FBChain: A Blockchain-based Federated Learning Model with Efficiency and Secure Communication
Abstract
Privacy and security in the parameter transmission process of federated learning are currently among the most prominent concerns. However, there are two thorny problems caused by unprotected communication methods: “parameter-leakage” and “inefficient-communication”. This article proposes Blockchain-based Federated Learning (FBChain) model for federated learning parameter communication to overcome the above two problems. First, we utilize the immutability of blockchain to store the global model and hash value of local model parameters in case of tampering during the communication process, protect data privacy by encrypting parameters, and verify data consistency by comparing the hash values of local parameters, thus addressing the “parameter-leakage” problem. Second, the Proof of Weighted Link Speed (PoWLS) consensus algorithm comprehensively selects nodes with the higher weighted link speed to aggregate global model and package blocks, thereby solving the “inefficient-communication” problem. Experimental results demonstrate the effectiveness of our proposed FBChain model and its ability to improve model communication efficiency in federated learning.
keywords:
Federated Learning , Blockchain , Encrypted Communication , Consensus Algorithm[1] organization=School of Computer Science and Engineering, Beihang University,city=Beijing, postcode=100191, country=China \affiliation[2] organization=Key Laboratory of Beijing Network Technology, Beihang University,city=Beijing, postcode=100191, country=China \affiliation[3] organization=Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing, Guangxi Normal University,city=Guilin , postcode=541004, country=China \affiliation[4] organization=School of Software, Zhengzhou University,city=Zhengzhou, postcode=450000, country=China \affiliation[5] organization=Henan Collaborative Innovation Center for Internet Medical and Health Services, Zhengzhou University ,city=Zhengzhou, postcode=450000, country=China \affiliation[6] organization= Hanwei Internet of Things Research Institute, Zhengzhou University,city=Zhengzhou, postcode=450000, country=China \affiliation[7] organization= School of Cyber Science and Technology, Beihang University ,city=Beijing, postcode=100191, country=China
1 Introduction
With the increasing privacy awareness of people and the enactment of relevant privacy laws, federated learning (FL) is emerging as a viable solution to train machine learning models with decentralized datasets while protecting privacy [1]. In vanilla FL, clients train local model utilizing local dataset. Then, they communicate with a parameter server, accept all the updated local models to aggregate global model each round until model converges. However, FL is a double-edged sword [2, 3]. On the positive side, FL protects training dataset privacy and security, a large amount of data exists in isolated silos, and FL enables their use for training models in a safe environment. On the negative side, because the training dataset is decentralized and the global model is aggregated by different local models, the communication of local model between clients and server is frequent, but the communication efficiency and security cannot be guaranteed [4]. Given the local model parameter, research on communication security and efficiency focuses on model encryption and lower communication rounds. Especially, our research domain helps to protect local model parameters against malicious attacks that may result in data tampering or leakage, while concurrently enhancing communication efficiency.
There are two inevitable problems in federated learning communication: “parameter-leakage” and “inefficient-communication” [5, 6, 7, 8]. The local model parameters transmission from clients and server via network, thus getting aggregated global model. Nevertheless, the network may be under malicious attack, and the link speed of different clients and server may be difference. “Parameter-leakage” refers to the local model parameter being tampered or leakage because of unsafety communication method, attackers may get private data from leaked parameters. “Inefficient-communication” refers to the parameter transmission speed that may be slow. These two problems indicate it is thorny for the FL to achieve efficient and secure communication.
Benefiting from the great success of FL in privacy protection, most researchers consider privacy during FL communication and use compression or combine it with blockchain to improve security and efficiency. Compression local model parameters can lower transmission data size, according to compress origin data to low-rank or a random mask [9, 10]. Blockchain can provide a reliable way to transmit combination with encryption mechanism, store local model and global model parameters in blocks to ensure the security of model parameters [11, 12, 13]. Unfortunately, these two mainstreams are inadequate to address the problem of FL communication efficiency and security. First, the compression of parameters has differences from origin local model, makes it challenging to perceive better performance on model training [14, 15]. Second, the blockchain combined method has limitations on block size, and every block will be stored in each node, which will occupy a significant amount of storage space [16, 17].
