Secure Dynamic Scheduling for Federated Learning in Underwater Wireless IoT Networks
Abstract
:1. Introduction
- An underwater wireless IoT network that enables FL is designed to empower IoT technology. The network consists of edge devices, an FL server, and controllers, where the controllers can assist FL.
- A MAB-based framework is provided to reformulate the dynamic scheduling problem for FL in underwater wireless IoT networks, and both time efficiency and security are jointly considered in the provided framework.
- We introduce a voting mechanism to enhance the security and propose a prediction model to evaluate the security based on the performance of each edge device in order to reduce the communication costs of the voting mechanism.
- We propose a UCB-SC policy for relatively stable underwater wireless IoT networks and a UCB-SCP policy for rapidly changing networks. They can realize the comprehensive optimization of the security and efficiency of FL in underwater wireless IoT networks. The proposed policies are encoded into the smart contract to ensure their proper execution.
- We give the upper bounds of the expected performance regret of our proposed policies and carry out simulation experiments. Overall, we verify our proposed policies’ feasibility both theoretically and experimentally.
2. Background and Related Work
2.1. Efficiency of FL
2.2. Security of FL
3. System Architecture and Problem Formulation
3.1. FL-Enabled Underwater Wireless IoT Network
- Edge devices: These are underwater sensors, robots, or autonomous vehicles equipped with data processing capabilities and local datasets.
- FL server: This is a centralized server responsible for model aggregation, global model broadcasting, and coordinating the federated learning process.
- Controllers: These are trusted entities with the authority to vote on the security of edge devices and generate federated learning tasks based on network needs.
3.2. IoT Edge Device Selection
- Step (1)
- The FL server broadcasts the latest version of the global FL model parameter to all IoT edge devices.
- Step (2)
- The FL server selects a subset of IoT edge devices to participate in local updates in round t.
- Step (3)
- The selected IoT edge devices in upload their trained local gradients to the FL server.
- Step (4)
- The FL server updates the global FL model parameters using the local gradients that were successfully uploaded from the IoT edge devices in according to
3.2.1. Time Efficiency
3.2.2. Security
4. Voting Mechanism for Federated Learning
4.1. Voting Mechanism for Security Index
4.2. IoT Edge Device Scheduling
4.3. UCB-SC Policy
Algorithm 1 Proposed UCB-SC for FL-enabled underwater wireless IoT networks |
Input: FL task. Output: learned FL model. 1: The controllers generate an FL task. 2: The controllers send the FL task to the FL server. 3: begin FL in the underwater wireless IoT network: 4: the FL server: 5: Initialize FL model trained by FL. 6: for do 7: Select a set of IoT edge devices consisting of the -th, …, -th IoT edge devices in . 8: Update and according to (2) and (3), respectively. 9: end for 10: . 11: Select a set of IoT edge devices consisting of the -th, …, K-th IoT edge devices in . 12: Update and according to (2) and (3), respectively. 13: main loop: 14: while do 15: Ask for the controllers’ voting on the IoT edge devices according to Section 4.1. 16: Update by the voting result. 17: for do 18: . 19: Select a set of IoT edge devices according to (9). 20: Update and according to (2) and (3), respectively. 21: end for 22: end while |
4.4. Upper Bound on Regret
5. Security Prediction for Federated Learning
5.1. Trust Evidence Generation
5.1.1. Relative Accuracy
5.1.2. Cosine Similarity Score
5.1.3. Upload Success Rate
5.1.4. Training Efficiency
5.2. Prediction Model Calculation
5.3. IoT Edge Device Scheduling
5.4. UCB-SCP Policy
Algorithm 2 Proposed UCB-SCP for FL-enabled underwater wireless IoT networks |
Input: FL task. Output: learned FL model. 1: The controllers generate an FL task. 2: The controllers send the FL task to the FL server. 3: begin FL in the underwater wireless IoT network: 4: the FL server: 5: Initialize FL model trained by FL. 6: for do 7: Select a set of IoT edge devices consisting of the -th, …, -th IoT edge devices in . 8: Update according to (2), (3), (13), (14), (15) and (16), respectively. 9: end for 10: . 11: Select a set of IoT edge devices consisting of the -th, …, K-th IoT edge devices in . 12: Update according to (2), (3), (13), (14), (15) and (16), respectively. 13: main loop: 14: while do 15: Ask for the controllers’ voting on the IoT edge devices according to Section 4.1. 16: Update security prediction model according to last and new labeled dataset according to Section 5.2. 17: for do 18: 19: Select a set of IoT edge devices according to (18). 20: Update according to (2), (3), (13), (14), (15) and (16), respectively. 21: end for 22: end while |
5.5. Upper Bound on Regret
6. Numerical Experiments
6.1. Methodology for Data Analysis
- Cumulative Selected Malicious Edge Devices Rate: The proportion of malicious devices selected for FL training over time.
