Reputation-Based Federated Learning for Secure Wireless Networks

被引:53
|
作者
Song, Zhendong [1 ]
Sun, Hongguang [1 ]
Yang, Howard H. [2 ,3 ,4 ]
Wang, Xijun [5 ]
Zhang, Yan [6 ]
Quek, Tony Q. S. [7 ]
机构
[1] Northwest A&F Univ, Coll Informat Engn, Yangling 712100, Shaanxi, Peoples R China
[2] Zhejiang Univ, Zhejiang Univ Univ Illinois Urbana Champaign Inst, Haining 314400, Peoples R China
[3] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310007, Peoples R China
[4] Univ Illinois, Dept Elect & Comp Engn, Champaign, IL 61820 USA
[5] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangzhou 510006, Peoples R China
[6] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[7] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore 487372, Singapore
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Convergence; Data models; Communication system security; Training; Scheduling; Reliability; Wireless networks; Convergence analysis; federated learning (FL); malicious users; reputation-based scheduling policy; secure wireless networks; PRIVACY; FRAMEWORK;
D O I
10.1109/JIOT.2021.3079104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The dilemma between the ever-increasing demands for data processing, and the limited capabilities of mobile devices in a wireless communication system calls for the appearance of federated learning (FL). As a distributed machine learning (ML) method, FL executes in an iterative manner by distributing the global model parameters and aggregating the local model parameters, which avoids the transmission of huge raw data and preserves data privacy during the training process. However, since FL cannot control the local training and transmission process, this gives malicious users the opportunity to deteriorate the global aggregation. We adopt a reputation model based on beta distribution function to measure the credibility of local users, and propose a reputation-based scheduling policy with user fairness constraint. By taking into account the impact of wireless channel conditions and malicious attack features, we derive tractable expressions for the convergence rate of FL in a wireless setting. Moreover, we validate the superiority of the proposed reputation-based scheduling policy via numerical analysis and empirical simulations. The results show that the proposed secure wireless FL framework can not only distinguish malicious users from normal users but also effectively defend against several typical attack types featured in attack intensity and attack frequency. The analysis also reveals that the effect of average attack intensity on the convergence performance of FL is dominated by the percentage of malicious user equipments (UEs), and imposes even greater negative effect on the convergence performance of FL as the percentage of malicious UEs increases.
引用
收藏
页码:1212 / 1226
页数:15
相关论文
共 50 条
  • [31] A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks
    Labraoui, Nabila
    Gueroui, Mourad
    Sekhri, Larbi
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 87 (03) : 1037 - 1055
  • [32] A SURVEY ON REPUTATION-BASED COOPERATION ENFORCEMENT SCHEMES IN WIRELESS AD HOC NETWORKS
    Louta, Malamati
    Kraounakis, Stylianos
    Michalas, Angelos
    WINSYS 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEM, 2010, : 90 - 93
  • [33] COSR: A Reputation-Based Secure Route Protocol in MANET
    Fei Wang
    Furong Wang
    Benxiong Huang
    LaurenceT Yang
    EURASIP Journal on Wireless Communications and Networking, 2010
  • [34] COSR: A Reputation-Based Secure Route Protocol in MANET
    Wang, Fei
    Wang, Furong
    Huang, Benxiong
    Yang, Laurence T.
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2010,
  • [35] Performance analysis of reputation-based mechanisms for multi-hop wireless networks
    Milan, Fabio
    Jaramillo, Juan Jose
    Srikant, R.
    2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, : 12 - 17
  • [36] RADAR:: a reputation-based scheme for detecting anomalous nodes in wireless mesh networks
    Zhang, Zonghua
    Nait-Abdesselam, Farid
    Ho, Pin-Han
    Lin, Xiaodong
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2621 - +
  • [37] Secure Reputation-Based Authentication With Malicious Detection in VANETs
    Yang, Xu
    Zhu, Fei
    Yang, Xuechao
    Luo, Junwei
    Yi, Xun
    Ning, Jianting
    Huang, Xinyi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 359 - 372
  • [38] SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks
    He, Q
    Wu, DP
    Khosla, P
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 825 - 830
  • [39] Using Blockchain for Reputation-Based Cooperation in Federated IoT Domains
    Fortino, Giancarlo
    Messina, Fabrizio
    Rosaci, Domenico
    Sarne, Giuseppe M. L.
    INTELLIGENT DISTRIBUTED COMPUTING XIII, 2020, 868 : 3 - 12
  • [40] SReD: A Secure Reputation-Based Dynamic Window Scheme for Disruption-Tolerant Networks
    Xu, Zhong
    Jin, Yuan
    Shu, Weihuan
    Liu, Xue
    Luo, Junhai
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 2625 - 2631