To tackle the obstacles above, we propose the blockchain-based federated learning (FBChain) model, which consists of two main components: the model and Proof of Weighted Link Speed consensus algorithm(PoWLS) in the blockchain. The former integrates asymmetric encryption, symmetric encryption and hash computation, thus solving the problem of “parameter-leakage”. It considers the parameter tampered with or leaked during transmission, while reducing the amount of data that needs to be stored in the block, trying to ensure data privacy and security while reducing the pressure on blockchain storage. The latter involves selecting a group of nodes with strong communication capabilities to aggregate global model and package blocks, thereby addressing the “inefficient-communication” problem. Experimental results demonstrate that our model can not only have the effectiveness on machine learning model training, but also make different communication efficiency during parameter communication.
Our contributions can be summarized as follows:
-
1.
We propose the FBChain model by storing the global model and the hash values of local model parameters in the blockchain, ensures the immutability of the global model and reduces the amount of data stored in the blockchain. Local model parameters are processed by encryption, and the aggregation node compares the received parameters with the saved hash value in the blockchain, achieving consistency verification of the local model and enhancing the security of the data communication process.
-
2.
We propose a PoS and DPoS inspired consensus algorithm. By comprehensively considering the link speed of nodes in the blockchain network, a group of nodes with high link speed and low latency is selected to take turns aggregate global parameters and package blocks, improve communication efficiency.
-
3.
Experiments on real-world datasets demonstrate that our model outperforms baseline approaches in terms of communication efficiency.
The rest of this article is organized as follows. We first give a comprehensive review of related works in Section 2. Next, we demonstrate the background of this article in Section 3, followed by the presentation of detailed design of FBChain in Section 4. After that, we conduct a series of experiments on two public datasets to evaluate FBChain in Section 5. Finally, Section 6 concludes this work and discusses future directions.
2 RELATED WORK
In this section, we briefly introduce some related works about federated learning improvement on transaction efficiency and security.
2.1 Improvement on communication efficiency
Although federated learning can build a global model without sharing training data, a large number of model parameters need to be exchanged during the construction process. Jakub Konecný et al. [18] proposed two ways to reduce the uplink communication costs: structured updates and sketched updates. Yunlong Lu et al. [19] proposed a blockchain-empowered federated learning scheme in digital twin edge networks to strengthen communication security and data privacy protection. Su Liu et al. [20] proposed an efficient-communication approach, which consists of three parts, provides a customized local training strategy for vehicular clients to achieve convergence quickly through a constraint item within fewer communication rounds. K. Li et al. [21] proposed a coreset-based FL (CBFL) framework to improve communication efficiency in federated learning. Instead of training model on full datasets with a regular network model, CBFL uses a much smaller well-matched evolutionary network model on coreset. Qing Han et al. [22] proposed PCFed, a novel privacy-enhanced and communication-efficient FL framework to provide higher model accuracy with rigorous privacy guarantees and great communication efficiency. Wei Liu et al. [23] proposed a general DFL framework, which implements both multiple local updates and multiple inter-node communications periodically, to strike a balance between communication efficiency and model consensus.
2.2 Improvement on communication security
During the communication of parameters of the federal learning model, the communication may under malicious attack, and the model parameters may be tampered with or leaked. Jiaqi Zhao et al. [24] proposed a privacy protection and verifiable decentralized co-learning framework called PVD-FL, which can realize secure deep learning model training under a decentralized architecture. Zhe Peng et al. [25] proposed VFChain, a verifiable and auditable joint learning framework based on the blockchain system. Yuanhang Qi et al. [26] proposed a blockchain-based joint learning framework to realize decentralized, reliable, and safe joint learning without a centralized model coordinator.