- Cumulative Selected Failed Edge Devices Rate: The proportion of devices that failed to complete a training round (due to timeouts or malicious behavior) over time.
- Performance Gap (): The difference between the expected reward of the optimal scheduling policy and the actual reward achieved by the proposed policies.
- Test Accuracy: The accuracy of the trained FL model on a separate test dataset.
6.2. Experiment Settings
- Number of edge devices (K): 20;
- Maximum number of selected devices per round (N): 4;
- Communication rounds (T): 30,000;
- Voting interval (I): varied among experiments (e.g., 1, 5, or 10 rounds);
- Data batch size (): 6 for all edge devices;
- Learning rate (): 0.005.
6.3. Numerical Results
6.4. Discussion
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A. Proof of Theorem 1
References
- Xu, G.; Shi, Y.; Sun, X.; Shen, W. Internet of things in marine environment monitoring: A review. Sensors 2019, 19, 1711. [Google Scholar] [CrossRef] [PubMed]
- Zhou, L.; Pan, S.; Wang, J.; Vasilakos, A.V. Machine learning on big data: Opportunities and challenges. Neurocomputing 2017, 237, 350–361. [Google Scholar] [CrossRef]
- Zhao, C.; Thies, P.R.; Johanning, L. Offshore inspection mission modelling for an ASV/ROV system. Ocean. Eng. 2022, 259, 111899. [Google Scholar] [CrossRef]
- Fun Sang Cepeda, M.; Freitas Machado, M.d.S.; Sousa Barbosa, F.H.; Santana Souza Moreira, D.; Legaz Almansa, M.J.; Lourenço de Souza, M.I.; Caprace, J.D. Exploring Autonomous and Remotely Operated Vehicles in Offshore Structure Inspections. J. Mar. Sci. Eng. 2023, 11, 2172. [Google Scholar] [CrossRef]
- McMahan, B.; Moore, E.; Ramage, D.; Hampson, S.; Arcas, B.A. Communication-efficient learning of deep networks from decentralized data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS), Fort Lauderdale, FL, USA, 20–22 April 2017; pp. 1273–1282. [Google Scholar]
- Szabo, N. The idea of smart contracts. Nick Szabo’S Pap. Concise Tutor. 1997, 6, 199. [Google Scholar]
- Luu, L.; Chu, D.H.; Olickel, H.; Saxena, P.; Hobor, A. Making smart contracts smarter. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 254–269. [Google Scholar]
- Luping, W.; Wei, W.; Bo, L. CMFL: Mitigating communication overhead for federated learning. In Proceedings of the IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–9 July 2019; pp. 954–964. [Google Scholar]
- Cho, Y.J.; Wang, J.; Joshi, G. Client selection in federated learning: Convergence analysis and power-of-choice selection strategies. arXiv 2020, arXiv:2010.01243. [Google Scholar]
- Zhang, T.; Lam, K.Y.; Zhao, J.; Feng, J. Joint Device Scheduling and Bandwidth Allocation for Federated Learning over Wireless Networks. IEEE Trans. Wirel. Commun. 2023. early access. [Google Scholar] [CrossRef]
- Yang, D.; Zhang, W.; Ye, Q.; Zhang, C.; Zhang, N.; Huang, C.; Zhang, H.; Shen, X. DetFed: Dynamic Resource Scheduling for Deterministic Federated Learning Over Time-Sensitive Networks. IEEE Trans. Mob. Comput. 2024, 23, 5162–5178. [Google Scholar] [CrossRef]
- Perazzone, J.; Wang, S.; Ji, M.; Chan, K.S. Communication-Efficient Device Scheduling for Federated Learning Using Stochastic Optimization. In Proceedings of the IEEE INFOCOM 2022—IEEE Conference on Computer Communications, Virtual, 2–5 May 2022; pp. 1449–1458. [Google Scholar] [CrossRef]
