Reputation-Based Federated Learning for Secure Wireless Networks

被引:53
|
作者
Song, Zhendong [1 ]
Sun, Hongguang [1 ]
Yang, Howard H. [2 ,3 ,4 ]
Wang, Xijun [5 ]
Zhang, Yan [6 ]
Quek, Tony Q. S. [7 ]
机构
[1] Northwest A&F Univ, Coll Informat Engn, Yangling 712100, Shaanxi, Peoples R China
[2] Zhejiang Univ, Zhejiang Univ Univ Illinois Urbana Champaign Inst, Haining 314400, Peoples R China
[3] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310007, Peoples R China
[4] Univ Illinois, Dept Elect & Comp Engn, Champaign, IL 61820 USA
[5] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangzhou 510006, Peoples R China
[6] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[7] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore 487372, Singapore
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Convergence; Data models; Communication system security; Training; Scheduling; Reliability; Wireless networks; Convergence analysis; federated learning (FL); malicious users; reputation-based scheduling policy; secure wireless networks; PRIVACY; FRAMEWORK;
D O I
10.1109/JIOT.2021.3079104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The dilemma between the ever-increasing demands for data processing, and the limited capabilities of mobile devices in a wireless communication system calls for the appearance of federated learning (FL). As a distributed machine learning (ML) method, FL executes in an iterative manner by distributing the global model parameters and aggregating the local model parameters, which avoids the transmission of huge raw data and preserves data privacy during the training process. However, since FL cannot control the local training and transmission process, this gives malicious users the opportunity to deteriorate the global aggregation. We adopt a reputation model based on beta distribution function to measure the credibility of local users, and propose a reputation-based scheduling policy with user fairness constraint. By taking into account the impact of wireless channel conditions and malicious attack features, we derive tractable expressions for the convergence rate of FL in a wireless setting. Moreover, we validate the superiority of the proposed reputation-based scheduling policy via numerical analysis and empirical simulations. The results show that the proposed secure wireless FL framework can not only distinguish malicious users from normal users but also effectively defend against several typical attack types featured in attack intensity and attack frequency. The analysis also reveals that the effect of average attack intensity on the convergence performance of FL is dominated by the percentage of malicious user equipments (UEs), and imposes even greater negative effect on the convergence performance of FL as the percentage of malicious UEs increases.
引用
收藏
页码:1212 / 1226
页数:15
相关论文
共 50 条
  • [41] Reputation-Based Trust in Federated Testbeds Utilizing User Experience
    Kapoukakis, A.
    Kafetzoglou, S.
    Androulidakis, G.
    Papagianni, C.
    Papavassiliou, S.
    2014 IEEE 19TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2014, : 56 - 60
  • [42] Secure Federated Learning over Wireless Communication Networks with Model Compression
    DING Yahao
    Mohammad SHIKH-BAHAEI
    YANG Zhaohui
    HUANG Chongwen
    YUAN Weijie
    ZTE Communications, 2023, 21 (01) : 46 - 54
  • [43] Secure Dynamic Scheduling for Federated Learning in Underwater Wireless IoT Networks
    Yan, Lei
    Wang, Lei
    Li, Guanjun
    Shao, Jingwei
    Xia, Zhixin
    JOURNAL OF MARINE SCIENCE AND ENGINEERING, 2024, 12 (09)
  • [44] Decentralized Reputation-based Leader Election for Privacy-preserving Federated Learning on Internet of Things
    Peng, Luyao
    Tang, Xiangyun
    Li, Chenxi
    Xiao, Yao
    Zhang, Tao
    Weng, Yu
    2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS, 2024, : 362 - 369
  • [45] Reputation-based mechanisms to avoid misbehaving nodes in ad hoc and wireless sensor networks
    Abdulaziz S. Almazyad
    Neural Computing and Applications, 2018, 29 : 597 - 607
  • [46] Reputation-based role assignment for role-based access control in wireless sensor networks
    Misra, Sudip
    Vaish, Ankur
    COMPUTER COMMUNICATIONS, 2011, 34 (03) : 281 - 294
  • [47] SR3: secure resilient reputation-based routing
    Altisen, Karine
    Devismes, Stephane
    Jamet, Raphael
    Lafourcade, Pascal
    WIRELESS NETWORKS, 2017, 23 (07) : 2111 - 2133
  • [48] Reputation-based mechanisms to avoid misbehaving nodes in ad hoc and wireless sensor networks
    Almazyad, Abdulaziz S.
    NEURAL COMPUTING & APPLICATIONS, 2018, 29 (09): : 597 - 607
  • [49] Reputation-based Scheme for Delay Tolerant Networks
    Zhang, Xi
    Wang, Xiaofei
    Liu, Anna
    Zhang, Quan
    Tang, Chaojing
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 974 - 978
  • [50] SR3: secure resilient reputation-based routing
    Karine Altisen
    Stéphane Devismes
    Raphaël Jamet
    Pascal Lafourcade
    Wireless Networks, 2017, 23 : 2111 - 2133