During the transmission of parameters of the federal learning model, the data may be tampered with or leaked.Jiaqi Zhao et al. [24] proposed a privacy protection and verifiable decentralized co-learning framework called PVD-FL, which can realize secure deep learning model training under a decentralized architecture.Zhe Peng et al. [25] proposed VFChain, a verifiable and auditable joint learning framework based on the blockchain system. Yuanhang Qi et al. [26] proposed a blockchain-based joint learning framework to realize decentralized, reliable and safe joint learning without a centralized model coordinator. Jungjae Lee et al. [27] proposed a layered blockchain system, using public blockchain for a joint learning process without a trustworthy curator. This can prevent model poisoning attacks and provide security updates for the global model. Xiaoyuan Liu et al. [28] proposed a privacy-enhanced FL (PEFL) framework, which uses homomorphic encryption as the basic technology and provides a channel for the server to punish the poisoned by extracting the effective gradient data of the number function.
3 BACKGROUND
3.1 Symmetric encryption and asymmetric encryption
In cryptography, encryption methods can be divided into two categories of cryptographic algorithms based on the characteristics of the key: symmetric encryption and asymmetric encryption. Symmetric encryption algorithms are a type of encryption algorithm in cryptography. In this type of algorithm, the same key is used for both encryption and decryption, or two keys that can be easily calculated from each other are used. In symmetric encryption algorithms, because the same key is used for encryption and decryption, both parties in communication must jointly select and keep the same key. Each party must ensure the privacy and security of the symmetric key in order to achieve the confidentiality and integrity of the data. Symmetric encryption has the advantages of fast speed and simple algorithm, but it also has the disadvantages of complex key distribution and management, high cost, and inability to be used for digital signatures. Asymmetric encryption algorithms contain two different keys, the public key and the private key . can be made public to other nodes, while can only be kept by oneself. It is easy to calculate from , but it is difficult to calculate from . Asymmetric encryption algorithms have the following characteristics:
-
1.
Encryption and decryption are performed respectively by and , .
Asymmetric encryption: .
Asymmetric decryption: .
Hence, X is the content to encrypt, Y is the ciphertext, is the encryption function, is the decryption function.
-
2.
Can’t get from and .
-
3.
Both and can be used as encryption key and decryption key.
The advantages of asymmetric encryption algorithms are that key distribution and management are simple, and it is relatively easy to implement digital signatures and key exchange. The disadvantage is that the algorithm is more complex and the encryption and decryption speed is slower.
3.2 PoS Consensus algorithm
One of the fundamental problems in distributed systems is how to ensure that the data of all nodes in a distributed system cluster are completely identical and can reach consensus on a proposal. Consensus algorithms focus on studying the process of distributed nodes reaching consensus. How to make all nodes in a distributed system cluster reach consensus in a complex, open, and untrusted Internet environment is still one of the challenges in the field of distributed computing.
The Proof of Stake (PoS) consensus algorithm using stake as witness nodes selection criteria, nodes with the highest stake, rather than the highest computing power, are awarded the right to record transactions. The stake is reflected in the node’s ownership of a specific amount of currency, called Coin days. The PoS consensus algorithm has advantages such as high efficiency and low resource consumption.
4 Blockchain-based Federated Learning Model
To address the issue of man-in-the-middle attacks and improve parameter communication efficiency during the training process of federated learning models, this article proposes the FBChain model based on federated learning and blockchain. FBChain is based on a blockchain network, assume there have nodes in the blockchain network. The model is defined as follows:
Hence, , represents the set of global model aggregation packaging nodes, where represents number and represents the set of positive integers. The nodes are responsible for aggregating the local model parameters () to global model () in federated learning and packaging transactions into blockchain.
, represents the set of local training nodes, where represents the nodes number. The nodes have their own data sets.
, represents the blockchain propagation nodes, where represents nodes number. The blockchain propagation nodes do not participate in the federated learning training process but only propagation blocks.
, is local model set, where represents the node number, represents the local parameter update round, is generated by the in round , and will be sent to for aggregation.
, is global model set, where represents , where represents the who aggregated the global model, and represents the global parameter update round. The unified is obtained by aggregating local parameters.
represents Proof of Weighted Link Speed consensus algorithm, which comprehensively consider nodes’ link speed and transmission delay in the blockchain network to obtain a weighted value, as the basis for selecting nodes to be , improve the communication efficiency in the FBChain.
represents nodes’ credit score, where represents the node number. In the model, the credit score evaluates the node’s performance in the federated learning training process. The higher the credit score, the better the node’s local model performance in the global model aggregation process.
