Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (32)

Search Parameters:
Keywords = Byzantine robust

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
18 pages, 1005 KiB  
Article
FedEach: Federated Learning with Evaluator-Based Incentive Mechanism for Human Activity Recognition
by Hyun Woo Lim, Sean Yonathan Tanjung, Ignatius Iwan, Bernardo Nugroho Yahya and Seok-Lyong Lee
Sensors 2025, 25(12), 3687; https://doi.org/10.3390/s25123687 - 12 Jun 2025
Viewed by 446
Abstract
Federated learning (FL) is a decentralized approach that aims to establish a global model by aggregating updates from diverse clients without sharing their local data. However, the approach becomes complicated when Byzantine clients join with arbitrary manipulation, referred to as malicious clients. Classical [...] Read more.
Federated learning (FL) is a decentralized approach that aims to establish a global model by aggregating updates from diverse clients without sharing their local data. However, the approach becomes complicated when Byzantine clients join with arbitrary manipulation, referred to as malicious clients. Classical techniques, such as Federated Averaging (FedAvg), are insufficient to incentivize reliable clients and discourage malicious clients. Other existing Byzantine FL schemes to address malicious clients are either incentive-reliable clients or need-to-provide server-labeled data as the public validation dataset, which increase time complexity. This study introduces a federated learning framework with an evaluator-based incentive mechanism (FedEach) that offers robustness with no dependency on server-labeled data. In this framework, we introduce evaluators and participants. Unlike the existing approaches, the server selects the evaluators and participants among the clients using model-based performance evaluation criteria such as test score and reputation. Afterward, the evaluators assess and evaluate whether a participant is reliable or malicious. Subsequently, the server exclusively aggregates models from these identified reliable participants and the evaluators for global model updates. After this aggregation, the server calculates each client’s contribution, prioritizing each client’s contribution to ensure the fair recognition of high-quality updates and penalizing malicious clients based on their contributions. Empirical evidence obtained from the performance in human activity recognition (HAR) datasets highlights FedEach’s effectiveness, especially in environments with a high presence of malicious clients. In addition, FedEach maintains computational efficiency so that it is reliable for efficient FL applications such as sensor-based HAR with wearable devices and mobile sensing. Full article
(This article belongs to the Special Issue Wearable Devices for Physical Activity and Healthcare Monitoring)
Show Figures

Figure 1

17 pages, 1082 KiB  
Article
FedOPCS: An Optimized Poisoning Countermeasure for Non-IID Federated Learning with Privacy-Preserving Stability
by Fenhua Bai, Yinqi Zhao, Tao Shen, Kai Zeng, Xiaohui Zhang and Chi Zhang
Symmetry 2025, 17(5), 782; https://doi.org/10.3390/sym17050782 - 19 May 2025
Viewed by 507
Abstract
Federated learning (FL), as a distributed machine learning framework, enables multiple participants to jointly train models without sharing data, thereby ensuring data privacy and security. However, FL systems still struggle to escape the typical poisoning threat launched by Byzantine nodes. The current defence [...] Read more.
Federated learning (FL), as a distributed machine learning framework, enables multiple participants to jointly train models without sharing data, thereby ensuring data privacy and security. However, FL systems still struggle to escape the typical poisoning threat launched by Byzantine nodes. The current defence measures almost all rely on the anomaly detection of local gradients in a plaintext state, which not only weakens privacy protection but also allows malicious clients to upload malicious ciphertext gradients once they are encrypted, which thus easily evade existing screenings. At the same time, mainstream aggregation algorithms are generally based on the premise that “each client’s data satisfy an independent and identically distributed (IID)”, which is obviously difficult to achieve in real scenarios where large-scale terminal devices hold their own data. Symmetry in data distribution and model updates across clients is crucial for achieving robust and fair aggregation, yet non-IID data and adversarial attacks disrupt this balance. To address these challenges, we propose FedOPCS, an optimized poisoning countermeasure for non-IID FL algorithms with privacy-preserving stability by introducing three key innovations: Conditional Generative Adversarial Network (CGAN)-based data augmentation with conditional variables to simulate global distribution, a dynamic weight adjustment mechanism with homomorphic encryption, and two-stage anomaly detection combining gradient analysis and model performance evaluation. Extensive experiments on MNIST and CIFAR-10 show that, in the model poisoning and mixed poisoning environments, FedOPCS outperforms the baseline methods by 11.4% and 4.7%, respectively, while maintaining the same efficiency as FedAvg. FedOPCS therefore offers a privacy-preserving, Byzantine-robust, and communication-efficient solution for future heterogeneous FL deployments. Full article
Show Figures

