Enhancing efficiency and privacy of federated learning systems for IoT applications
项目来源
项目主持人
项目受资助机构
立项年度
立项时间
项目编号
研究期限
项目级别
受资助金额
学科
学科代码
基金类别
关键词
参与者
参与机构
1.DETR-BAL: Decentralized mobile sensing intrusion detection via latent mining and Bayesian local optimization
- 关键词:
- Global optimization;Intrusion detection;Network security;Optimal control systems;Bayesian;Committee mechanism;Decentralised;In-field;Intrusion Detection Systems;Intrusion-Detection;Local optimizations;MCS;Mobile sensing;User selection
- Zhang, Chen;Lian, Zhuotao;Wang, Weiyu;Huang, Huakun;Su, Chunhua
- 《Future Generation Computer Systems》
- 2026年
- 174卷
- 期
- 期刊
With the rapid proliferation of mobile sensing in fields such as personal health monitoring in data processing are becoming more prominent. This paper introduces a decentralized DETR framework inspired by blockchain proof-of-work consensus. The framework trains models locally on each device and evaluates the device's reputation based on its historical performance. Only devices meeting predefined criteria are admitted to the update committee, which enhances security. This mechanism reduces reliance on centralized servers and minimizes infrastructure costs. While a supervisory operator ensures the smooth operation of the system. To further enhance trust, we propose a credibility assessment method that integrates risk metrics with data quality scores via a non-cooperative game-theoretic model. By achieving Nash equilibrium, this method not only guarantees local optimality but also prioritizes users who provide high-quality, low-risk data, thereby promoting timely committee updates to achieve global optimality. As a complement to DETR, we propose BAL-IDS, an advanced intrusion detection system (IDS) that extracts latent features using autoencoders and dynamically fine-tunes the hyperparameters of OCSVM using a Bayesian joint local agent optimization strategy. This dual approach enhances the system's resilience to complex threats, especially those that exploit requester feedback mechanisms. Experiments show that our research is superior to traditional schemes. © 2025 Elsevier B.V.
...2.A Reputation-Aware Defense Framework for Strategic Behaviors in Federated Learning
- 关键词:
- Learning systems;Nash equilibrium;Privacy-preserving techniques;Incentive mechanism;Model convergence;Model training;Multi-dimensional dynamics;Privacy preserving;Reputation modeling;Reputation systems;Robust aggregation;Strategic Behavior;Trust management
- Cai, Yixuan;Xu, Jianbo;Lian, Zhuotao;Brian, Kei Chi Wing;Li, Yuxing;Xu, Jiantao
- 《Telecom》
- 2025年
- 6卷
- 3期
- 期刊
Federated Learning (FL) enables privacy-preserving model training across distributed clients. However, its reliance on voluntary client participation makes it vulnerable to strategic behaviors—actions that are not overtly malicious but significantly impair model convergence and fairness. Existing defense methods primarily focus on explicit attacks, overlooking the challenges posed by economically motivated "pseudo-honest" clients. To address this gap, we propose a Reputation-Aware Defense Framework to mitigate strategic behaviors in FL. This framework introduces a multi-dimensional dynamic reputation model that evaluates client behaviors based on gradient alignment, participation consistency, and update stability. The resulting reputation scores are incorporated into both aggregation and incentive mechanisms, forming a behavior-feedback loop that rewards honest participation and penalizes opportunistic strategies. We theoretically prove the convergence of reputation scores, the suppression of low-quality updates in aggregation, and the emergence of honest participation as a Nash equilibrium under the incentive mechanism. Experiments on datasets such as CIFAR-10, FEMNIST, MIMIC-III demonstrate that our approach significantly outperforms baseline methods in accuracy, fairness, and robustness, even when up to 60% of clients act strategically. This study bridges trust modeling and robust optimization in FL, offering a secure foundation for federated systems operating in open and incentive-driven environments. © 2025 by the authors.
...3.RTCS: An Improved Real-Time Credibility-Based Intrusion Detection System
- 关键词:
- Internet of Things; Security; Authentication; Real-time systems;Protocols; Encryption; Cryptography; Servers; Machine learningalgorithms; Hash functions; Credibility; Internet of Things (IoT);machine learning; permission; protocol; real-time credibility system(RTCS)
- Zhang, Chen;Lian, Zhuotao;Huang, Huakun;Su, Chunhua
- 《IEEE INTERNET OF THINGS JOURNAL》
- 2025年
- 12卷
- 8期
- 期刊
The Internet of Things (IoT) connects physical devices to the Internet via open communication protocols. Malicious actors can exploit vulnerabilities to steal data or manipulate critical IoT settings, so there is a need for strong security measures. We propose an improved real-time intrusion detection system (IDS) called the real-time credibility system (RTCS), which utilizes traffic statistics and authentication analysis to compute credibility. RTCS performs the authentication process by utilizing elliptic curve encryption and decryption operations, basic symmetric encryption, and hash functions. This process enables anonymous mutual authentication between IoT devices. Subsequently, RTCS accesses sparsified user history data and introduces flexibility in calculating user credibility by employing an adapted secondary paradigm combined with preset "tolerance parameters," which serve as optimal thresholds for classifying different users. When a normal user violates regulations, their credibility decreases by a specified degree. If a high-risk user commits another violation, RTCS cannot tolerate it, leading to a rapid decline in their credibility. RTCS implements diversion measures and provides assisted decision scores for different users. Experimental results demonstrate that our method achieves an F1-score of 0.9707 and an area under the curve score of 0.9535. Compared to other works, RTCS exhibits superior performance and proactivity.