The model architecture diagram is shown in Figure 1.
Notations | Descriptions |
---|---|
total nodes number | |
the th block | |
the hash value | |
the update local model in round of local training node after training | |
transaction contains hash value | |
serialized data of | |
compressed data of | |
’s symmetric encryption key in round | |
symmetric encrypted compressed ’s update local model | |
symmetric encryption algorithm | |
th ’s public key in package nodes list of current round | |
th ’s private key in package nodes list of current round | |
asymmetric encryption algorithm |
4.1 Model process
In the FBChain model, we use blockchain to store , and the hash values of , the round block is , get to continue next step training. During model aggregation, receives directly from . Before transmitting to , stores its hash value on the blockchain and compresses into a compressed file. This file is then encrypted symmetrically, and the encryption key is encrypted asymmetrically using ’s public key to prevent tampering during transmission. Once receives the encrypted data, it decrypts the symmetric encryption key using its private key and then decrypts the data itself. The resulting local model compared to the hash value stored on the blockchain to ensure that the model wasn’t tampered with. If the hash values match, it means that was transmitted without tampering, ensuring consistency and tamper resistance during data transmission. We introduce the credit score in FBChain, where nodes with poor local model training results will have their credit scores deducted, and credit scores less than a threshold will limit how often the node participates in global model aggregation. The process of the FBChain model is as follows:
Initialize Local Model. Utilize the consensus algorithm to choose nodes, excluding the node, from the blockchain network, considering their weighted link speeds. These selected nodes form the package nodes list (). , in blockchain network will initialize by model weight random generation, , where is global model structure.
Process Updated Local Model. After epochs of local training, obtains a locally updated model, denoted as . then calculates the hash value of , denoted as , and adds it to a transaction, denoted as . The transaction is broadcast on the blockchain network.
serializes and transforms into a serialized data format, denoted as , and compresses it to reduce the communication data size. The compressed serialized data is denoted as . then initializes a symmetric encryption key, denoted as , which is ’s symmetric encryption key in round . encrypts with using a symmetric encryption algorithm, denoted as , to obtain a symmetrically encrypted compressed model, denoted as .
As is important, performs asymmetric encryption on it using ’s asymmetric encryption public key, denoted as . The asymmetrically encrypted symmetric encryption key is denoted as , where is an asymmetric encryption algorithm.
By storing only the hash value of local models on the blockchain, we can reduce the storage space and block size required. This approach can help reduce block propagation delays and ensure the integrity and confidentiality of local models during transmission.
Local Model transmission. In FBChain, we use the credit score to assess the performance of nodes, and set a threshold for local model transmission from nodes to , limiting nodes with poor communication time. This helps to reduce the communication of models with poor performance and improve communication efficiency.
Before transmitting the local updated model to in round , FBChain checks ’s , denoted as . If meets the threshold requirement (), can transmit to without limitation. Otherwise, if is lower than , is limited to transmitting to only once every rounds.
Assuming that there are nodes () that can transmit to , , where , transmits an asymmetrically encrypted symmetric encryption key , , a compressed and symmetrically encrypted local updated model, , and a nonce of symmetric encryption, , which is a unique random number used during symmetric encryption.
performs asymmetric decryption on using its private key () to obtain the symmetric encryption key of in round . then performs symmetric decryption on using and to obtain the compressed serialized , After decompressing , we obtain the serialized , , which can be loaded to obtain the original ,
Local Model Verify and Global Model Aggregate. After receiving the locally updated model from , checks if its hash value equals in . If the hash value matches, it indicates that the model has not been tampered with during transmission.
Using the untampered , performs an accuracy verification on a self-test dataset. If the test accuracy in is greater than or within a certain threshold , can be added to the available local model update group, . Otherwise, if the test accuracy of in is lower than the accuracy of minus , is added to the unavailable local model update group, .
Finally, aggregates the locally updated models received from to obtain the global model .
