Reputation-Based Federated Learning for Secure Wireless Networks

被引:56
作者
Song, Zhendong [1 ]
Sun, Hongguang [1 ]
Yang, Howard H. [2 ,3 ,4 ]
Wang, Xijun [5 ]
Zhang, Yan [6 ]
Quek, Tony Q. S. [7 ]
机构
[1] Northwest A&F Univ, Coll Informat Engn, Yangling 712100, Shaanxi, Peoples R China
[2] Zhejiang Univ, Zhejiang Univ Univ Illinois Urbana Champaign Inst, Haining 314400, Peoples R China
[3] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310007, Peoples R China
[4] Univ Illinois, Dept Elect & Comp Engn, Champaign, IL 61820 USA
[5] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangzhou 510006, Peoples R China
[6] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[7] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore 487372, Singapore
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Convergence; Data models; Communication system security; Training; Scheduling; Reliability; Wireless networks; Convergence analysis; federated learning (FL); malicious users; reputation-based scheduling policy; secure wireless networks; PRIVACY; FRAMEWORK;
D O I
10.1109/JIOT.2021.3079104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The dilemma between the ever-increasing demands for data processing, and the limited capabilities of mobile devices in a wireless communication system calls for the appearance of federated learning (FL). As a distributed machine learning (ML) method, FL executes in an iterative manner by distributing the global model parameters and aggregating the local model parameters, which avoids the transmission of huge raw data and preserves data privacy during the training process. However, since FL cannot control the local training and transmission process, this gives malicious users the opportunity to deteriorate the global aggregation. We adopt a reputation model based on beta distribution function to measure the credibility of local users, and propose a reputation-based scheduling policy with user fairness constraint. By taking into account the impact of wireless channel conditions and malicious attack features, we derive tractable expressions for the convergence rate of FL in a wireless setting. Moreover, we validate the superiority of the proposed reputation-based scheduling policy via numerical analysis and empirical simulations. The results show that the proposed secure wireless FL framework can not only distinguish malicious users from normal users but also effectively defend against several typical attack types featured in attack intensity and attack frequency. The analysis also reveals that the effect of average attack intensity on the convergence performance of FL is dominated by the percentage of malicious user equipments (UEs), and imposes even greater negative effect on the convergence performance of FL as the percentage of malicious UEs increases.
引用
收藏
页码:1212 / 1226
页数:15
相关论文
共 50 条
  • [1] UAVs and Blockchain Synergy: Enabling Secure Reputation-Based Federated Learning in Smart Cities
    Abbas, Syed M. Aqleem
    Khattak, Muazzam A. Khan
    Boulila, Wadii
    Kouba, Anis
    Khan, M. Shahbaz
    Ahmad, Jawad
    IEEE ACCESS, 2024, 12 : 154035 - 154053
  • [2] Reputation-Based Model Aggregation and Resource Optimization in Wireless Federated Learning Systems
    Feng, Jie
    Liao, Yanyan
    Liu, Lei
    Pei, Qingqi
    Zhang, Ning
    Li, Keqin
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2025, 24 (04) : 3149 - 3162
  • [3] Scheduling Policies for Federated Learning in Wireless Networks
    Yang, Howard H.
    Liu, Zuozhu
    Quek, Tony Q. S.
    Poor, H. Vincent
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 68 (01) : 317 - 333
  • [4] Federated Learning Over Energy Harvesting Wireless Networks
    Hamdi, Rami
    Chen, Mingzhe
    Ben Said, Ahmed
    Qaraqe, Marwa
    Poor, H. Vincent
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (01) : 92 - 103
  • [5] FedPCC: Parallelism of Communication and Computation for Federated Learning in Wireless Networks
    Zhang, Hong
    Tian, Hao
    Dong, Mianxiong
    Ota, Kaoru
    Jia, Juncheng
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 6 (06): : 1368 - 1377
  • [6] Secure Reputation-Based Authentication With Malicious Detection in VANETs
    Yang, Xu
    Zhu, Fei
    Yang, Xuechao
    Luo, Junwei
    Yi, Xun
    Ning, Jianting
    Huang, Xinyi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 359 - 372
  • [7] Convergence Analysis and System Design for Federated Learning Over Wireless Networks
    Wan, Shuo
    Lu, Jiaxun
    Fan, Pingyi
    Shao, Yunfeng
    Peng, Chenghui
    Letaief, Khaled B.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (12) : 3622 - 3639
  • [8] Scheduling and Aggregation Design for Asynchronous Federated Learning Over Wireless Networks
    Hu, Chung-Hsuan
    Chen, Zheng
    Larsson, Erik G.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2023, 41 (04) : 874 - 886
  • [9] Federated Learning Over Wireless Networks: Challenges and Solutions
    Beitollahi, Mahdi
    Lu, Ning
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (16) : 14749 - 14763
  • [10] Device Scheduling for Secure Aggregation in Wireless Federated Learning
    Yan, Na
    Wang, Kezhi
    Zhi, Kangda
    Pan, Cunhua
    Poor, H. Vincent
    Chai, Kok Keong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (17): : 28851 - 28862