Securing Distributed Network Digital Twin Systems Against Model Poisoning Attacks

被引:5
作者
Zhang, Zifan [1 ]
Fang, Minghong [2 ]
Chen, Mingzhe [3 ,4 ]
Li, Gaolei [5 ]
Lin, Xi [5 ]
Liu, Yuchen [1 ]
机构
[1] North Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
[2] Univ Louisville, Dept Comp Sci & Engn, Louisville, KY 40292 USA
[3] Univ Miami, Dept Elect & Comp Engn, Coral Gables, FL 33146 USA
[4] Univ Miami, Frost Inst Data Sci & Comp, Coral Gables, FL 33146 USA
[5] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
基金
美国国家科学基金会;
关键词
Security; Data models; Wireless networks; Internet of Things; Adaptation models; Reliability; Communication system security; Digital twin (DT); distributed learning; poisoning attack; security; traffic prediction; wireless networks;
D O I
10.1109/JIOT.2024.3421895
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the era of 5G and beyond, the increasing complexity of wireless networks necessitates innovative frameworks for efficient management and deployment. Digital twins (DTs), embodying real-time monitoring, predictive configurations, and enhanced decision-making capabilities, stand out as a promising solution in this context. Within a time-series data-driven framework that effectively maps wireless networks into digital counterparts, encapsulated by integrated vertical and horizontal twinning phases, this study investigates the security challenges in distributed network DT (NDT) systems, which potentially undermine the reliability of subsequent network applications, such as wireless traffic forecasting. Specifically, we consider a minimal-knowledge scenario for all attackers, in that they do not have access to network data and other specialized knowledge, yet can interact with previous iterations of server-level models. In this context, we spotlight a novel fake traffic injection attack designed to compromise a distributed NDT system for wireless traffic prediction. In response, we then propose a defense mechanism, termed global-local inconsistency detection (GLID), to counteract various model poisoning threats. GLID strategically removes abnormal model parameters that deviate beyond a particular percentile range, thereby fortifying the security of network twinning process. Through extensive experiments on real-world wireless traffic data sets, our experimental evaluations show that both our attack and defense strategies significantly outperform existing baselines, highlighting the importance of security measures in the design and implementation of DTs for 5G and beyond network systems.
引用
收藏
页码:34312 / 34324
页数:13
相关论文
共 49 条
[1]   Digital Twin: A Comprehensive Survey of Security Threats [J].
Alcaraz, Cristina ;
Lopez, Javier .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (03) :1475-1503
[2]   Network Digital Twin: Context, Enabling Technologies, and Opportunities [J].
Almasan, Paul ;
Ferriol-Galmes, Miquel ;
Paillisse, Jordi ;
Suarez-Varela, Jose ;
Perino, Diego ;
Lopez, Diego ;
Perales, Antonio Agustin Pastor ;
Harvey, Paul ;
Ciavaglia, Laurent ;
Wong, Leon ;
Ram, Vishnu ;
Xiao, Shihan ;
Shi, Xiang ;
Cheng, Xiangle ;
Cabellos-Aparicio, Albert ;
Barlet-Ros, Pere .
IEEE COMMUNICATIONS MAGAZINE, 2022, 60 (11) :22-27
[3]  
android, Android-x86 run android on your PC
[4]   A multi-source dataset of urban life in the city of Milan and the Province of Trentino [J].
Barlacchi, Gianni ;
De Nadai, Marco ;
Larcher, Roberto ;
Casella, Antonio ;
Chitic, Cristiana ;
Torrisi, Giovanni ;
Antonelli, Fabrizio ;
Vespignani, Alessandro ;
Pentland, Alex ;
Lepri, Bruno .
SCIENTIFIC DATA, 2015, 2
[5]  
bignox, NoxPlayer, the perfect android emulator to play mobile games on PC
[6]  
Blanchard P, 2017, ADV NEUR IN, V30
[7]  
bluestacks, The world's first cloud-based android gaming platform
[8]   Digital Twin Technology Challenges and Applications: A Comprehensive Review [J].
Botin-Sanabria, Diego M. ;
Mihaita, Adriana-Simona ;
Peimbert-Garcia, Rodrigo E. ;
Ramirez-Moreno, Mauricio A. ;
Ramirez-Mendoza, Ricardo A. ;
Lozoya-Santos, Jorge de J. .
REMOTE SENSING, 2022, 14 (06)
[9]  
Cao XY, 2022, Arxiv, DOI arXiv:2012.13995
[10]   MPAF: Model Poisoning Attacks to Federated Learning based on Fake Clients [J].
Cao, Xiaoyu ;
Gong, Neil Zhenqiang .
2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW 2022, 2022, :3395-3403