Figure 1

16 pages, 2564 KiB  
Article
5G-Practical Byzantine Fault Tolerance: An Improved PBFT Consensus Algorithm for the 5G Network
by Xin Liu, Xing Fan, Baoning Niu and Xianrong Zheng
Information 2025, 16(3), 202; https://doi.org/10.3390/info16030202 - 5 Mar 2025
Cited by 1 | Viewed by 1214
Abstract
The consensus algorithm is the core technology of blockchain systems to maintain data consistency, and its performance directly affects the efficiency and security of the whole system. Practical Byzantine Fault Tolerance (PBFT) plays a crucial role in blockchain consensus algorithms by providing a [...] Read more.
The consensus algorithm is the core technology of blockchain systems to maintain data consistency, and its performance directly affects the efficiency and security of the whole system. Practical Byzantine Fault Tolerance (PBFT) plays a crucial role in blockchain consensus algorithms by providing a robust mechanism to achieve fault-tolerant and deterministic consensus in distributed networks. With the development of 5G network technology, its features of high bandwidth, low latency, and high reliability provide a new approach for consensus algorithm optimization. To take advantage of the features of the 5G network, this paper proposes 5G-PBFT, which is an improved practical Byzantine fault-tolerant consensus algorithm with three ways to improve PBFT. Firstly, 5G-PBFT constructed the reputation model based on node performance and behavior. The model dynamically selected consensus nodes based on the reputation value to ensure the reliability of the consensus node selection. Next, the algorithm selected the primary node using the reputation model and verifiable random function, giving consideration to the reliability of the primary node and the randomness of the selection process. Finally, we take advantage of the low latency feature of the 5G network to omit the submission stage to reduce the communication complexity from ON2 to ON, where N denotes the number of nodes. The simulation results show that 5G-PBFT achieves a 26% increase in throughput and a 63.6% reduction in transaction latency compared to the PBFT, demonstrating significant performance improvements. Full article
(This article belongs to the Special Issue Blockchain Applications for Business Process Management)
Show Figures

Figure 1

43 pages, 2428 KiB  
Review
A Survey on Directed Acyclic Graph-Based Blockchain in Smart Mobility
by Yuhao Bai, Soojin Lee and Seung-Hyun Seo
Sensors 2025, 25(4), 1108; https://doi.org/10.3390/s25041108 - 12 Feb 2025
Cited by 3 | Viewed by 1830
Abstract
This systematic review examines the integration of directed acyclic graph (DAG)-based blockchain technology in smart mobility ecosystems, focusing on electric vehicles (EVs), robotic systems, and drone swarms. Adhering to PRISMA guidelines, we conducted a comprehensive literature search across Web of Science, Scopus, IEEE [...] Read more.
This systematic review examines the integration of directed acyclic graph (DAG)-based blockchain technology in smart mobility ecosystems, focusing on electric vehicles (EVs), robotic systems, and drone swarms. Adhering to PRISMA guidelines, we conducted a comprehensive literature search across Web of Science, Scopus, IEEE Xplore, and ACM Digital Library, screening 1248 records to identify 47 eligible studies. Our analysis demonstrates that DAG-based blockchain addresses critical limitations of traditional blockchains by enabling parallel transaction processing, achieving high throughput (>1000 TPS), and reducing latency (<1 s), which are essential for real-time applications like autonomous vehicle coordination and microtransactions in EV charging. Key technical challenges include consensus mechanism complexity, probabilistic finality, and vulnerabilities to attacks such as double-spending and Sybil attacks. This study identifies five research priorities: (1) standardized performance benchmarks, (2) formal security proofs for DAG protocols, (3) hybrid consensus models combining DAG with Byzantine fault tolerance, (4) privacy-preserving cryptographic techniques, and (5) optimization of feeless microtransactions. These advancements are critical for deploying robust, scalable DAG-based solutions in smart mobility, and fostering secure and efficient urban transportation networks. Full article
(This article belongs to the Special Issue Feature Review Papers in Intelligent Sensors)
Show Figures

