Towards Communication-Efficient and Attack-Resistant Federated Edge Learning for Industrial Internet of Things

被引:24
作者
Liu, Yi [1 ,2 ]
Zhao, Ruihui [2 ]
Kang, Jiawen [3 ,4 ]
Yassine, Abdulsalam [5 ]
Niyato, Dusit [6 ]
Peng, Jialiang
机构
[1] Heilongjiang Univ, Sch Data Sci & Technol, 74 Xuefu Rd, Harbin 150080, Heilongjiang, Peoples R China
[2] Tencent Jarvis Lab, Tencent, 10000 Shennan Ave, Shenzhen 518040, Peoples R China
[3] Nanyang Technol Univ, Joint NTU WeBank Res Ctr Fintech, Singapore, Singapore
[4] Guangdong Univ Technol, Sch Automat, GDUT, Higher Educ Mega Ctr S, Engn Bldg 2, Guangzhou 510006, Guangdong, Peoples R China
[5] Lakehead Univ, Thunder Bay, ON P7B 5E1, Canada
[6] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
关键词
Federated edge learning; edge intelligence; local differential privacy; gradient leakage attack; poisoning attack; PRIVACY; CHALLENGES; MECHANISM;
D O I
10.1145/3453169
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Federated Edge Learning (FEL) allows edge nodes to train a global deep learning model collaboratively for edge computing in the Industrial Internet of Things (IIoT), which significantly promotes the development of Industrial 4.0. However, FEL faces two critical challenges: communication overhead and data privacy. FEL suffers from expensive communication overhead when training large-scale multi-node models. Furthermore, due to the vulnerability of FEL to gradient leakage and label-flipping attacks, the training process of the global model is easily compromised by adversaries. To address these challenges, we propose a communication efficient and privacy-enhanced asynchronous FEL framework for edge computing in IIoT. First, we introduce an asynchronous model update scheme to reduce the computation time that edge nodes wait for global model aggregation. Second, we propose an asynchronous local differential privacy mechanism, which improves communication efficiency and mitigates gradient leakage attacks by adding well-designed noise to the gradients of edge nodes. Third, we design a cloud-side malicious node detection mechanism to detect malicious nodes by testing the local model quality. Such a mechanism can avoid malicious nodes participating in training to mitigate label-flipping attacks. Extensive experimental studies on two real-world datasets demonstrate that the proposed framework can not only improve communication efficiency but also mitigate malicious attacks while its accuracy is comparable to traditional FEL frameworks.
引用
收藏
页数:22
相关论文
共 65 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
Alistarh D, 2018, ADV NEUR IN, V31
[3]  
Alistarh D, 2018, ADV NEUR IN, V31
[4]  
Alistarh D, 2017, ADV NEUR IN, V30
[5]  
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[6]  
Basu D, 2019, ADV NEUR IN, V32
[7]   Internet of Things (IoT): Smart and Secure Service Delivery [J].
Bertino, Elisa ;
Choo, Kim-Kwang Raymond ;
Georgakopolous, Dimitrios ;
Nepal, Surya .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2016, 16 (04)
[8]  
Bhagoji AN, 2019, PR MACH LEARN RES, V97
[9]  
Blanchard P, 2017, ADV NEUR IN, V30
[10]  
Bonawitz Keith, 2019, P MACHINE LEARNING S