Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
144 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Securing NextG Systems against Poisoning Attacks on Federated Learning: A Game-Theoretic Solution (2312.17164v1)

Published 28 Dec 2023 in cs.NI, cs.AI, cs.CR, cs.DC, and cs.LG

Abstract: This paper studies the poisoning attack and defense interactions in a federated learning (FL) system, specifically in the context of wireless signal classification using deep learning for next-generation (NextG) communications. FL collectively trains a global model without the need for clients to exchange their data samples. By leveraging geographically dispersed clients, the trained global model can be used for incumbent user identification, facilitating spectrum sharing. However, in this distributed learning system, the presence of malicious clients introduces the risk of poisoning the training data to manipulate the global model through falsified local model exchanges. To address this challenge, a proactive defense mechanism is employed in this paper to make informed decisions regarding the admission or rejection of clients participating in FL systems. Consequently, the attack-defense interactions are modeled as a game, centered around the underlying admission and poisoning decisions. First, performance bounds are established, encompassing the best and worst strategies for attackers and defenders. Subsequently, the attack and defense utilities are characterized within the Nash equilibrium, where no player can unilaterally improve its performance given the fixed strategies of others. The results offer insights into novel operational modes that safeguard FL systems against poisoning attacks by quantifying the performance of both attacks and defenses in the context of NextG communications.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (23)
  1. T. Erpek, T. O’Shea, Y. E. Sagduyu, Y. Shi, and T. C. Clancy, “Deep learning for wireless communications,” in Development and Analysis of Deep Learning Architectures, Springer, 2020.
  2. Z. Yang, M. Chen, K.-K. Wong, H. V. Poor, and S. Cui, “Federated learning for 6G: Applications, challenges, and opportunities,” Engineering, vol. 8, pp. 33–41, 2022.
  3. S. Niknam, H. S. Dhillon, and J. H. Reed, “Federated learning for wireless communications: Motivation, opportunities, and challenges,” IEEE Communications Magazine, vol. 58, no. 6, pp. 46–51, 2020.
  4. M. Chen, D. Gündüz, K. Huang, W. Saad, M. Bennis, A. V. Feljan, and H. V. Poor, “Distributed learning in wireless networks: Recent progress and future challenges,” IEEE Journal on Selected Areas in Communications, vol. 39, no. 12, pp. 3579–3605, 2021.
  5. M. Chen, Z. Yang, W. Saad, C. Yin, H. V. Poor, and S. Cui, “A joint learning and communications framework for federated learning over wireless networks,” IEEE Transactions on Wireless Communications, vol. 20, no. 1, pp. 269–283, 2020.
  6. Y. Liu, J. Peng, J. Kang, A. M. Iliyasu, D. Niyato, and A. A. Abd El-Latif, “A secure federated learning framework for 5G networks,” IEEE Wireless Communications, vol. 27, no. 4, pp. 24–31, 2020.
  7. Y. Shi, Y. E. Sagduyu, and T. Erpek, “Federated learning for distributed spectrum sensing in NextG communication networks,” in SPIE Defense + Commercial Sensing, 2022.
  8. H. Zhang, C. Yang, and B. Dai, “When wireless federated learning meets physical layer security: The fundamental limits,” in IEEE INFOCOM Workshops, 2022.
  9. K. Donahue and J. Kleinberg, “Model-sharing games: Analyzing federated learning under voluntary participation,” in AAAI Conference on Artificial Intelligence, vol. 35, pp. 5303–5311, 2021.
  10. Y. E. Sagduyu, “Free-rider games for federated learning with selfish clients in NextG wireless networks,” in IEEE Conference on Communications and Network Security (CNS), 2022.
  11. Y. Shi and Y. E. Sagduyu, “How to launch jamming attacks on federated learning in NextG wireless networks,” in IEEE Global Communications Conference (Globecom) Workshops, 2022.
  12. Y. Shi, Y. E. Sagduyu, and T. Erpek, “Jamming attacks on decentralized federated learning in general multi-hop wireless networks,” in IEEE INFOCOM Workshops, 2023.
  13. T. Erpek, Y. E. Sagduyu, and Y. Shi, “Deep learning for launching and mitigating wireless jamming attacks,” IEEE Transactions on Cognitive Communications and Networking, vol. 5, pp. 2–14, March 2019.
  14. D. Adesina, C.-C. Hsieh, Y. E. Sagduyu, and L. Qian, “Adversarial machine learning in wireless communications using RF data: A review,” IEEE Communications Surveys & Tutorials, vol. 25, pp. 77–100, 2023.
  15. Y. E. Sagduyu, T. Erpek, and Y. Shi, “Adversarial machine learning for 5G communications security,” Game Theory and Machine Learning for Cyber Security, pp. 270–288, 2021.
  16. J. Liu, M. Nogueira, J. Fernandes, and B. Kantarci, “Adversarial machine learning: A multilayer review of the state-of-the-art and challenges for wireless and mobile systems,” IEEE Communications Surveys & Tutorials, vol. 24, no. 1, pp. 123–159, 2021.
  17. Y. E. Sagduyu, Y. Shi, and T. Erpek, “Adversarial deep learning for over-the-air spectrum poisoning attacks,” IEEE Transactions on Mobile Computing, vol. 20, no. 2, pp. 306–319, 2019.
  18. Z. Luo, S. Zhao, Z. Lu, J. Xu, and Y. E. Sagduyu, “When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing,” IEEE Transactions on Mobile Computing, vol. 21, no. 5, pp. 1892–1908, 2020.
  19. Y. E. Sagduyu, Y. Shi, and T. Erpek, “IoT network security from the perspective of adversarial deep learning,” in IEEE Conference on Sensing, Communication, and Networking (SECON), 2019.
  20. Y. E. Sagduyu, R. A. Berry, and A. Ephremides, “Jamming games in wireless networks with incomplete information,” IEEE Communications Magazine, vol. 49, no. 8, pp. 112–118, 2011.
  21. A. Garnaev, A. P. Petropulu, W. Trappe, and H. V. Poor, “A jamming game with rival-type uncertainty,” IEEE Transactions on Wireless Communications, vol. 19, no. 8, pp. 5359–5372, 2020.
  22. Y. E. Sagduyu, “Adversarial machine learning and defense game for NextG signal classification with deep learning,” in IEEE Military Communications Conference (MILCOM), 2022.
  23. B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. Arcas, “Communication-efficient learning of deep networks from decentralized data,” in Artificial Intelligence and Statistics, PMLR, 2017.
Citations (1)

Summary

We haven't generated a summary for this paper yet.