Refine and Identify: An Accelerated Iterative Algorithm for Securing Federated Learning

A. Gouissem*, Z. Chkirbene, T. Khattab, M. Mabrok, M. Abdallah, R. Hamila

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The identification of malicious users within a large set of participants poses a significant challenge in the domains of cybersecurity, data integrity, user management, and particularly within federated learning (FL) environments. FL, a distributed machine learning approach, necessitates rigorous mechanisms for safeguarding data integrity, model accuracy by effectively managing and identifying malicious participants. Traditional methods require the sequential removal and evaluation of users to determine their impact on the system's overall error rate or loss function, fall short in terms of efficiency and scalability, especially in FL contexts where data is distributed across multiple clients. To address these limitations, we propose the Refine and Identify Algorithm, a two-phased approach that efficiently narrows the search space for identifying malicious users by initially evaluating users in groups rather than individually and iteratively focusing on those groups with the highest potential for containing malicious users. A rigorous mathematical framework, including a proof of convergence and a detailed analysis of iteration necessities, underpins the algorithm's efficacy. The convergence proof and analysis of iteration requirements provide a solid mathematical foundation for the proposed method's effectiveness, paving the way for further optimization and application-specific tuning. Simulation results depict the efficiency of the proposed technique and show a significant reduction in computational resources and time required for identifying malicious users.

Original languageEnglish
Title of host publication20th International Wireless Communications and Mobile Computing Conference, IWCMC 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1767-1772
Number of pages6
ISBN (Electronic)9798350361261
DOIs
Publication statusPublished - 2024
Event20th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2024 - Hybrid, Ayia Napa, Cyprus
Duration: 27 May 202431 May 2024

Publication series

Name20th International Wireless Communications and Mobile Computing Conference, IWCMC 2024

Conference

Conference20th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2024
Country/TerritoryCyprus
CityHybrid, Ayia Napa
Period27/05/2431/05/24

Keywords

  • Byzantine attack
  • FL
  • computational complexity
  • convergence analysis
  • security

Fingerprint

Dive into the research topics of 'Refine and Identify: An Accelerated Iterative Algorithm for Securing Federated Learning'. Together they form a unique fingerprint.

Cite this