Figure 1

15 pages, 4619 KiB  
Review
A Review of Asynchronous Byzantine Consensus Protocols
by Zhenyan Ji, Xiao Zhang, Jianghao Hu, Yuan Lu and Jiqiang Liu
Sensors 2024, 24(24), 7927; https://doi.org/10.3390/s24247927 - 11 Dec 2024
Viewed by 2306
Abstract
Blockchain technology can be used in the IoT to ensure the data privacy collected by sensors. In blockchain systems, consensus mechanisms are a key technology for maintaining data consistency and correctness. Among the various consensus protocols, asynchronous Byzantine consensus protocols offer strong robustness [...] Read more.
Blockchain technology can be used in the IoT to ensure the data privacy collected by sensors. In blockchain systems, consensus mechanisms are a key technology for maintaining data consistency and correctness. Among the various consensus protocols, asynchronous Byzantine consensus protocols offer strong robustness as they do not rely on any network timing assumptions during design. As a result, these protocols have become a research hotspot in the field of blockchain. Based on different structural design approaches, asynchronous Byzantine consensus protocols can be divided into two categories: protocols based on the DAG structure and protocols based on the ACS structure. The paper describes their principles and summarizes the related research works. The advantages and disadvantages of the protocols are also compared and analyzed. At the end of the paper, future research directions are identified. Full article
(This article belongs to the Special Issue Intelligent Sensors and Signal Processing in Industry)
Show Figures

Figure 1

15 pages, 351 KiB  
Article
Byzantine-Robust Multimodal Federated Learning Framework for Intelligent Connected Vehicle
by Ning Wu, Xiaoming Lin, Jianbin Lu, Fan Zhang, Weidong Chen, Jianlin Tang and Jing Xiao
Electronics 2024, 13(18), 3635; https://doi.org/10.3390/electronics13183635 - 12 Sep 2024
Cited by 3 | Viewed by 1390
Abstract
In the rapidly advancing domain of Intelligent Connected Vehicles (ICVs), multimodal Federated Learning (FL) presents a powerful methodology to harness diverse data sources, such as sensors, cameras, and Vehicle-to-Everything (V2X) communications, without compromising data privacy. Despite its potential, the presence of Byzantine adversaries–malicious [...] Read more.
In the rapidly advancing domain of Intelligent Connected Vehicles (ICVs), multimodal Federated Learning (FL) presents a powerful methodology to harness diverse data sources, such as sensors, cameras, and Vehicle-to-Everything (V2X) communications, without compromising data privacy. Despite its potential, the presence of Byzantine adversaries–malicious participants who contribute incorrect or misleading updates–poses a significant challenge to the robustness and reliability of the FL process. This paper proposes a Byzantine-robust multimodal FL framework specifically designed for ICVs. Our framework integrates a robust aggregation mechanism to mitigate the influence of adversarial updates, a multimodal fusion strategy to effectively manage and combine heterogeneous input data, and a global optimization objective that accommodates the presence of Byzantine clients. The theoretical foundation of the framework is established through formal definitions and equations, demonstrating its ability to maintain reliable and accurate learning outcomes despite adversarial disruptions. Extensive experiments highlight the framework’s efficacy in preserving model performance and resilience in real-world ICV environments. Full article
(This article belongs to the Special Issue Network Security Management in Heterogeneous Networks)
Show Figures