Block Package. After aggregating the local updated models and verifying their accuracy, packages the transaction of local model hash value and the aggregated global model into a block , which is then broadcasted to and . retrieves from , and performs the next round of local updates based on until the training round limit is reached or the expected results are achieved.
4.2 Proof of Weighted Link Speed Consensus Algorithm
In the FBChain model, we introduce a consensus algorithm called Proof of Weighted Link Speed (PoWLS). PoWLS takes into account the weighted value of nodes when selecting package nodes. For each node , we calculate weighted value, , based on the node’s link speed, , and transmission delay, . Nodes with higher are more likely to be selected as . By comprehensively considering the network conditions of nodes and selecting nodes with better network conditions and high transmission efficiency, PoWLS improves the efficiency of parameter network transmission in federated learning.
The consensus algorithm process is as follows:
Weighted Link Speed Calculate. Calculate the of based on Equation 1 in the blockchain network except for the local training node, and sort them in descending order.
(1) |
Among them, , represent the weights of ’s respectively.
Choose Global Model Aggregation Packaging Nodes. Select the top nodes with high to enter , and nodes in are . will broadcast transactions received between , and aggregate global model separately, the with highest will add its packaged block into blockchain.
If the of the th and th nodes are equal, and only the first nodes are selected to enter , the nodes are chosen to join the packaging queue in order of priority based on their , .
Package Blocks. For the local update models from , the in take turns aggregating these models. After aggregation, will be packaged into a transaction and added to the block with other transactions in the blockchain network during this period.
Credit Score and Token Reward. Nodes in the blockchain network receive and token rewards based on their performance. nodes in the active local model group (ALMG) are rewarded with while nodes in the unselected local model group (ULMG) are punished with , where and are positive and negative real numbers, respectively. Token rewards, denoted as , are distributed to nodes based on the contribution of their local model to the global model. The total token reward for each round of federated learning is fixed and splits it with other nodes. If performs better than other local models, receives a larger share of the token reward, denoted as , which is calculated using Equation 2.
(2) | ||||
Hence, is the ’s accuracy difference with the value of the previous round’s global model in the global test dataset.
5 PERFORMANCE EVALUATION
All the experiments were conducted on a virtual machine with one NVIDIA V100 GPU, two Intel Golden 6240 CPUs and 131.43 GB of RAM. All experiments involved 20 devices for FBChain, Vanilla Federated Average model, and VBFL. Each device in FBChain, vanilla federated average learning model, and VBFL adopted and [29] network structure, the training sets are randomly assigned to different parts of the same size, with 5 local training epochs every training round, the learning rate is set 0.01, batch size 10. In PoWLS is set 1, is set 100.
5.1 Effectiveness of FBChain
Figure 2 demonstrates the effectiveness of FBChain, our proposed federated learning model, by showing the global model accuracy trend over 100 training rounds. We compare FBChain with two other models: vanilla federated average learning (VFL), which is shown as VANILLA-FED-AVG in the figure, and VBFL [30], which introduces a novel decentralized validation mechanism. We assign FBChain to 20 devices, including 12 , 3 , and 5 nodes, and compare it with VFL assigned to 20 clients and VBFL assigned to 12 workers, 5 validators, and 3 miners. We use different values of and for FBChain, with default values of and set to 5 and -5, respectively. When and , and are adjusted to 10 and -10, respectively. VBFL is assigned a validator-threshold of 0.08 and no malicious nodes. The purple and brown curves represent the global model accuracy trend for VFL and VBFL, respectively, while the other curves show the performance of FBChain with different values of , , , and . When , all ’s local models participate in the global model update. When , only nodes with a value greater than or equal to are allowed to participate in the global model update every round. If a node has a value less than , it can only participate in the update every 5 rounds, and when , the round number is increased to 10. Despite having a relatively small number of nodes, FBChain maintains a high level of accuracy compared to the vanilla federated learning model.
