Loading [MathJax]/extensions/MathMenu.js
A Blockchain-Based Model Migration Method for Safe and Long-Term Federated Learning in Internet of Things Systems | IEEE Conference Publication | IEEE Xplore

A Blockchain-Based Model Migration Method for Safe and Long-Term Federated Learning in Internet of Things Systems


Abstract:

A growing number of IoT devices are turning to federated learning (FL) to provide secure data exchange without compromising user privacy. In addition, new research sugges...Show More

Abstract:

A growing number of IoT devices are turning to federated learning (FL) to provide secure data exchange without compromising user privacy. In addition, new research suggests that blockchain technology might bolster FL security. When data in a BFL cluster is scarce, however, current blockchain-based FL (BFL) systems struggle. Gathering a large number of devices to form a BFL cluster is a straightforward answer. However, because to their geographically dispersed locations and the enormous distances between them, these devices have very high levels of connection delay. Due to the frequent contacts in the blockchain consensus, BFL's poor system efficiency would be caused by the high latency. It is possible for attackers to manipulate local models in FL. Therefore, it is possible for manipulated local models to produce an inaccurate global model. So, to provide safe model aggregation, the suggested system uses a blockchain network. By using a blockchain consensus method, nodes in the network may check that the combined model is legitimate, then add it to the distributed database where it will be safe from tampering. Before utilizing the aggregated model, each cluster may get it from the blockchain along with ensure its integrity. In order to assess how well the suggested framework worked, we ran many experiments using various CNN models and datasets.
Date of Conference: 25-26 October 2024
Date Added to IEEE Xplore: 06 February 2025
ISBN Information:
Conference Location: BANGALORE, India

I. Introduction

By moving feature extractors from fast to slow gadgets, model migration may minimize training costs and speed up model convergence throughout federated learning on IoT devices. This allows for more sustainable computing. Nevertheless, federated learning systems aim for efficiency and dependability, yet dishonest or unmotivated devices could move the false models or refuse to share models for their own gain [1]. As more and more businesses go to the cloud to house the massive amounts of data generated by their Internet of Things (IoT) strategies, data auditing takes on greater significance. The reason for this is because customers are able to verify the veracity of the data they are outsourced. However, most existing data auditing methods fall short when it comes to guaranteeing data integrity and meeting the security needs of practical multimedia facilities. In addition, customers do not get their money back quickly when their cloud service provider (CSP) messes with their outsourced data since there is no fair arbitration process in place [2]. There are benefits and drawbacks to the extensive adoption of IoT technology. So that devices can communicate with one another securely and hackers can't have access to sensitive information, the Internet of Things needs a robust and trustworthy security framework. With the help of a detection system, several additional measures may be taken to ensure the security of the Internet of Things. Many effective intrusion detection systems (ID have been developed alongside the advancements in machine learning and deep learning [3]. A lack of sufficient Identity Management has been revealed by the fast growth of linked entities induced by the popularity of the Internet of Things (IoT) as well as Industrial Internet of Things (IIoT). Any disruption to the traditional central authority-dependent IdM system might have far-reaching consequences [4]. A deluge of dispersed data has been produced by the fast expansion of the IoT. The quality of services provided and the rate of innovation may both be improved by sharing this data. Traditional approaches to data exchange, on the other hand, often make use of intermediaries, which increases the likelihood of privacy breaches and single-point failures. It is also difficult to ensure fair payment among data users and suppliers using these conventional sharing techniques since they do not include a secure transaction mechanism to cover the costs of data sharing [5]. Recent years have seen widespread adoption of the internet of things (IoT), which is finding use in many sectors, including healthcare. Some issues, however, do arise during the creation and implementation of IoT data analysis methodologies. These include insufficient training data, limited resources, a lack of a centralized framework, security concerns, and privacy concerns. The proliferation of blockchain technology, on the other hand, offers a decentralized foundation [6]. Supply Chain Management (SCM) is the practice of regulating the movement of goods and services from an organization by attending to each step in the production process, from sourcing raw materials and components to shipping the completed goods to the customer. The proliferation of IoT-enabled smart city applications—from smart grids and residences to smart supply chains and healthcare—has recently captured the public's interest. In order to treat patients quickly, experts are now thinking about the smart healthcare system's function as a PES [7]. With the increasing need for ocean sensing and exploitation, it is essential to establish a Marine Internet of Things (IoT) system capable of collecting and analyzing vast amounts of data about the marine environment. Building a Marine IoT system isn't without its challenges. Some of them include dealing with enormous amounts of heterogeneous data, limited transmission bandwidth underwater, significant heterogeneity, and imbalanced computation.-data-sensing devices' resource burden [8].

Contact IEEE to Subscribe

References

References is not available for this document.