Figure 1

21 pages, 6841 KiB  
Article
Blockchain-Based Cold Chain Traceability with NR-PBFT and IoV-IMS for Marine Fishery Vessels
by Zheng Zhang, Haonan Zhu and Hejun Liang
J. Mar. Sci. Eng. 2024, 12(8), 1371; https://doi.org/10.3390/jmse12081371 - 11 Aug 2024
Cited by 3 | Viewed by 1924
Abstract
Due to limited communication, computing resources, and unstable environments, traditional cold chain traceability systems are difficult to apply directly to marine cold chain traceability scenarios. Motivated by these challenges, we construct an improved blockchain-based cold chain traceability system for marine fishery vessels. Firstly, [...] Read more.
Due to limited communication, computing resources, and unstable environments, traditional cold chain traceability systems are difficult to apply directly to marine cold chain traceability scenarios. Motivated by these challenges, we construct an improved blockchain-based cold chain traceability system for marine fishery vessels. Firstly, an Internet of Vessels system based on the Iridium Satellites (IoV-IMS) is proposed for marine cold chain monitoring. Aiming at the problems of low throughput, long transaction latency, and high communication overhead in traditional cold chain traceability systems, based on the Practical Byzantine Fault Tolerance (PBFT) consensus algorithm, a Node-grouped and Reputation-evaluated PBFT (NR-PBFT) is proposed to improve the reliability and robustness of blockchain system. In NR-PBFT, an improved node grouping scheme is designed, which introduces a consistent hashing algorithm to divide nodes into consensus and candidate sets, reducing the number of nodes participating in the consensus process, to lower communication overhead and transaction latency. Then, a reputation evaluation model is proposed to improve the node selection mechanism of NR-PBFT. It enhances the enthusiasm of nodes to participate in consensus, which considers the distance between fishery vessels, data size, and refrigeration temperature factors of nodes to increase throughput. Finally, we carried out experiments on marine fishery vessels, and the effectiveness of the cold chain traceability system and NR-PBFT were verified. Compared with PBFT, the transaction latency of NR-PBFT shortened by 81.92%, the throughput increased by 84.21%, and the communication overhead decreased by 89.4%. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

20 pages, 1752 KiB  
Article
Enhancing Global Blockchain Privacy via a Digital Mutual Trust Mechanism
by Sheng Peng, Linkai Zhu, Shanwen Hu, Zhiming Cai and Wenjian Liu
Mathematics 2024, 12(10), 1481; https://doi.org/10.3390/math12101481 - 10 May 2024
Cited by 1 | Viewed by 1315
Abstract
Blockchain technology, initially developed as a decentralized and transparent mechanism for recording transactions, faces significant privacy challenges due to its inherent transparency, exposing sensitive transaction data to all network participants. This study proposes a blockchain privacy protection algorithm that employs a digital mutual [...] Read more.
Blockchain technology, initially developed as a decentralized and transparent mechanism for recording transactions, faces significant privacy challenges due to its inherent transparency, exposing sensitive transaction data to all network participants. This study proposes a blockchain privacy protection algorithm that employs a digital mutual trust mechanism integrated with advanced cryptographic techniques to enhance privacy and security in blockchain transactions. The contribution includes the development of a new dynamic Byzantine consensus algorithm within the Practical Byzantine Fault Tolerance framework, incorporating an authorization mechanism from the reputation model and a proof consensus algorithm for robust digital mutual trust. Additionally, the refinement of homomorphic cryptography using the approximate greatest common divisor technique optimizes the encryption process to support complex operations securely. The integration of a smart contract system facilitates automatic and private transaction execution across the blockchain network. Experimental evidence demonstrates the superior performance of the algorithm in handling privacy requests and transaction receipts with reduced delays and increased accuracy, marking a significant improvement over existing methods. Full article
(This article belongs to the Section E1: Mathematics and Computer Science)
Show Figures