...4.Asynchronous Remote Distributed Key Generation Method for Securing User Data in the Metaverse
- 关键词:
- Blockchain;Heterogeneous networks;Asynchronous;Block-chain;Distributed key generation;Electronic technologies;Generation method;Key generation;Metaverses;Security;User data
- Wang, Yintong;Fang, Guowei;Huang, Shitao;Lian, Zhuotao;Ren, Yongjun
- 《IEEE Transactions on Consumer Electronics》
- 2024年
- 卷
- 期
- 期刊
The rapid development of consumer electronics technology has greatly promoted the progress of the metaverse. However, as a digitized virtual environment, the metaverse imposes high demands on the security of user identities and assets. In this context, asynchronous remote distributed key generation has become one of the key technologies to ensure the security of the metaverse. Unlike traditional key generation methods, the asynchronous nature makes the distributed key generation process more flexible, helping to address the dynamic and heterogeneous network environment within the metaverse. This paper proposes an asynchronous remote key generation method. This method employs public-key cryptography and basic asynchronous primitives to accomplish remote key generation and exchange through encryption and decryption operations between different nodes. In comparison to traditional methods, the asynchronous remote key generation approach provides higher security and reliability, while also showcasing increased efficiency and flexibility. IEEE
...5.MarkFL: Efficient Watermarking in Federated Learning via Parallel Training and Weighted Averaging
- 关键词:
- Watermarking; Training; Servers; Computational modeling; Data models;Adaptation models; Protection; IP networks; Scalability; Robustness;Data privacy; federated learning (FL); model theft; watermarking;weighted averaging
- Lian, Zhuotao;Wang, Weiyu;Zhang, Chen;Su, Chunhua;Sakurai, Kouichi
- 《IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS》
- 2025年
- 卷
- 期
- 期刊
Federated learning (FL) has become an essential enabler of distributed intelligence in cyber-physical-social systems (CPSSs), facilitating decentralized collaboration while upholding data privacy. As CPSS applications increasingly rely on federated models for tasks such as predictive analytics and decision-making, safeguarding the intellectual property of these models has emerged as a pressing concern. To address this, we propose MarkFL, an efficient and easy-to-implement watermarking approach tailored for federated models in CPSS environments. MarkFL enables clients to locally train their models on original tasks while the server simultaneously trains its model on a watermark set. During the weighted averaging phase, a new global model embedded with the watermark is generated. This approach ensures no additional time overhead and offers precise control over its impact on the primary tasks, making MarkFL both efficient and practical for diverse applications. Through experiments on the CIFAR-10 dataset, we demonstrate that MarkFL seamlessly integrates into the FL process while maintaining resilience against watermark removal attacks. To further optimize its performance, we introduced a watermark set generated using minimal training samples, showcasing its potential as a robust and practical solution for real-world FL scenarios.
...6.Privacy-Enhanced Federated WiFi Sensing for Health Monitoring in the Internet of Things
- 关键词:
- Adversarial machine learning;Differential privacy;Electronic health record;Analysis capabilities;Centralised;Consumer electronic devices;Data collection;Health monitoring;Model sparsification;Monitoring applications;Secret-sharing;Sparsification;Wifi sensing
- Lian, Zhuotao;Zeng, Qingkui;Liu, Zhusen;Wang, Haoda;Ma, Chuan;Meng, Weizhi;Su, Chunhua;Sakuraiz, Kouichi
- 《IEEE Internet of Things Journal》
- 2024年
- 卷
- 期
- 期刊
The development of the Internet of Things (IoT) has led to the widespread use of WiFi-enabled consumer electronic devices, which are now common in everyday life. These advancements in IoT have greatly improved data collection and analysis capabilities, especially for health monitoring applications. However, traditional centralized machine learning methods often fall short, raising significant privacy concerns and requiring extensive data collection, which is inefficient. To address these limitations within the distributed IoT environment, this paper presents a federated learning-based WiFi sensing system specifically designed for health monitoring. By enabling local model training, our system prevents the sharing of sensitive data, thus reducing the risk of privacy breaches. We further enhance our system with a secret sharing mechanism coupled with model sparsification to significantly improve privacy. Additionally, our improved Top-k model sparsification algorithm, equipped with adaptive residuals, reduces communication overhead while ensuring high accuracy. Extensive testing across various datasets and models confirms that our system outperforms existing benchmarks in terms of privacy protection and communication efficiency, marking a substantial advancement in health monitoring within the IoT. © 2014 IEEE.
...
