FedXPro: Bayesian Inference for Mitigating Poisoning Attacks in IoT Federated Learning

被引:1
作者
Indrasiri, Pubudu L. [1 ]
Nguyen, Dinh C. [2 ]
Kashyap, Bipasha [1 ]
Pathirana, Pubudu N. [1 ]
Eldar, Yonina C. [3 ]
机构
[1] Deakin Univ, Sch Engn, Waurn Ponds, Vic 3216, Australia
[2] Univ Alabama, Dept Elect & Comp Engn, Huntsville, AL 35805 USA
[3] Weizmann Inst Sci, Fac Math & Comp Sci, IL-7610001 Rehovot, Israel
关键词
Internet of Things; Servers; Federated learning; Training; Data models; Artificial intelligence; Behavioral sciences; Bayesian inference; Byzantine; federated learning (FL); geometric median (GM); Internet of Things (IoT); predictive coding (PC);
D O I
10.1109/JIOT.2023.3334298
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Federated learning (FL) has been envisioned to enable many Internet of Things (IoT) devices to perform large-scale machine learning without sharing raw data, resulting in significant privacy improvements. In a wireless IoT system, FL helps clients to secure their confidential information and achieve improved learning performance. However, the conventional FL architecture is vulnerable to Byzantine workers, possessing the potential to send malicious updates that compromise the accuracy of the global model. Previous studies have proposed various secure aggregation rules and attacker detection techniques to address this issue. However, these techniques exhibit limited effectiveness and may lead to a decrease in accuracy. To overcome these limitations, we propose a Byzantine client detection algorithm called FedXPro by combining the predictive coding/biased competition-divisive input modulation (PC/BC-DIM) neural network and geometric median (GM). Predictive coding (PC) is the core of the PC/BC-DIM architecture, which can perform Bayesian inference by fusing priors and likelihoods to determine posterior distributions. The GM is employed to determine the prior knowledge of legitimate clients to execute the PC/BC-DIM algorithm. During training, the framework calculates the probability distribution for a set of valid clients chosen from the GM. In testing, it attempts to reconstruct the same distribution from other clients concerning prior knowledge, and ultimately, the reconstruction power is utilized to filter the malicious clients. Our extensive simulations demonstrate the superiority of our FedXPro approach over other state-of-the-art methods in terms of accuracy, a guaranteed faster convergence rate, and attack detection under different network settings.
引用
收藏
页码:12115 / 12131
页数:17
相关论文
共 40 条
[1]   Generalized Weiszfeld Algorithms for Lq Optimization [J].
Aftab, Khurrum ;
Hartley, Richard ;
Trumpf, Jochen .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2015, 37 (04) :728-745
[2]  
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[3]  
Bhagoji AN, 2019, PR MACH LEARN RES, V97
[4]  
Blanchard P, 2017, ADV NEUR IN, V30
[5]   Vulnerabilities in Federated Learning [J].
Bouacida, Nader ;
Mohapatra, Prasant .
IEEE ACCESS, 2021, 9 :63229-63249
[6]  
Cao XY, 2022, Arxiv, DOI arXiv:2012.13995
[7]  
Cao XY, 2021, AAAI CONF ARTIF INTE, V35, P6885
[8]   Communication-efficient federated learning [J].
Chen, Mingzhe ;
Shlezinger, Nir ;
Poor, H. Vincent ;
Eldar, Yonina C. ;
Cui, Shuguang .
PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2021, 118 (17)
[10]  
Fang MH, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1623