Figure 1

25 pages, 7109 KiB  
Article
A Survey of Consortium Blockchain and Its Applications
by Xiaotong Chen, Songlin He, Linfu Sun, Yangxin Zheng and Chase Q. Wu
Cryptography 2024, 8(2), 12; https://doi.org/10.3390/cryptography8020012 - 22 Mar 2024
Cited by 20 | Viewed by 4980
Abstract
Blockchain is a revolutionary technology that has reshaped the trust model among mutually distrustful peers in a distributed network. While blockchain is well-known for its initial usage in a public manner, such as the cryptocurrency of Bitcoin, consortium blockchain, which requires authentication of [...] Read more.
Blockchain is a revolutionary technology that has reshaped the trust model among mutually distrustful peers in a distributed network. While blockchain is well-known for its initial usage in a public manner, such as the cryptocurrency of Bitcoin, consortium blockchain, which requires authentication of all involved participants, has also been widely adopted in various domains. Nevertheless, there is a lack of comprehensive study of consortium blockchain in terms of its architecture design, consensus mechanisms, comparative performance, etc. In this study, we aim to fill this gap by surveying the most popular consortium blockchain platforms and assessing their core designs in a layered fashion. Particularly, Byzantine fault tolerant (BFT) state machine replication (SMR) is introduced to act as a basic computational model of consortium blockchain. Then the consortium blockchain is split into the hardware layer, layer-0 (network layer), layer-I (data layer, consensus layer and contract layer), layer-II protocols, and application layer. Each layer is presented with closely related discussion and analysis. Furthermore, with the extraction of the core functionalities, i.e., robust storage and guaranteed execution, that a consortium blockchain can provide, several typical consortium blockchain-empowered decentralized application scenarios are introduced. With these thorough studies and analyses, this work aims to systematize the knowledge dispersed in the consortium blockchain, highlight the unsolved challenges, and also indicate the propitious avenues of future work. Full article
(This article belongs to the Section Blockchain Security)
Show Figures

Figure 1

16 pages, 429 KiB  
Article
FlexBFT: A Flexible and Effective Optimistic Asynchronous BFT Protocol
by Anping Song and Cenhao Zhou
Appl. Sci. 2024, 14(4), 1461; https://doi.org/10.3390/app14041461 - 10 Feb 2024
Cited by 1 | Viewed by 1625
Abstract
Currently, integrating partially synchronous Byzantine-fault-tolerant protocols into asynchronous protocols as fast lanes represents a trade-off between robustness and efficiency, a concept known as optimistic asynchronous protocols. Existing optimistic asynchronous protocols follow a fixed path order: they execute the fast lane first, switch to [...] Read more.
Currently, integrating partially synchronous Byzantine-fault-tolerant protocols into asynchronous protocols as fast lanes represents a trade-off between robustness and efficiency, a concept known as optimistic asynchronous protocols. Existing optimistic asynchronous protocols follow a fixed path order: they execute the fast lane first, switch to the slow lane after a timeout failure, and restart the fast lane after the slow lane execution is completed. However, when confronted with prolonged network fluctuations, this fixed path sequence results in frequent failures and fast lane switches, leading to overhead that diminishes the efficiency of optimistic asynchronous protocols compared with their asynchronous counterparts. In response to this challenge, this article introduces FlexBFT, a novel and flexible optimistic asynchronous consensus framework designed to significantly enhance overall consensus performance. The key innovation behind FlexBFT lies in the persistence of slow lanes. In the presence of persistent network latency, FlexBFT can continually operate round after round within the slow lane—the current optimal path—until the network conditions improve. Furthermore, FlexBFT offers the flexibility to combine consensus modules adaptively, further enhancing its performance. Particularly in challenging network conditions, FlexBFT’s experimental outcomes highlight its superiority across a range of network scenarios compared with state-of-the-art algorithms. It achieves a performance with 31.6% lower latency than BDT, effectively merging the low latency characteristic of deterministic protocols with the robustness inherent in asynchronous protocols. Full article
(This article belongs to the Special Issue Advanced Blockchain Technology for the Internet of Things)
Show Figures