- Xia, W.; Quek, T.Q.S.; Guo, K.; Wen, W.; Yang, H.H.; Zhu, H. Multi-Armed Bandit Based Client Scheduling for Federated Learning. IEEE Trans. Wireless Commun. 2020, 19, 7108–7123. [Google Scholar]
- Yoshida, N.; Nishio, T.; Morikura, M.; Yamamoto, K. MAB-based client selection for federated learning with uncertain resources in mobile networks. In Proceedings of the IEEE Global Communications Conference Workshops, Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar]
- Huang, T.; Lin, W.; Wu, W.; He, L.; Li, K.; Zomaya, A.Y. An efficiency-boosting client selection scheme for federated learning with fairness guarantee. IEEE Trans. Parallel Distrib. Syst. 2020, 32, 1552–1564. [Google Scholar] [CrossRef]
- Xu, B.; Xia, W.; Zhang, J.; Quek, T.Q.; Zhu, H. Online client scheduling for fast federated learning. IEEE Wireless Commun. Lett. 2021, 10, 1434–1438. [Google Scholar] [CrossRef]
- Ciucanu, R.; Delabrouille, A.; Lafourcade, P.; Soare, M. Secure Protocols for Best Arm Identification in Federated Stochastic Multi-Armed Bandits. IEEE Trans. Depend. Sec. Comput. 2022, 20, 1378–1389. [Google Scholar] [CrossRef]
- Taylor, P.J.; Dargahi, T.; Dehghantanha, A.; Parizi, R.M.; Choo, K.K.R. A systematic literature review of blockchain cyber security. Digit. Commun. Netw. 2020, 6, 147–156. [Google Scholar] [CrossRef]
- Kim, H.; Park, J.; Bennis, M.; Kim, S.L. Blockchained on-device federated learning. IEEE Commun. Lett. 2019, 24, 1279–1283. [Google Scholar] [CrossRef]
- Lu, Y.; Huang, X.; Dai, Y.; Maharjan, S.; Zhang, Y. Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans. Ind. Informat. 2019, 16, 4177–4186. [Google Scholar] [CrossRef]
- Xu, Y.; Lu, Z.; Gai, K.; Duan, Q.; Lin, J.; Wu, J.; Choo, K.K.R. BESIFL: Blockchain Empowered Secure and Incentive Federated Learning Paradigm in IoT. IEEE Internet Things J. 2021, 10, 6561–6573. [Google Scholar] [CrossRef]
- Deng, R.; Du, X.; Lu, Z.; Duan, Q.; Huang, S.C.; Wu, J. HSFL: Efficient and Privacy-Preserving Offloading for Split and Federated Learning in IoT Services. In Proceedings of the 2023 IEEE International Conference on Web Services (ICWS), Chicago, IL, USA, 2–8 July 2023; pp. 658–668. [Google Scholar] [CrossRef]
- Chen, L.; Ding, X.; Bao, Z.; Zhou, P.; Jin, H. Differentially Private Federated Learning on Non-iid Data: Convergence Analysis and Adaptive Optimization. IEEE Trans. Knowl. Data Eng. 2024, 36, 4567–4581. [Google Scholar] [CrossRef]
- Jiang, L.; Zheng, H.; Tian, H.; Xie, S.; Zhang, Y. Cooperative federated learning and model update verification in blockchain empowered digital twin edge networks. IEEE Internet Things J. 2021, 9, 11154–11167. [Google Scholar] [CrossRef]
- Zhu, R.; Boukerche, A.; Feng, L.; Yang, Q. A trust management-based secure routing protocol with AUV-aided path repairing for Underwater Acoustic Sensor Networks. Ad Hoc Netw. 2023, 149, 103212. [Google Scholar] [CrossRef]
- Han, G.; He, Y.; Jiang, J.; Wang, H.; Peng, Y.; Fan, K. Fault-tolerant trust model for hybrid attack mode in underwater acoustic sensor networks. IEEE Netw. 2020, 34, 330–336. [Google Scholar] [CrossRef]
