Cargando…
A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning
In federated learning (FL), model parameters of deep learning are communicated between clients and the central server. To better train deep learning models, the spectrum resource and transmission security need to be guaranteed. Toward this end, we propose a secrecy transmission protocol based on ene...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9371431/ https://www.ncbi.nlm.nih.gov/pubmed/35898011 http://dx.doi.org/10.3390/s22155506 |
_version_ | 1784767140159553536 |
---|---|
author | Xie, Ping Li, Fan You, Ilsun Xing, Ling Wu, Honghai Ma, Huahong |
author_facet | Xie, Ping Li, Fan You, Ilsun Xing, Ling Wu, Honghai Ma, Huahong |
author_sort | Xie, Ping |
collection | PubMed |
description | In federated learning (FL), model parameters of deep learning are communicated between clients and the central server. To better train deep learning models, the spectrum resource and transmission security need to be guaranteed. Toward this end, we propose a secrecy transmission protocol based on energy harvesting and jammer selection for FL, in which the secondary transmitters can harvest energy from the primary source. Specifically, a secondary transmitter [Formula: see text] is first selected, which can offer the best transmission performance for the secondary users to access the primary frequency spectrum. Then, another secondary transmitter [Formula: see text] , which has the best channel for eavesdropping, is also chosen as a friendly jammer to provide secrecy service. Furthermore, we use outage probability (OP) and intercept probability (IP) as metrics to evaluate performance. Meanwhile, we also derive closed-form expressions of OP and IP of primary users and OP of secondary users for the proposed protocol, respectively. We also conduct a theoretical analysis of the optimal secondary transmission selection (OSTS) protocol. Finally, the performance of the proposed protocol is validated through numerical experiments. The results show that the secrecy performance of the proposed protocol is better than the OSTS and OCJS, respectively. |
format | Online Article Text |
id | pubmed-9371431 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-93714312022-08-12 A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning Xie, Ping Li, Fan You, Ilsun Xing, Ling Wu, Honghai Ma, Huahong Sensors (Basel) Article In federated learning (FL), model parameters of deep learning are communicated between clients and the central server. To better train deep learning models, the spectrum resource and transmission security need to be guaranteed. Toward this end, we propose a secrecy transmission protocol based on energy harvesting and jammer selection for FL, in which the secondary transmitters can harvest energy from the primary source. Specifically, a secondary transmitter [Formula: see text] is first selected, which can offer the best transmission performance for the secondary users to access the primary frequency spectrum. Then, another secondary transmitter [Formula: see text] , which has the best channel for eavesdropping, is also chosen as a friendly jammer to provide secrecy service. Furthermore, we use outage probability (OP) and intercept probability (IP) as metrics to evaluate performance. Meanwhile, we also derive closed-form expressions of OP and IP of primary users and OP of secondary users for the proposed protocol, respectively. We also conduct a theoretical analysis of the optimal secondary transmission selection (OSTS) protocol. Finally, the performance of the proposed protocol is validated through numerical experiments. The results show that the secrecy performance of the proposed protocol is better than the OSTS and OCJS, respectively. MDPI 2022-07-23 /pmc/articles/PMC9371431/ /pubmed/35898011 http://dx.doi.org/10.3390/s22155506 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Xie, Ping Li, Fan You, Ilsun Xing, Ling Wu, Honghai Ma, Huahong A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning |
title | A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning |
title_full | A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning |
title_fullStr | A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning |
title_full_unstemmed | A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning |
title_short | A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning |
title_sort | secrecy transmission protocol with energy harvesting for federated learning |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9371431/ https://www.ncbi.nlm.nih.gov/pubmed/35898011 http://dx.doi.org/10.3390/s22155506 |
work_keys_str_mv | AT xieping asecrecytransmissionprotocolwithenergyharvestingforfederatedlearning AT lifan asecrecytransmissionprotocolwithenergyharvestingforfederatedlearning AT youilsun asecrecytransmissionprotocolwithenergyharvestingforfederatedlearning AT xingling asecrecytransmissionprotocolwithenergyharvestingforfederatedlearning AT wuhonghai asecrecytransmissionprotocolwithenergyharvestingforfederatedlearning AT mahuahong asecrecytransmissionprotocolwithenergyharvestingforfederatedlearning AT xieping secrecytransmissionprotocolwithenergyharvestingforfederatedlearning AT lifan secrecytransmissionprotocolwithenergyharvestingforfederatedlearning AT youilsun secrecytransmissionprotocolwithenergyharvestingforfederatedlearning AT xingling secrecytransmissionprotocolwithenergyharvestingforfederatedlearning AT wuhonghai secrecytransmissionprotocolwithenergyharvestingforfederatedlearning AT mahuahong secrecytransmissionprotocolwithenergyharvestingforfederatedlearning |