2FAKA-C/S: A Robust Two-Factor Authentication and Key Agreement Protocol for C/S Data Transmission in Federated Learning
-
Published:2024-07-30
Issue:15
Volume:14
Page:6664
-
ISSN:2076-3417
-
Container-title:Applied Sciences
-
language:en
-
Short-container-title:Applied Sciences
Author:
Huang Chao1, Wang Bin1, Bao Zhaoyang1, Qi Wenhao1
Affiliation:
1. School of Information Electronic Technology, Jiamusi University, Jiamusi 154007, China
Abstract
As a hot technology trend, the federated learning (FL) cleverly combines data utilization and privacy protection by processing data locally on the client and only sharing model parameters with the server, embodying an efficient and secure collaborative learning model between clients and aggregated Servers. During the process of uploading parameters in FL models, there is susceptibility to unauthorized access threats, which can result in training data leakage. To ensure data security during transmission, the Authentication and Key Agreement (AKA) protocols are proposed to authenticate legitimate users and safeguard training data. However, existing AKA protocols for client–server (C/S) architecture show security deficiencies, such as lack of user anonymity and susceptibility to password guessing attacks. In this paper, we propose a robust 2FAKA-C/S protocol based on ECC and Hash-chain technology. Our security analysis shows that the proposed protocol ensures the session keys are semantically secure and can effectively resist various attacks. The performance analysis indicates that the proposed protocol achieves a total running time of 62.644 ms and requires only 800 bits of communication overhead, showing superior computational efficiency and lower communication costs compared to existing protocols. In conclusion, the proposed protocol securely protects the training parameters in a federated learning environment and provides a reliable guarantee for data transmission.
Funder
Fundamental Research Funds for the Provincial Universities of Heilongjiang
Reference41 articles.
1. Federated Learning for Healthcare: A Comprehensive Review;Dhade;Eng. Proc.,2023 2. Gu, X., Sabrina, F., Fan, Z., and Sohail, S. (2023). A Review of Privacy Enhancement Methods for Federated Learning in Healthcare Systems. Int. J. Environ. Res. Public Health, 20. 3. Hard, A., Rao, K., Mathews, R., Ramaswamy, S., Beaufays, F., Augenstein, S., Eichner, H., Kiddon, C., and Ramage, D. (2018). Federated Learning for Mobile Keyboard Prediction. arXiv. 4. (2023, December 22). 2023 Data Breach Incident Review. Available online: https://zhuanlan.zhihu.com/p/673692169. 5. Chow, M.C., and Ma, M. (2022). A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks. Sensors, 22.
|
|