- El Faqir, Y.; Arroyo, J.; Hassan, S. An overview of decentralized autonomous organizations on the blockchain. In Proceedings of the 16th International Symposium on Open Collaboration, Virtual, 26–27 August 2020; pp. 1–8. [Google Scholar]
- Li, K.; Li, H.; Hou, H.; Li, K.; Chen, Y. Proof of vote: A high-performance consensus protocol based on vote mechanism & consortium blockchain. In Proceedings of the IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Bangkok, Thailand, 18–20 December 2017; pp. 466–473. [Google Scholar]
- Lai, T.L.; Robbins, H. Asymptotically efficient adaptive allocation rules. Adv. Appl. Math. 1985, 6, 4–22. [Google Scholar] [CrossRef]
- Bubeck, S.; Cesa-Bianchi, N. Regret analysis of stochastic and nonstochastic multi-armed bandit problems. Found. Trends Mach. Learn. 2012, 5, 1–122. [Google Scholar] [CrossRef]
- Gai, Y.; Krishnamachari, B.; Jain, R. Combinatorial network optimization with unknown variables: Multi-armed bandits with linear rewards and individual observations. IEEE/ACM Trans. Netw. 2012, 20, 1466–1478. [Google Scholar] [CrossRef]
- Auer, P.; Cesa-Bianchi, N.; Fischer, P. Finite-time analysis of the multiarmed bandit problem. Mach. Learn. 2002, 47, 235–256. [Google Scholar] [CrossRef]
- Mohanta, B.K.; Panda, S.S.; Jena, D. An overview of smart contract and use cases in blockchain technology. In Proceedings of the IEEE 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Bengaluru, India, 10–12 July 2018; pp. 1–4. [Google Scholar]
- Zhu, L.; Wu, Y.; Gai, K.; Choo, K.K.R. Controllable and trustworthy blockchain-based cloud data management. Future Gener. Comput. Syst. 2018, 91, 527–535. [Google Scholar] [CrossRef]
- Huang, X.; Ye, D.; Yu, R.; Shu, L. Securing parked vehicle assisted fog computing with blockchain and optimal smart contract design. IEEE/CAA J. Autom. Sin. 2020, 7, 426–441. [Google Scholar] [CrossRef]
- Cao, X.; Fang, M.; Liu, J.; Gong, N.Z. Fltrust: Byzantine-robust federated learning via trust bootstrapping. arXiv 2020, arXiv:2012.13995. [Google Scholar]
- Bonawitz, K.; Ivanov, V.; Kreuter, B.; Marcedone, A.; McMahan, H.B.; Patel, S.; Ramage, D.; Segal, A.; Seth, K. Practical secure aggregation for federated learning on user-held data. arXiv 2016, arXiv:1611.04482. [Google Scholar]
- Mothukuri, V.; Parizi, R.M.; Pouriyeh, S.; Huang, Y.; Dehghantanha, A.; Srivastava, G. A survey on security and privacy of federated learning. Future Gener. Comput. Syst. 2021, 115, 619–640. [Google Scholar] [CrossRef]
- Bishop, C.M. Pattern recognition and machine learning; Springer: Berlin/Heidelberg, Germany, 2006; Volume 2, pp. 1122–1128. [Google Scholar]
- LeCun, Y.; Bengio, Y.; Hinton, G. Deep learning. Nature 2015, 521, 436–444. [Google Scholar] [CrossRef]
- Cybenko, G. Approximation by superpositions of a sigmoidal function. Math. Control. Signals Syst. 1989, 2, 303–314. [Google Scholar] [CrossRef]
- Hornik, K.; Stinchcombe, M.; White, H. Multilayer feedforward networks are universal approximators. Neural Netw. 1989, 2, 359–366. [Google Scholar] [CrossRef]
- Leshno, M.; Lin, V.Y.; Pinkus, A.; Schocken, S. Multilayer feedforward networks with a nonpolynomial activation function can approximate any function. Neural Netw. 2005, 6, 861–867. [Google Scholar] [CrossRef]
