Edge-Cloud Collaborative Defense against Backdoor Attacks in Federated Learning
Author:
Yang Jie, Zheng Jun, Wang Haochen, Li Jiaxing, Sun HaipengORCID, Han Weifeng, Jiang Nan, Tan Yu-AnORCID
Abstract
Federated learning has a distributed collaborative training mode, widely used in IoT scenarios of edge computing intelligent services. However, federated learning is vulnerable to malicious attacks, mainly backdoor attacks. Once an edge node implements a backdoor attack, the embedded backdoor mode will rapidly expand to all relevant edge nodes, which poses a considerable challenge to security-sensitive edge computing intelligent services. In the traditional edge collaborative backdoor defense method, only the cloud server is trusted by default. However, edge computing intelligent services have limited bandwidth and unstable network connections, which make it impossible for edge devices to retrain their models or update the global model. Therefore, it is crucial to detect whether the data of edge nodes are polluted in time. This paper proposes a layered defense framework for edge-computing intelligent services. At the edge, we combine the gradient rising strategy and attention self-distillation mechanism to maximize the correlation between edge device data and edge object categories and train a clean model as much as possible. On the server side, we first implement a two-layer backdoor detection mechanism to eliminate backdoor updates and use the attention self-distillation mechanism to restore the model performance. Our results show that the two-stage defense mode is more suitable for the security protection of edge computing intelligent services. It can not only weaken the effectiveness of the backdoor at the edge end but also conduct this defense at the server end, making the model more secure. The precision of our model on the main task is almost the same as that of the clean model.
Funder
National Natural Science Foundation of China
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference41 articles.
1. Reus-Muns, G., Jaisinghani, D., Sankhe, K., and Chowdhury, K.R. (2020, January 7–11). Trust in 5G open RANs through machine learning: RF fingerprinting on the POWDER PAWR platform. Proceedings of the GLOBECOM 2020-2020 IEEE Global Communications Conference, Taipei, Taiwan. 2. Gul, O.M., Kulhandjian, M., Kantarci, B., Touazi, A., Ellement, C., and D’Amours, C. (2022, January 2–3). Fine-grained Augmentation for RF Fingerprinting under Impaired Channels. Proceedings of the 2022 IEEE 27th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Paris, France. 3. Comert, C., Kulhandjian, M., Gul, O.M., Touazi, A., Ellement, C., Kantarci, B., and D’Amours, C. (2022, January 19). Analysis of Augmentation Methods for RF Fingerprinting under Impaired Channels. Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning (WiseML ’22), San Antonio, TX, USA. 4. A Survey on Security and Privacy Issues in Edge-Computing-Assisted Internet of Things;Alwarafy;IEEE Access,2021 5. A fine-grained and traceable multidomain secure data-sharing model for intelligent terminals in edge-cloud collaboration scenarios;Sun;Int. J. Intell. Syst.,2022
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|