Tianshun Wang, Xumin Huang, Yuxiao Song, Yuan Wu, L. Qian, Bin Lin
{"title":"NOMA的能量优化辅助联邦学习与保密配置","authors":"Tianshun Wang, Xumin Huang, Yuxiao Song, Yuan Wu, L. Qian, Bin Lin","doi":"10.1109/iccc52777.2021.9580235","DOIUrl":null,"url":null,"abstract":"Federated learning (FL) has been considered as an efficient yet privacy-preserving approach for enabling the distributed learning. There have been many studies investigating the applications of FL in different scenarios, e.g., Internet of Things, Internet of Vehicles, and UAV systems. However, due to delivering the trained model via wireless links, FL may suffer from a potential issue, i.e., some malicious users may intentionally overhear the trained model delivered through the wireless links. In this paper, we investigate the energy optimization for nonorthogonal multiple access (NOMA) assisted with secrecy provisioning. Specifically, we consider that the wireless devices (WDs) adopt NOMA to deliver their respectively trained local models to a base station (BS) which serves a parameter-server, and there exists a malicious node that overhears the parameter-server when delivering the aggregated global model to all WDs. We adopt the physical layer security to quantify the secrecy throughput under the eavesdropping attack and formulate an optimization problem to minimize the overall energy consumption of all the WDs in FL, by jointly optimizing the uplink time, the downlink time, the local model accuracy, and the uplink decoding order of NOMA. In spite of the non-convexity of this joint optimization problem, we propose an efficient algorithm, which is based on the theory of monotonic optimization, for finding the solution. Numerical results show that our proposed algorithm can achieve the almost same solutions as the LINGO's global-solver while reducing more than 90% computation-time than LINGO. Moreover, the results also show that our proposed NOMA decoding scheme can outperform some heuristic decoding schemes.","PeriodicalId":425118,"journal":{"name":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Energy Optimization for NOMA assisted Federated Learning with Secrecy Provisioning\",\"authors\":\"Tianshun Wang, Xumin Huang, Yuxiao Song, Yuan Wu, L. Qian, Bin Lin\",\"doi\":\"10.1109/iccc52777.2021.9580235\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Federated learning (FL) has been considered as an efficient yet privacy-preserving approach for enabling the distributed learning. There have been many studies investigating the applications of FL in different scenarios, e.g., Internet of Things, Internet of Vehicles, and UAV systems. However, due to delivering the trained model via wireless links, FL may suffer from a potential issue, i.e., some malicious users may intentionally overhear the trained model delivered through the wireless links. In this paper, we investigate the energy optimization for nonorthogonal multiple access (NOMA) assisted with secrecy provisioning. Specifically, we consider that the wireless devices (WDs) adopt NOMA to deliver their respectively trained local models to a base station (BS) which serves a parameter-server, and there exists a malicious node that overhears the parameter-server when delivering the aggregated global model to all WDs. We adopt the physical layer security to quantify the secrecy throughput under the eavesdropping attack and formulate an optimization problem to minimize the overall energy consumption of all the WDs in FL, by jointly optimizing the uplink time, the downlink time, the local model accuracy, and the uplink decoding order of NOMA. In spite of the non-convexity of this joint optimization problem, we propose an efficient algorithm, which is based on the theory of monotonic optimization, for finding the solution. Numerical results show that our proposed algorithm can achieve the almost same solutions as the LINGO's global-solver while reducing more than 90% computation-time than LINGO. Moreover, the results also show that our proposed NOMA decoding scheme can outperform some heuristic decoding schemes.\",\"PeriodicalId\":425118,\"journal\":{\"name\":\"2021 IEEE/CIC International Conference on Communications in China (ICCC)\",\"volume\":\"51 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE/CIC International Conference on Communications in China (ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iccc52777.2021.9580235\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE/CIC International Conference on Communications in China (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iccc52777.2021.9580235","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Energy Optimization for NOMA assisted Federated Learning with Secrecy Provisioning
Federated learning (FL) has been considered as an efficient yet privacy-preserving approach for enabling the distributed learning. There have been many studies investigating the applications of FL in different scenarios, e.g., Internet of Things, Internet of Vehicles, and UAV systems. However, due to delivering the trained model via wireless links, FL may suffer from a potential issue, i.e., some malicious users may intentionally overhear the trained model delivered through the wireless links. In this paper, we investigate the energy optimization for nonorthogonal multiple access (NOMA) assisted with secrecy provisioning. Specifically, we consider that the wireless devices (WDs) adopt NOMA to deliver their respectively trained local models to a base station (BS) which serves a parameter-server, and there exists a malicious node that overhears the parameter-server when delivering the aggregated global model to all WDs. We adopt the physical layer security to quantify the secrecy throughput under the eavesdropping attack and formulate an optimization problem to minimize the overall energy consumption of all the WDs in FL, by jointly optimizing the uplink time, the downlink time, the local model accuracy, and the uplink decoding order of NOMA. In spite of the non-convexity of this joint optimization problem, we propose an efficient algorithm, which is based on the theory of monotonic optimization, for finding the solution. Numerical results show that our proposed algorithm can achieve the almost same solutions as the LINGO's global-solver while reducing more than 90% computation-time than LINGO. Moreover, the results also show that our proposed NOMA decoding scheme can outperform some heuristic decoding schemes.