- Xu, J.; Kishk, M.A.; Zhang, Q.; Alouini, M.S. Three-Hop Underwater Wireless Communications: A Novel Relay Deployment Technique. IEEE Internet Things J. 2023, 10, 13354–13369. [Google Scholar] [CrossRef]
- Saeed, N.; Celik, A.; Al-Naffouri, T.Y.; Alouini, M.S. Energy Harvesting Hybrid Acoustic-Optical Underwater Wireless Sensor Networks Localization. Sensors 2018, 18, 51. [Google Scholar] [CrossRef] [PubMed]
- Pollard, D. Convergence of Stochastic Processes; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
Abbreviation | Full Form |
---|---|
FL | federated learning |
IoT | Internet of Things |
MAB | multi-armed bandit |
UCB-SC | upper-confidence-bound-based smart contract |
UCB-SCP | UCB-SC with a security prediction model |
AUV | autonomous underwater vehicle |
ROV | remotely operated vehicle |
ML | machine learning |
AI | artificial intelligence |
CSI | channel state information |
FNN | feedforward neural network |
CNN | convolutional neural network |
Policy Name | Description | Main Characteristics | Critical Parameters |
---|---|---|---|
Random Policy | Edge devices are selected randomly for each round of FL training. | No consideration of security or time efficiency. | Number of devices selected per round (N). |
CS-UCB Policy | Edge devices are selected based solely on their previous performance in terms of time efficiency (time latency). | Focuses on maximizing time efficiency, but ignores security considerations. | Maximum number of devices selected per round (N), time efficiency return (). |
UCB-SC Policy | Edge devices are selected using the UCB algorithm with a voting mechanism to assess security. The voting mechanism provides a real-time security score for each device. | Balances time efficiency and security by incorporating voting and UCB. | Maximum number of devices selected per round (N), time efficiency return (), security index (), voting interval (I). |
UCB-SCP Policy | Edge devices are selected using the UCB algorithm with a security prediction model that estimates device security based on trust evidence. | Integrates a security prediction model to enhance real-time security assessment and reduce communication overhead. | Maximum number of devices selected per round (N), time efficiency return (), trust evidence, security prediction model parameters. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yan, L.; Wang, L.; Li, G.; Shao, J.; Xia, Z. Secure Dynamic Scheduling for Federated Learning in Underwater Wireless IoT Networks. J. Mar. Sci. Eng. 2024, 12, 1656. https://doi.org/10.3390/jmse12091656
Yan L, Wang L, Li G, Shao J, Xia Z. Secure Dynamic Scheduling for Federated Learning in Underwater Wireless IoT Networks. Journal of Marine Science and Engineering. 2024; 12(9):1656. https://doi.org/10.3390/jmse12091656
Chicago/Turabian StyleYan, Lei, Lei Wang, Guanjun Li, Jingwei Shao, and Zhixin Xia. 2024. "Secure Dynamic Scheduling for Federated Learning in Underwater Wireless IoT Networks" Journal of Marine Science and Engineering 12, no. 9: 1656. https://doi.org/10.3390/jmse12091656
APA StyleYan, L., Wang, L., Li, G., Shao, J., & Xia, Z. (2024). Secure Dynamic Scheduling for Federated Learning in Underwater Wireless IoT Networks. Journal of Marine Science and Engineering, 12(9), 1656. https://doi.org/10.3390/jmse12091656