Figure 1

16 pages, 2689 KiB  
Article
Asynchronous Robust Aggregation Method with Privacy Protection for IoV Federated Learning
by Antong Zhou, Ning Jiang and Tong Tang
World Electr. Veh. J. 2024, 15(1), 18; https://doi.org/10.3390/wevj15010018 - 4 Jan 2024
Cited by 2 | Viewed by 2074
Abstract
Due to the wide connection range and open communication environment of internet of vehicle (IoV) devices, they are susceptible to Byzantine attacks and privacy inference attacks, resulting in security and privacy issues in IoV federated learning. Therefore, there is an urgent need to [...] Read more.
Due to the wide connection range and open communication environment of internet of vehicle (IoV) devices, they are susceptible to Byzantine attacks and privacy inference attacks, resulting in security and privacy issues in IoV federated learning. Therefore, there is an urgent need to study IoV federated learning methods with privacy protection. However, the heterogeneity and resource limitations of IoV devices pose significant challenges to the aggregation of federated learning model parameters. Therefore, this paper proposes an asynchronous robust aggregation method with privacy protection for federated learning in IoVs. Firstly, we design an asynchronous grouping robust aggregation algorithm based on delay perception, combines intra-group truth estimation with inter-group delay aggregation, and alleviates the impact of stragglers and Byzantine attackers. Then, we design a communication-efficient and security enhanced aggregation protocol based on homomorphic encryption, to achieve asynchronous group robust aggregation while protecting data privacy and reducing communication overhead. Finally, the simulation results indicate that the proposed scheme could achieve a maximum improvement of 41.6% in model accuracy compared to the baseline, which effectively enhances the training efficiency of the model while providing resistance to Byzantine attacks and privacy inference attacks. Full article
Show Figures

Figure 1

17 pages, 948 KiB  
Article
Robust Multiagent Reinforcement Learning for UAV Systems: Countering Byzantine Attacks
by Jishu K. Medhi, Rui Liu, Qianlong Wang and Xuhui Chen
Information 2023, 14(11), 623; https://doi.org/10.3390/info14110623 - 19 Nov 2023
Cited by 3 | Viewed by 3599
Abstract
Multiple unmanned aerial vehicle (multi-UAV) systems have gained significant attention in applications, such as aerial surveillance and search and rescue missions. With the recent development of state-of-the-art multiagent reinforcement learning (MARL) algorithms, it is possible to train multi-UAV systems in collaborative and competitive [...] Read more.
Multiple unmanned aerial vehicle (multi-UAV) systems have gained significant attention in applications, such as aerial surveillance and search and rescue missions. With the recent development of state-of-the-art multiagent reinforcement learning (MARL) algorithms, it is possible to train multi-UAV systems in collaborative and competitive environments. However, the inherent vulnerabilities of multiagent systems pose significant privacy and security risks when deploying general and conventional MARL algorithms. The presence of even a single Byzantine adversary within the system can severely degrade the learning performance of UAV agents. This work proposes a Byzantine-resilient MARL algorithm that leverages a combination of geometric median consensus and a robust state update model to mitigate, or even eliminate, the influence of Byzantine attacks. To validate its effectiveness and feasibility, the authors include a multi-UAV threat model, provide a guarantee of robustness, and investigate key attack parameters for multiple UAV navigation scenarios. Results from the experiments show that the average rewards during a Byzantine attack increased by up to 60% for the cooperative navigation scenario compared with conventional MARL techniques. The learning rewards generated by the baseline algorithms could not converge during training under these attacks, while the proposed method effectively converged to an optimal solution, proving its viability and correctness. Full article
Show Figures

Figure 1

22 pages, 1083 KiB  
Article
FLRAM: Robust Aggregation Technique for Defense against Byzantine Poisoning Attacks in Federated Learning
by Haitian Chen, Xuebin Chen, Lulu Peng and Ruikui Ma
Electronics 2023, 12(21), 4463; https://doi.org/10.3390/electronics12214463 - 30 Oct 2023
Cited by 7 | Viewed by 3518
Abstract
In response to the susceptibility of federated learning, which is based on a distributed training structure, to byzantine poisoning attacks from malicious clients, resulting in issues such as slowed or disrupted model convergence and reduced model accuracy, we propose a robust aggregation technique [...] Read more.
In response to the susceptibility of federated learning, which is based on a distributed training structure, to byzantine poisoning attacks from malicious clients, resulting in issues such as slowed or disrupted model convergence and reduced model accuracy, we propose a robust aggregation technique for defending against byzantine poisoning attacks in federated learning, known as FLRAM. First, we employ isolation forest and an improved density-based clustering algorithm to detect anomalies in the amplitudes and symbols of client local gradients, effectively filtering out gradients with large magnitude and angular deviation variations. Subsequently, we construct a credibility matrix based on the filtered subset of gradients to evaluate the trustworthiness of each local gradient. Using this credibility score, we further select gradients with higher trustworthiness. Finally, we aggregate the filtered gradients to obtain the global gradient, which is then used to update the global model. The experimental findings show that our proposed approach achieves strong defense performance without compromising FedAvg accuracy. Furthermore, it exhibits superior robustness compared to existing solutions. Full article
(This article belongs to the Special Issue Recent Advances and Challenges in IoT, Cloud and Edge Coexistence)
Show Figures

