Securing Federated Learning: A Covert Communication-Based Approach

被引:19
作者
Xie, Yuan-Ai [1 ]
Kang, Jiawen [3 ]
Niyato, Dusit [4 ]
Van, Nguyen Thi Thanh [6 ]
Luong, Nguyen Cong [6 ]
Liu, Zhixin [2 ]
Yu, Han [5 ]
机构
[1] Yanshan Univ, Control Sci & Engn, Qinhuangdao, Peoples R China
[2] Yanshan Univ, Sch Elect Engn, Dept Automat, Qinhuangdao, Peoples R China
[3] Guangdong Univ Technol, Guangzhou, Guangdong, Peoples R China
[4] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore, Singapore
[5] Nanyang Technol Univ, Singapore, Singapore
[6] PHENIKAA Univ, Hanoi, Vietnam
来源
IEEE NETWORK | 2023年 / 37卷 / 01期
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Servers; Jamming; Computational modeling; Communication system security; Wireless sensor networks; Training; Eavesdropping;
D O I
10.1109/MNET.117.2200065
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Federated Learning Networks (FLNs) have been envisaged as a promising paradigm to collaboratively train models among mobile devices without exposing their local privacy data. Due to the need for frequent model updates via wireless links, FLNs are vulnerable to various attacks (e.g., eavesdropping attacks, replay attacks, inference attacks, and jamming attacks). Balancing privacy protection with efficient distributed model training is a key challenge for FLNs. Existing countermeasures incur high computation costs and are only designed for specific attacks on FLNs. In this article, we bridge this gap by proposing the Covert Communication-based Federated Learning (CCFL) approach. Based on the emerging communication security technique of covert communication which hides the existence of wireless communication activities, CCFL can degrade attackers' capability of extracting useful information from the FLN training protocol, which is a fundamental step for most existing attacks, and thereby holistically enhances the privacy of FLNs. We experimentally evaluate CCFL extensively under real-world settings in which the FL latency is optimized under given security requirements. Numerical results demonstrate the significant effectiveness of the proposed approach in terms of both training efficiency and communication security.
引用
收藏
页码:118 / 124
页数:7
相关论文
共 15 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]   Limits of Reliable Communication with Low Probability of Detection on AWGN Channels [J].
Bash, Boulat A. ;
Goeckel, Dennis ;
Towsley, Don .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1921-1930
[3]  
El Mouaatamid Otmane., 2016, Electronic Journal of Information Technology
[4]   Covert Communication in UAV-Assisted Air-Ground Networks [J].
Jiang, Xu ;
Chen, Xinying ;
Tang, Jie ;
Zhao, Nan ;
Zhang, Xiu Yin ;
Niyato, Dusit ;
Wong, Kai-Kit .
IEEE WIRELESS COMMUNICATIONS, 2021, 28 (04) :190-197
[5]   Federated Learning in Mobile Edge Networks: A Comprehensive Survey [J].
Lim, Wei Yang Bryan ;
Nguyen Cong Luong ;
Dinh Thai Hoang ;
Jiao, Yutao ;
Liang, Ying-Chang ;
Yang, Qiang ;
Niyato, Dusit ;
Miao, Chunyan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :2031-2063
[6]   Intelligent Reflecting Surface Enabled Covert Communications in Wireless Networks [J].
Lu, Xiao ;
Hossain, Ekram ;
Shafique, Taniya ;
Feng, Shaohan ;
Jiang, Hai ;
Niyato, Dusit .
IEEE NETWORK, 2020, 34 (05) :148-155
[7]  
Lyu L, 2022, Arxiv, DOI arXiv:2012.06337
[8]  
McMahan HB, 2017, PR MACH LEARN RES, V54, P1273
[9]   Privacy-Preserving Deep Learning via Additively Homomorphic Encryption [J].
Phong, Le Trieu ;
Aono, Yoshinori ;
Hayashi, Takuya ;
Wang, Lihua ;
Moriai, Shiho .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) :1333-1345
[10]   Covert Communication in the Presence of an Uninformed Jammer [J].
Sobers, Tamara V. ;
Bash, Boulat A. ;
Guha, Saikat ;
Towsley, Don ;
Goeckel, Dennis .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (09) :6193-6206