5.2 Transmission Delay
Figure 3 shows the transmission delay between and in PoWLS and PoS of FBChain, we assigned , link speed increases from 70000 bytes/s with the increase of , , select nodes with evenly distributed link speed from all nodes as , selected from remaining nodes by PoWLS, is randomly assigned in [0,1] seconds. From Figure 3, we can find with the device link speed increases, the transmission time of the PoS consensus algorithm is gradually greater in more rounds compared to PoWLS due to the different link speeds of , the transmission speed between and is constrained by the lower speed nodes, resulting in differences in transmission time among different rounds. For different , when , the maximum transmission speed between and is , therefore in Device 1, because , so no matter consensus algorithm is PoWLS or PoS, the transmission time is stable between [79.7, 80.5]. In 3(b), because only Device 2 has a link speed lower than Device 3 when Device 2 is , the transmission speed will be limited by Device 2, and transmission time will be higher than transmission to other . It can be seen that in Figure 3(b), the transmission delay of some communication rounds is higher than that of other rounds in PoS. In Figure 3(b), PoWLS and PoS are consistent for most of the time, but in most cases, PoWLS is slightly higher than PoS due to differences in the amount of data transmitted. From Device 5, we can see that in more rounds, the transmission delay of PoS is higher than that of PoWLS, and the transmission delay distribution of Device 17, 18, 19, and 20 tends to be consistent because nodes are selected from nodes other than , the has highest link speed is Device 16, , the maximum transmission speed limited by Device 16, so the transmission delay is similar.
The transmission delay between and can be seen in Figure 3 that in PoS, the transmission delay is unstable and high, while the transmission delay of PoWLS is kept in a low range because PoWLS choose by link speed and latency, nodes with faster link speed and lower latency will become , but in PoS the witness node will be chosen based on the number of stakes.
5.3 Credit Score and Stake Trending
In Figure 4 and Figure 5 shows the trends of FBChain for , and assigned . In Figure 4(a) shows while assigning FBChain the trends, we can find the besides device_5 are maintained a high , and device_5’s flowed to 0, after 80 communication round it has an increase, that because when testing device_5’s on the test set, the accuracy difference between the results obtained and the global model is lower than , so the deduction is made to the of device_5, and when it is larger than , benefit device_5 with . In Figure 5 shows the stake trend of , we assigned , we can find device_11 grows fast, which means it has better performance rather than other , and in every round, distribute rewards from based on the accuracy of ’s accuracy performance.In Figure 4(b) shows while assign FBChain the trends, and there has no ’s . Every participates in the update of in every round. In Figure 4(c) shows while assign FBChain the ’s trends, and we can find the of three nodes has been less than for a period of time, respectively device_17,device_11 and device_13. After their lower than , they can only participate in the update of in every rounds, we can find their also changes in every 5 rounds when their . In Figure 4(d) shows while assign FBChain the ’s trends, from Figure 4(d) we can find device_15’s reached lower than in first 20 communication rounds, then it changed every rounds, which is the device_15 participate in the update of in every rounds.
6 Conclusion and Future Work
In this paper, we propose FBChain, a federated learning blockchain model that improves communication efficiency while preventing potential data tampers and leakage during model parameter transmission and reducing blockchain storage pressure. The PoWLS consensus algorithm introduced by FBChain selects nodes with better network link speed and latency for global model aggregation and block package, thereby improving the efficiency of data transmission between local training nodes and aggregation nodes. Our focus in this paper is on improving the communication efficiency and security of federated learning, and we have provided validation for this approach. However, further research is needed to address the issue of training resource utilization and imbalanced training data.
Acknowledgement
This work was supported by the National Natural Science Foundation of China under Grant No. 62272024.
