Reputation-Based Federated Learning for Secure Wireless Networks

被引:56
作者
Song, Zhendong [1 ]
Sun, Hongguang [1 ]
Yang, Howard H. [2 ,3 ,4 ]
Wang, Xijun [5 ]
Zhang, Yan [6 ]
Quek, Tony Q. S. [7 ]
机构
[1] Northwest A&F Univ, Coll Informat Engn, Yangling 712100, Shaanxi, Peoples R China
[2] Zhejiang Univ, Zhejiang Univ Univ Illinois Urbana Champaign Inst, Haining 314400, Peoples R China
[3] Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310007, Peoples R China
[4] Univ Illinois, Dept Elect & Comp Engn, Champaign, IL 61820 USA
[5] Sun Yat Sen Univ, Sch Elect & Informat Technol, Guangzhou 510006, Peoples R China
[6] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[7] Singapore Univ Technol & Design, Informat Syst Technol & Design Pillar, Singapore 487372, Singapore
基金
新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Convergence; Data models; Communication system security; Training; Scheduling; Reliability; Wireless networks; Convergence analysis; federated learning (FL); malicious users; reputation-based scheduling policy; secure wireless networks; PRIVACY; FRAMEWORK;
D O I
10.1109/JIOT.2021.3079104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The dilemma between the ever-increasing demands for data processing, and the limited capabilities of mobile devices in a wireless communication system calls for the appearance of federated learning (FL). As a distributed machine learning (ML) method, FL executes in an iterative manner by distributing the global model parameters and aggregating the local model parameters, which avoids the transmission of huge raw data and preserves data privacy during the training process. However, since FL cannot control the local training and transmission process, this gives malicious users the opportunity to deteriorate the global aggregation. We adopt a reputation model based on beta distribution function to measure the credibility of local users, and propose a reputation-based scheduling policy with user fairness constraint. By taking into account the impact of wireless channel conditions and malicious attack features, we derive tractable expressions for the convergence rate of FL in a wireless setting. Moreover, we validate the superiority of the proposed reputation-based scheduling policy via numerical analysis and empirical simulations. The results show that the proposed secure wireless FL framework can not only distinguish malicious users from normal users but also effectively defend against several typical attack types featured in attack intensity and attack frequency. The analysis also reveals that the effect of average attack intensity on the convergence performance of FL is dominated by the percentage of malicious user equipments (UEs), and imposes even greater negative effect on the convergence performance of FL as the percentage of malicious UEs increases.
引用
收藏
页码:1212 / 1226
页数:15
相关论文
共 50 条
  • [31] Reputation-based framework for high integrity sensor networks
    Ganeriwal, Saurabh
    Balzano, Laura K.
    Srivastava, Mani B.
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (03)
  • [32] A Reputation-Based Secure Distributed Control Methodology in D-NCS
    Zeng, Wente
    Chow, Mo-Yuen
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2014, 61 (11) : 6294 - 6303
  • [33] A DAG-Blockchain-Assisted Federated Learning Framework in Wireless Networks: Learning Performance and Throughput Optimization Schemes
    Wang, Qiang
    Xu, Shaoyi
    Xu, Rongtao
    Ai, Bo
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2025, 74 (03) : 5097 - 5113
  • [34] Federated Learning Over Multihop Wireless Networks With In-Network Aggregation
    Chen, Xianhao
    Zhu, Guangyu
    Deng, Yiqin
    Fang, Yuguang
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (06) : 4622 - 4634
  • [35] Efficient Federated Learning Algorithm for Resource Allocation in Wireless IoT Networks
    Van-Dinh Nguyen
    Sharma, Shree Krishna
    Vu, Thang X.
    Chatzinotas, Symeon
    Ottersten, Bjorn
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05) : 3394 - 3409
  • [36] Bandwidth Allocation for Multiple Federated Learning Services in Wireless Edge Networks
    Xu, Jie
    Wang, Heqiang
    Chen, Lixing
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (04) : 2534 - 2546
  • [37] Robust Federated Learning for Unreliable and Resource-Limited Wireless Networks
    Chen, Zhixiong
    Yi, Wenqiang
    Liu, Yuanwei
    Nallanathan, Arumugam
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (08) : 9793 - 9809
  • [38] Client Scheduling in Wireless Federated Learning Based on Channel and Learning Qualities
    Leng, Jichao
    Lin, Zihuai
    Ding, Ming
    Wang, Peng
    Smith, David
    Vucetic, Branka
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (04) : 732 - 735
  • [39] An Overview of Enabling Federated Learning over Wireless Networks
    Foukalas, Fotis
    Tziouvaras, Athanasios
    Tsiftsis, Theodoros A.
    2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021), 2021, : 271 - 276
  • [40] Asynchronous Federated Learning Over Wireless Communication Networks
    Wang, Zhongyu
    Zhang, Zhaoyang
    Tian, Yuqing
    Yang, Qianqian
    Shan, Hangguan
    Wang, Wei
    Quek, Tony Q. S.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (09) : 6961 - 6978