Reputation-Based Federated Learning for Secure Wireless Networks

被引:53
|
作者
Song, Zhendong [1 ]
Sun, Hongguang [1 ]
Yang, Howard H. [2 ,3 ,4 ]
Wang, Xijun [5 ]
Zhang, Yan [6 ]
Quek, Tony Q. S. [7 ]
机构
[1] Northwest A&F Univ, Coll Informat Engn, Yangling 712100, Shaanxi, Peoples R China
[2] Zhejiang Univ, Zhejiang Univ Univ Illinois Urbana Champaign Inst, Haining 314400, Peoples R China
[3] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310007, Peoples R China
[4] Univ Illinois, Dept Elect & Comp Engn, Champaign, IL 61820 USA
[5] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangzhou 510006, Peoples R China
[6] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[7] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore 487372, Singapore
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Convergence; Data models; Communication system security; Training; Scheduling; Reliability; Wireless networks; Convergence analysis; federated learning (FL); malicious users; reputation-based scheduling policy; secure wireless networks; PRIVACY; FRAMEWORK;
D O I
10.1109/JIOT.2021.3079104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The dilemma between the ever-increasing demands for data processing, and the limited capabilities of mobile devices in a wireless communication system calls for the appearance of federated learning (FL). As a distributed machine learning (ML) method, FL executes in an iterative manner by distributing the global model parameters and aggregating the local model parameters, which avoids the transmission of huge raw data and preserves data privacy during the training process. However, since FL cannot control the local training and transmission process, this gives malicious users the opportunity to deteriorate the global aggregation. We adopt a reputation model based on beta distribution function to measure the credibility of local users, and propose a reputation-based scheduling policy with user fairness constraint. By taking into account the impact of wireless channel conditions and malicious attack features, we derive tractable expressions for the convergence rate of FL in a wireless setting. Moreover, we validate the superiority of the proposed reputation-based scheduling policy via numerical analysis and empirical simulations. The results show that the proposed secure wireless FL framework can not only distinguish malicious users from normal users but also effectively defend against several typical attack types featured in attack intensity and attack frequency. The analysis also reveals that the effect of average attack intensity on the convergence performance of FL is dominated by the percentage of malicious user equipments (UEs), and imposes even greater negative effect on the convergence performance of FL as the percentage of malicious UEs increases.
引用
收藏
页码:1212 / 1226
页数:15
相关论文
共 50 条
  • [21] A Reputation-Based Trustworthiness Concept for Wireless Networking in Vehicular Social Networks
    Vegni, Anna Maria
    Leoni, Claudia
    Loscri, Valeria
    Benslimane, Abderrahim
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (05) : 28 - 34
  • [22] Secure opinion sharing for reputation-based systems in mobile ad hoc networks
    Sangi, Abdur Rashid
    Liu, Jianwei
    Alkatheiri, Mohammed S.
    Anamalamudi, Satish
    MEASUREMENT & CONTROL, 2020, 53 (3-4): : 748 - 756
  • [23] Reputation-based Methods for Building Secure P2P Networks
    Novotny, Miroslav
    Zavoral, Filip
    2008 FIRST INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES, VOLS 1 AND 2, 2008, : 410 - 415
  • [24] Reputation-based secure spectrum situation fusion in distributed cognitive radio networks
    School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications, Chongqing
    400065, China
    J. China Univ. Post Telecom., 3 (110-117):
  • [25] ReDiSen: Reputation-based Secure Cooperative Sensing in Distributed Cognitive Radio Networks
    Zhang, Tongjie
    Safavi-Naini, Reihaneh
    Li, Zongpeng
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
  • [26] Reputation-based secure spectrum situation fusion in distributed cognitive radio networks
    Li Fangwei
    Liu Fan
    Zhu Jiang
    Nie Yifang
    The Journal of China Universities of Posts and Telecommunications, 2015, 22 (03) : 110 - 117
  • [27] Distributed and Secure Federated Learning for Wireless Computing Power Networks
    Wang, Peng
    Sun, Wen
    Zhang, Haibin
    Ma, Wenqiang
    Zhang, Yan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (07) : 9381 - 9393
  • [28] Reputation-Based Regional Federated Learning for Knowledge Trading in Blockchain-Enhanced IoV
    Zou, Yue
    Shen, Fei
    Yan, Feng
    Lin, Jing
    Qiu, Yunzhou
    2021 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2021,
  • [29] A Reputation-Based Method for Detection of Attacks in Virtual Coordinate Based Wireless Sensor Networks
    Bose, Divyanka
    Jayasumana, Anura P.
    40TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2015), 2015, : 486 - 489
  • [30] A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks
    Nabila Labraoui
    Mourad Gueroui
    Larbi Sekhri
    Wireless Personal Communications, 2016, 87 : 1037 - 1055