References
- [1] P. Kairouz, H. B. McMahan, B. Avent, A. Bellet, M. Bennis, A. N. Bhagoji, K. Bonawitz, Z. B. Charles, G. Cormode, R. Cummings, R. G. L. D’Oliveira, S. Y. E. Rouayheb, D. Evans, J. Gardner, Z. Garrett, A. Gascón, B. Ghazi, P. B. Gibbons, M. Gruteser, Z. Harchaoui, C. He, L. He, Z. Huo, B. Hutchinson, J. Hsu, M. Jaggi, T. Javidi, G. Joshi, M. Khodak, J. Konecný, A. Korolova, F. Koushanfar, O. Koyejo, T. Lepoint, Y. Liu, P. Mittal, M. Mohri, R. Nock, A. Özgür, R. Pagh, M. Raykova, H. Qi, D. Ramage, R. Raskar, D. X. Song, W. Song, S. U. Stich, Z. Sun, A. T. Suresh, F. Tramèr, P. Vepakomma, J. Wang, L. Xiong, Z. Xu, Q. Yang, F. X. Yu, H. Yu, and S. Zhao, “Advances and open problems in federated learning,” Found. Trends Mach. Learn., vol. 14, pp. 1–210, 2019.
- [2] V. Mothukuri, R. M. Parizi, S. Pouriyeh, Y. ping Huang, A. Dehghantanha, and G. Srivastava, “A survey on security and privacy of federated learning,” Future Gener. Comput. Syst., vol. 115, pp. 619–640, 2021.
- [3] N. Rodr’iguez-Barroso, D. J. L’opez, M. V. Luz’on, F. Herrera, and E. Martínez-Cámara, “Survey on federated learning threats: concepts, taxonomy on attacks and defences, experimental study and challenges,” ArXiv, vol. abs/2201.08135, 2022.
- [4] T. Li, A. K. Sahu, A. Talwalkar, and V. Smith, “Federated learning: Challenges, methods, and future directions,” IEEE Signal Processing Magazine, vol. 37, pp. 50–60, 2019.
- [5] D. C. Nguyen, M. Ding, P. N. Pathirana, A. P. Seneviratne, J. Li, and F. I. H. V. Poor, “Federated learning for internet of things: A comprehensive survey,” IEEE Communications Surveys & Tutorials, vol. 23, pp. 1622–1658, 2021.
- [6] M. Alazab, S. P. Rm, P. M, P. K. R. Maddikunta, T. R. Gadekallu, and V. Q. Pham, “Federated learning for cybersecurity: Concepts, challenges, and future directions,” IEEE Transactions on Industrial Informatics, vol. 18, pp. 3501–3509, 2022.
- [7] O. A. Wahab, A. Mourad, H. Otrok, and T. Taleb, “Federated machine learning: Survey, multi-level classification, desirable criteria and future directions in communication and networking systems,” IEEE Communications Surveys & Tutorials, vol. 23, pp. 1342–1397, 2021.
- [8] X. Huang, P. Li, and X. Li, “Stochastic controlled averaging for federated learning with communication compression,” ArXiv, vol. abs/2308.08165, 2023.
- [9] J. Xu, W. Du, Y. Jin, W. He, and R. Cheng, “Ternary compression for communication-efficient federated learning,” IEEE Transactions on Neural Networks and Learning Systems, vol. 33, pp. 1162–1176, 2020.
- [10] H. Sun, X. Ma, and R. Q. Hu, “Adaptive federated learning with gradient compression in uplink noma,” IEEE Transactions on Vehicular Technology, vol. 69, pp. 16 325–16 329, 2020.
- [11] L. Cui, X. Su, Z. Ming, Z. Chen, S. Yang, Y. Zhou, and W. Xiao, “Creat: Blockchain-assisted compression algorithm of federated learning for content caching in edge computing,” IEEE Internet of Things Journal, vol. 9, pp. 14 151–14 161, 2022.
- [12] W. Issa, N. Moustafa, B. P. Turnbull, N. Sohrabi, and Z. Tari, “Blockchain-based federated learning for securing internet of things: A comprehensive survey,” ACM Computing Surveys, vol. 55, pp. 1 – 43, 2022.
- [13] Y. Qu, M. P. Uddin, C. Gan, Y. Xiang, L. Gao, and J. Yearwood, “Blockchain-enabled federated learning: A survey,” ACM Computing Surveys, vol. 55, pp. 1 – 35, 2022.
- [14] M. Asad, S. Shaukat, D. Hu, Z. Wang, E. Javanmardi, J. Nakazato, and M. Tsukada, “Limitations and future aspects of communication costs in federated learning: A survey,” Sensors (Basel, Switzerland), vol. 23, 2023.
