Ahmed, Ejaz
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (02) : 125 - 144
  • [8] A Reputation-based Routing Protocol for Wireless Sensor Networks
    Adnan, Ali I.
    Hanapi, Zurina M.
    Othman, Mohamed
    Zukarnain, Zuriati A.
    Sadiq, Abubakar
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [9] A reputation-based secure scheme in vehicular ad hoc networks
    Li, Xiaoqing
    Liu, Jicheng
    Li, Xuejun
    Li, Hui
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2015, 6 (02) : 83 - 90
  • [10] Reputation-based Blockchain for Secure NDN Caching in Vehicular Networks
    Khelifi, Hakima
    Luo, Senlin
    Nour, Boubakr
    Moungla, Hassine
    Ahmed, Syed Hassan
    2018 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (IEEE CSCN), 2018,