Multitentacle Federated Learning Over Software-Defined Industrial Internet of Things Against Adaptive Poisoning Attacks

被引:45
作者
Li, Gaolei [1 ]
Wu, Jun [1 ]
Li, Shenghong [1 ]
Yang, Wu [2 ]
Li, Changlian [3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[2] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin 200240, Peoples R China
[3] Informat Consulting & Designing Inst, Intelligent Network Design Inst, Shanghai 200240, Peoples R China
基金
中国国家自然科学基金;
关键词
Differential privacy (DP); multitentacle federated learning (MTFL); poisoning attacks; software-defined industrial Internet of Things (SD-IIoT); BACKDOOR; FRAMEWORK; DEFENSES;
D O I
10.1109/TII.2022.3173996
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software-defined industrial Internet of things (SD-IIoT) exploits federated learning to process the sensitive data at edges, while adaptive poisoning attacks threat the security of SD-IIoT. To address this problem, this article proposes a multi-tentacle federated learning (MTFL) framework, which is essential to guarantee the trustness of training data in SD-IIoT. In MTFL, participants with similar learning tasks are assigned to the same tentacle group. To identify adaptive poisoning attacks, a tentacle distribution based efficient poisoning attack detection (TD-EPAD) algorithm is presented. And also, to minimize the impact of adaptive poisoning data, a stochastic tentacle data exchanging (STDE) protocol is also proposed. Simultaneously, to protect the tentacle's privacy in STDE, all exchanged data will be processed by differential privacy technology. A MTFL prototype system is implemented, which provides extensive ablation experiments and comparison experiments, demonstrating that the accuracy of the global model under attack scenario can be improved with 40%.
引用
收藏
页码:1260 / 1269
页数:10
相关论文
共 36 条
[1]  
Al-Rawi Mohammed., 2018, IAL@_PKDD/ECML, P1, DOI 10.1109/mintc.2018.8363165
[2]   LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking [J].
Ambrosin, Moreno ;
Conti, Mauro ;
De Gaspari, Fabio ;
Poovendran, Radha .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2017, 25 (02) :1206-1219
[3]  
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[4]   Detecting Poisoning Attacks on Machine Learning in IoT Environments [J].
Baracaldo, Nathalie ;
Chen, Bryant ;
Ludwig, Heiko ;
Safavi, Amir ;
Zhang, Rui .
2018 IEEE INTERNATIONAL CONGRESS ON INTERNET OF THINGS (ICIOT), 2018, :57-64
[5]   De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks [J].
Chen, Jian ;
Zhang, Xuxin ;
Zhang, Rui ;
Wang, Chen ;
Liu, Ling .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 (16) :3412-3425
[6]  
Fang MH, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1623
[7]   Data Poisoning Attacks and Defenses to Crowdsourcing Systems [J].
Fang, Minghong ;
Sun, Minghao ;
Li, Qi ;
Gong, Neil Zhenqiang ;
Tian, Jin ;
Liu, Jia .
PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021), 2021, :969-980
[8]   Adversarial Classification Under Differential Privacy [J].
Giraldo, Jairo ;
Cardenas, Alvaro A. ;
Kantarcioglu, Murat ;
Katz, Jonathan .
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
[9]   Federated Learning for Internet of Things: Recent Advances, Taxonomy, and Open Challenges [J].
Khan, Latif U. ;
Saad, Walid ;
Han, Zhu ;
Hossain, Ekram ;
Hong, Choong Seon .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (03) :1759-1799
[10]   DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems [J].
Li, Gaolei ;
Ota, Kaoru ;
Dong, Mianxiong ;
Wu, Jun ;
Li, Jianhua .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (05) :3267-3277