Figure 1

15 pages, 500 KiB  
Article
Unmanned Aerial Vehicle-Assisted Federated Learning Method Based on a Trusted Execution Environment
by Jia Liao, Baihui Jiang, Peng Zhao, Lei Ning and Liming Chen
Electronics 2023, 12(18), 3938; https://doi.org/10.3390/electronics12183938 - 18 Sep 2023
Cited by 5 | Viewed by 2561
Abstract
In the face of increasing concerns around privacy and security in the use of unmanned aerial vehicles (UAVs) for mobile edge computing (MEC), this study proposes a novel approach to secure UAV-assisted federated learning. This research integrates a trusted execution environment (TEE) into [...] Read more.
In the face of increasing concerns around privacy and security in the use of unmanned aerial vehicles (UAVs) for mobile edge computing (MEC), this study proposes a novel approach to secure UAV-assisted federated learning. This research integrates a trusted execution environment (TEE) into UAV-assisted federated learning and proposes a robust aggregation algorithm based on cosine distance, denoted as CosAvg. This study further designs and evaluates a TEE-based federated learning model, comparing its resource overhead with other secure aggregation frameworks, like homomorphic encryption (HE) and differential privacy (DP). Experimental results indicate a significant reduction in resource overhead for TEE against DP and HE. Moreover, the proposed CosAvg algorithm demonstrated superior robustness against adversarial scenarios, maintaining high accuracy in the presence of malicious clients. The integration of TEE and the CosAvg algorithm provides a secure and robust solution for UAV-assisted federated learning, effectively defending both gradient inversion attacks and byzantine attacks. Full article
(This article belongs to the Special Issue UAV and Mobile Edge Computing for 6G Communication)
Show Figures

Figure 1

22 pages, 7295 KiB  
Article
Election of MPR Nodes and Detection of Malicious Nodes Based on a Byzantine Fault in the OLSR Protocol Case of a Scale-Free Network
by Noureddine Idboufker, Souhail Mssassi, Chahid Mohamed Alaoui and Hicham Zougagh
Electronics 2023, 12(16), 3390; https://doi.org/10.3390/electronics12163390 - 9 Aug 2023
Cited by 3 | Viewed by 1449
Abstract
V2X (Vehicle-to-Everything) communications play a crucial role in enabling the efficient and reliable exchange of information among vehicles, infrastructure, and other entities in smart transportation systems. However, the inherent vulnerabilities and dynamic nature of V2X networks present significant challenges for ensuring secure and [...] Read more.
V2X (Vehicle-to-Everything) communications play a crucial role in enabling the efficient and reliable exchange of information among vehicles, infrastructure, and other entities in smart transportation systems. However, the inherent vulnerabilities and dynamic nature of V2X networks present significant challenges for ensuring secure and trustworthy communication. By enhancing the security of the OLSR (Optimized Link State Routing) protocol through secure MultiPoint Relays (MPRs) Selection, this research aims to provide a robust approach that enhances the overall security posture of V2X networks, enabling safe and secure interactions between vehicles and their environment. The proposed method is based on the Byzantine general’s problem, which is the principle used in blockchain. Compared to the classical flooding mechanism, this technique greatly reduces network traffic overhead and improves the efficiency of bandwidth utilization. The results demonstrated that the proposed algorithm performed better than the well-used UM-OLSR implementation. The outcome proved that our MPR election algorithm guarantees a better packet delivery ratio, and it also performs very well in the detection and isolation of malicious nodes, leading to increased security of the OLSR protocol control plane. Full article
(This article belongs to the Special Issue Future Generation Wireless Communication)
Show Figures

Figure 1

Back to TopTop