Cargando…

A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning

In federated learning (FL), model parameters of deep learning are communicated between clients and the central server. To better train deep learning models, the spectrum resource and transmission security need to be guaranteed. Toward this end, we propose a secrecy transmission protocol based on ene...

Descripción completa

Detalles Bibliográficos
Autores principales: Xie, Ping, Li, Fan, You, Ilsun, Xing, Ling, Wu, Honghai, Ma, Huahong
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9371431/
https://www.ncbi.nlm.nih.gov/pubmed/35898011
http://dx.doi.org/10.3390/s22155506
_version_ 1784767140159553536
author Xie, Ping
Li, Fan
You, Ilsun
Xing, Ling
Wu, Honghai
Ma, Huahong
author_facet Xie, Ping
Li, Fan
You, Ilsun
Xing, Ling
Wu, Honghai
Ma, Huahong
author_sort Xie, Ping
collection PubMed
description In federated learning (FL), model parameters of deep learning are communicated between clients and the central server. To better train deep learning models, the spectrum resource and transmission security need to be guaranteed. Toward this end, we propose a secrecy transmission protocol based on energy harvesting and jammer selection for FL, in which the secondary transmitters can harvest energy from the primary source. Specifically, a secondary transmitter [Formula: see text] is first selected, which can offer the best transmission performance for the secondary users to access the primary frequency spectrum. Then, another secondary transmitter [Formula: see text] , which has the best channel for eavesdropping, is also chosen as a friendly jammer to provide secrecy service. Furthermore, we use outage probability (OP) and intercept probability (IP) as metrics to evaluate performance. Meanwhile, we also derive closed-form expressions of OP and IP of primary users and OP of secondary users for the proposed protocol, respectively. We also conduct a theoretical analysis of the optimal secondary transmission selection (OSTS) protocol. Finally, the performance of the proposed protocol is validated through numerical experiments. The results show that the secrecy performance of the proposed protocol is better than the OSTS and OCJS, respectively.
format Online
Article
Text
id pubmed-9371431
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-93714312022-08-12 A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning Xie, Ping Li, Fan You, Ilsun Xing, Ling Wu, Honghai Ma, Huahong Sensors (Basel) Article In federated learning (FL), model parameters of deep learning are communicated between clients and the central server. To better train deep learning models, the spectrum resource and transmission security need to be guaranteed. Toward this end, we propose a secrecy transmission protocol based on energy harvesting and jammer selection for FL, in which the secondary transmitters can harvest energy from the primary source. Specifically, a secondary transmitter [Formula: see text] is first selected, which can offer the best transmission performance for the secondary users to access the primary frequency spectrum. Then, another secondary transmitter [Formula: see text] , which has the best channel for eavesdropping, is also chosen as a friendly jammer to provide secrecy service. Furthermore, we use outage probability (OP) and intercept probability (IP) as metrics to evaluate performance. Meanwhile, we also derive closed-form expressions of OP and IP of primary users and OP of secondary users for the proposed protocol, respectively. We also conduct a theoretical analysis of the optimal secondary transmission selection (OSTS) protocol. Finally, the performance of the proposed protocol is validated through numerical experiments. The results show that the secrecy performance of the proposed protocol is better than the OSTS and OCJS, respectively. MDPI 2022-07-23 /pmc/articles/PMC9371431/ /pubmed/35898011 http://dx.doi.org/10.3390/s22155506 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Xie, Ping
Li, Fan
You, Ilsun
Xing, Ling
Wu, Honghai
Ma, Huahong
A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning
title A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning
title_full A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning
title_fullStr A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning
title_full_unstemmed A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning
title_short A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning
title_sort secrecy transmission protocol with energy harvesting for federated learning
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9371431/
https://www.ncbi.nlm.nih.gov/pubmed/35898011
http://dx.doi.org/10.3390/s22155506
work_keys_str_mv AT xieping asecrecytransmissionprotocolwithenergyharvestingforfederatedlearning
AT lifan asecrecytransmissionprotocolwithenergyharvestingforfederatedlearning
AT youilsun asecrecytransmissionprotocolwithenergyharvestingforfederatedlearning
AT xingling asecrecytransmissionprotocolwithenergyharvestingforfederatedlearning
AT wuhonghai asecrecytransmissionprotocolwithenergyharvestingforfederatedlearning
AT mahuahong asecrecytransmissionprotocolwithenergyharvestingforfederatedlearning
AT xieping secrecytransmissionprotocolwithenergyharvestingforfederatedlearning
AT lifan secrecytransmissionprotocolwithenergyharvestingforfederatedlearning
AT youilsun secrecytransmissionprotocolwithenergyharvestingforfederatedlearning
AT xingling secrecytransmissionprotocolwithenergyharvestingforfederatedlearning
AT wuhonghai secrecytransmissionprotocolwithenergyharvestingforfederatedlearning
AT mahuahong secrecytransmissionprotocolwithenergyharvestingforfederatedlearning