Sofia Barkatsa;Maria Diamanti;Panagiotis Charatsaris;Eirini Eleni Tsiropoulou;Symeon Papavassiliou
{"title":"利用贝叶斯博弈缓解无线联邦学习网络的干扰攻击","authors":"Sofia Barkatsa;Maria Diamanti;Panagiotis Charatsaris;Eirini Eleni Tsiropoulou;Symeon Papavassiliou","doi":"10.1109/LNET.2024.3499360","DOIUrl":null,"url":null,"abstract":"Federated Learning (FL), an emerging distributed Artificial Intelligence (AI) technique, is susceptible to jamming attacks during the wireless transmission of trained models. In this letter, we introduce a jamming attack mitigation mechanism for the uplink of wireless FL networks using the power-domain Non-Orthogonal Multiple Access (NOMA) technique. The problem of transmission power allocation for all clients (legitimate and malicious) is formulated and solved distributively as a Bayesian game with incomplete information. The clients aim to successfully transmit their model parameters, minimizing transmission time and consumed power, while having probabilistic knowledge about the malicious behavior of the other clients in the game.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 4","pages":"247-251"},"PeriodicalIF":0.0000,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Jamming Attack Mitigation in Wireless Federated Learning Networks Using Bayesian Games\",\"authors\":\"Sofia Barkatsa;Maria Diamanti;Panagiotis Charatsaris;Eirini Eleni Tsiropoulou;Symeon Papavassiliou\",\"doi\":\"10.1109/LNET.2024.3499360\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Federated Learning (FL), an emerging distributed Artificial Intelligence (AI) technique, is susceptible to jamming attacks during the wireless transmission of trained models. In this letter, we introduce a jamming attack mitigation mechanism for the uplink of wireless FL networks using the power-domain Non-Orthogonal Multiple Access (NOMA) technique. The problem of transmission power allocation for all clients (legitimate and malicious) is formulated and solved distributively as a Bayesian game with incomplete information. The clients aim to successfully transmit their model parameters, minimizing transmission time and consumed power, while having probabilistic knowledge about the malicious behavior of the other clients in the game.\",\"PeriodicalId\":100628,\"journal\":{\"name\":\"IEEE Networking Letters\",\"volume\":\"6 4\",\"pages\":\"247-251\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-11-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Networking Letters\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10753488/\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Networking Letters","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10753488/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Jamming Attack Mitigation in Wireless Federated Learning Networks Using Bayesian Games
Federated Learning (FL), an emerging distributed Artificial Intelligence (AI) technique, is susceptible to jamming attacks during the wireless transmission of trained models. In this letter, we introduce a jamming attack mitigation mechanism for the uplink of wireless FL networks using the power-domain Non-Orthogonal Multiple Access (NOMA) technique. The problem of transmission power allocation for all clients (legitimate and malicious) is formulated and solved distributively as a Bayesian game with incomplete information. The clients aim to successfully transmit their model parameters, minimizing transmission time and consumed power, while having probabilistic knowledge about the malicious behavior of the other clients in the game.