- [15] F. Haddadpour, M. M. Kamani, A. Mokhtari, and M. Mahdavi, “Federated learning with compression: Unified analysis and sharp guarantees,” in International Conference on Artificial Intelligence and Statistics, 2020.
- [16] J. Huang, L. Kong, G. Chen, Q. Xiang, X. Chen, and X. Liu, “Blockchain-based federated learning: A systematic survey,” IEEE Network, vol. 37, pp. 150–157, 2023.
- [17] J. Zhu, J. Cao, D. Saxena, S. Jiang, and H. Ferradi, “Blockchain-empowered federated learning: Challenges, solutions, and future directions,” ACM Computing Surveys, vol. 55, pp. 1 – 31, 2022.
- [18] Jakub Konecný, H. B. McMahan, Felix X. Yu, Peter Richtárik, Ananda Theertha Suresh, and Dave Bacon. Federated learning: Strategies for improving communication efficiency. ArXiv, abs/1610.05492, 2016.
- [19] Yunlong Lu, Xiaohong Huang, Ke Zhang, Sabita Maharjan, and Yan Zhang. Communication-efficient federated learning and permissioned blockchain for digital twin edge networks. IEEE Internet of Things Journal, 8:2276–2288, 2021.
- [20] Su Liu, Jiong Yu, Xiaoheng Deng, and Shaohua Wan. Fedcpf: An efficient-communication federated learning approach for vehicular edge computing in 6g communication networks. IEEE Transactions on Intelligent Transportation Systems, 23:1616–1629, 2021.
- [21] Ka Hang Li and Chunhua Xiao. Cbfl: A communication-efficient federated learning framework from data redundancy perspective. IEEE Systems Journal, 16:5572–5583, 2022.
- [22] Qing Han, Shusen Yang, Xuebin Ren, Peng Zhao, Cong Zhao, and Yimeng Wang. Pcfed: Privacy-enhanced and communication-efficient federated learning for industrial iots. IEEE Transactions on Industrial Informatics, 18:6181–6191, 2022.
- [23] Wei Liu, Li Chen, and Wenyi Zhang. Decentralized federated learning: Balancing communication and computing costs. IEEE Transactions on Signal and Information Processing over Networks, 8:131–143, 2021.
- [24] Jiaqi Zhao, Hui Zhu, Fengwei Wang, Rongxing Lu, Zhe Liu, and Hui Li. Pvd-fl: A privacy-preserving and verifiable decentralized federated learning framework. IEEE Transactions on Information Forensics and Security, 17:2059–2073, 2022.
- [25] Zhe Peng, Jianliang Xu, Xiaowen Chu, Shang Gao, Yuan Yao, Rong Gu, and Yuzhe Richard Tang. Vfchain: Enabling verifiable and auditable federated learning via blockchain systems. IEEE Transactions on Network Science and Engineering, 9:173–186, 2021.
- [26] Yuanhang Qi, M. Shamim Hossain, Jiangtian Nie, and Xuandi Li. Privacy-preserving blockchain-based federated learning for traffic flow prediction. Future Gener. Comput. Syst., 117:328–337, 2021.
- [27] Jungjae Lee and Wooseong Kim. Dag-based blockchain sharding for secure federated learning with non-iid data. Sensors (Basel, Switzerland), 22, 2022.
- [28] Xiaoyuan Liu, Hongwei Li, Guowen Xu, Zongqi Chen, Xiaoming Huang, and Rongxing Lu. Privacy-enhanced federated learning against poisoning adversaries. IEEE Transactions on Information Forensics and Security, 16:4574–4588, 2021.
- [29] H. B. McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Agüera y Arcas. Communication-efficient learning of deep networks from decentralized data. In International Conference on Artificial Intelligence and Statistics, 2016.
- [30] Hang Chen, Syed Ali Asif, Jihong Park, Chien-Chung Shen, and Mehdi Bennis. Robust blockchained federated learning with model validation and proof-of-stake inspired consensus. ArXiv, abs/2101.03300, 2021.