Asynchronous Robust Aggregation Method with Privacy Protection for IoV Federated Learning

被引:2
作者
Zhou, Antong [1 ]
Jiang, Ning [1 ]
Tang, Tong [2 ]
机构
[1] Mashang Consumer Finance Co Ltd, Chongqing 401121, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
关键词
federated learning; parameter aggregation; privacy protection; internet of vehicles; Byzantine attacker;
D O I
10.3390/wevj15010018
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Due to the wide connection range and open communication environment of internet of vehicle (IoV) devices, they are susceptible to Byzantine attacks and privacy inference attacks, resulting in security and privacy issues in IoV federated learning. Therefore, there is an urgent need to study IoV federated learning methods with privacy protection. However, the heterogeneity and resource limitations of IoV devices pose significant challenges to the aggregation of federated learning model parameters. Therefore, this paper proposes an asynchronous robust aggregation method with privacy protection for federated learning in IoVs. Firstly, we design an asynchronous grouping robust aggregation algorithm based on delay perception, combines intra-group truth estimation with inter-group delay aggregation, and alleviates the impact of stragglers and Byzantine attackers. Then, we design a communication-efficient and security enhanced aggregation protocol based on homomorphic encryption, to achieve asynchronous group robust aggregation while protecting data privacy and reducing communication overhead. Finally, the simulation results indicate that the proposed scheme could achieve a maximum improvement of 41.6% in model accuracy compared to the baseline, which effectively enhances the training efficiency of the model while providing resistance to Byzantine attacks and privacy inference attacks.
引用
收藏
页数:16
相关论文
共 36 条
[1]  
Blanchard Peva, 2017, P 31 INT C NEURAL IN
[2]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[3]  
Californians for Consumer Privacy, 2020, California Privacy Rights Act
[4]   The Singapore Personal Data Protection Act and an assessment of future trends in data privacy reform [J].
Chik, Warren B. .
COMPUTER LAW & SECURITY REVIEW, 2013, 29 (05) :554-575
[5]  
Conger K., The New York Times
[6]  
Damaskinos G, 2018, PR MACH LEARN RES, V80
[7]  
Gupta S, 2016, IEEE DATA MINING, P171, DOI [10.1109/ICDM.2016.122, 10.1109/ICDM.2016.0028]
[8]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778
[9]   The Internet of Vehicles and Sustainability-Reflections on Environmental, Social, and Corporate Governance [J].
Kostrzewski, Mariusz ;
Marczewska, Magdalena ;
Uden, Lorna .
ENERGIES, 2023, 16 (07)
[10]  
Krizhevsky A., 2009, Master's thesis