αp | 0.06 | 0.07 | 0.08 | 0.09 | 0.1 |
θmax | 0.5843 | 0.5459 | 0.5080 | 0.4708 | 0.4341 |
Federated learning (FL) provides a collaborative framework that enables intelligent networking devices to train a shared model without the need to share local data. FL has been applied in communication networks, which offers the dual advantage of preserving user privacy and reducing communication overhead. Networking systems and FL are highly complementary. Networking environments provide critical support for data acquisition, edge computing capabilities, round communication/connectivity, and scalable topologies. In turn, FL can leverage capabilities to achieve learning adaptation, low-latency operation, edge intelligence, personalization, and, notably, privacy preservation. In our review, we gather relevant literature and open-source platforms that point out the feasibility of conducting experiments at the confluence of FL and intelligent networking. Our review is structured around key sections, including the introduction of FL concepts, the background of FL applied in networking, and experimental simulations covering networking for FL and FL for networking. Additionally, we delved into case studies showcasing FL potential in optimizing state-of-the-art network optimization objectives, such as learning performance, quality of service, energy, and cost. We also addressed the challenges and outlined future research directions that provide valuable guidance to researchers and practitioners in this trending field.
Citation: Seyha Ros, Prohim Tam, Inseok Song, Seungwoo Kang, Seokhoon Kim. A survey on state-of-the-art experimental simulations for privacy-preserving federated learning in intelligent networking[J]. Electronic Research Archive, 2024, 32(2): 1333-1364. doi: 10.3934/era.2024062
[1] | Guodong Zhao, Haitao Li, Ting Hou . Survey of semi-tensor product method in robustness analysis on finite systems. Mathematical Biosciences and Engineering, 2023, 20(6): 11464-11481. doi: 10.3934/mbe.2023508 |
[2] | Mingxia Gu, Zhiyong Yu, Haijun Jiang, Da Huang . Distributed consensus of discrete time-varying linear multi-agent systems with event-triggered intermittent control. Mathematical Biosciences and Engineering, 2024, 21(1): 415-443. doi: 10.3934/mbe.2024019 |
[3] | Siyu Li, Shu Li, Lei Liu . Fuzzy adaptive event-triggered distributed control for a class of nonlinear multi-agent systems. Mathematical Biosciences and Engineering, 2024, 21(1): 474-493. doi: 10.3934/mbe.2024021 |
[4] | Raquel Caballero-Águila, María J. García-Ligero, Aurora Hermoso-Carazo, Josefa Linares-Pérez . Unreliable networks with random parameter matrices and time-correlated noises: distributed estimation under deception attacks. Mathematical Biosciences and Engineering, 2023, 20(8): 14550-14577. doi: 10.3934/mbe.2023651 |
[5] | Wenjing Wang, Jingjing Dong, Dong Xu, Zhilian Yan, Jianping Zhou . Synchronization control of time-delay neural networks via event-triggered non-fragile cost-guaranteed control. Mathematical Biosciences and Engineering, 2023, 20(1): 52-75. doi: 10.3934/mbe.2023004 |
[6] | Yilin Tu, Jin-E Zhang . Event-triggered impulsive control for input-to-state stability of nonlinear time-delay system with delayed impulse. Mathematical Biosciences and Engineering, 2025, 22(4): 876-896. doi: 10.3934/mbe.2025031 |
[7] | Qiushi Wang, Hongwei Ren, Zhiping Peng, Junlin Huang . Dynamic event-triggered consensus control for nonlinear multi-agent systems under DoS attacks. Mathematical Biosciences and Engineering, 2024, 21(2): 3304-3318. doi: 10.3934/mbe.2024146 |
[8] | Xinggui Zhao, Bo Meng, Zhen Wang . Event-triggered integral sliding mode control for uncertain networked linear control systems with quantization. Mathematical Biosciences and Engineering, 2023, 20(9): 16705-16724. doi: 10.3934/mbe.2023744 |
[9] | Xiaoxiao Dong, Huan Qiao, Quanmin Zhu, Yufeng Yao . Event-triggered tracking control for switched nonlinear systems. Mathematical Biosciences and Engineering, 2023, 20(8): 14046-14060. doi: 10.3934/mbe.2023627 |
[10] | Tingting Cai, Yuqian Wang, Liang Wang, Zongying Tang, Jun Zhou . Analysis and event-triggered control for a stochastic epidemic model with logistic growth. Mathematical Biosciences and Engineering, 2023, 20(2): 2243-2260. doi: 10.3934/mbe.2023105 |
Federated learning (FL) provides a collaborative framework that enables intelligent networking devices to train a shared model without the need to share local data. FL has been applied in communication networks, which offers the dual advantage of preserving user privacy and reducing communication overhead. Networking systems and FL are highly complementary. Networking environments provide critical support for data acquisition, edge computing capabilities, round communication/connectivity, and scalable topologies. In turn, FL can leverage capabilities to achieve learning adaptation, low-latency operation, edge intelligence, personalization, and, notably, privacy preservation. In our review, we gather relevant literature and open-source platforms that point out the feasibility of conducting experiments at the confluence of FL and intelligent networking. Our review is structured around key sections, including the introduction of FL concepts, the background of FL applied in networking, and experimental simulations covering networking for FL and FL for networking. Additionally, we delved into case studies showcasing FL potential in optimizing state-of-the-art network optimization objectives, such as learning performance, quality of service, energy, and cost. We also addressed the challenges and outlined future research directions that provide valuable guidance to researchers and practitioners in this trending field.
Networked control systems (NCSs) have been widely studied and applied in many fields in the past few decades, including DC motor [1], intelligent transportation [2], teleoperation [3], etc. Compared with traditional feedback control systems, the components in NCSs transmit data packets through communication networks, which reduce wiring requirements, save installation costs, and improve the maintainability [4]. However, public and open communication networks are vulnerable to malicious attacks by hackers. Cyber attacks can not only disrupt data transmission but also indirectly cause controlled plants to malfunction and stop operating by injecting fake data [5]. For example, in 2011, the "Stuxnet" virus invaded Iran's Bolshevik nuclear power plant, causing massive damage to its nuclear program [6]; in 2015, the "BlackEnergy" trojan virus successfully attacked Ukraine's power companies and cut off the local power supply [7]. Therefore, the security of NCS under cyber attacks has received increasing attention, and many illuminating results have been reported (see surveys [8,9]).
Current cyber-attacks may be roughly divided into two categories: denial of service (DoS) attacks and deception attacks. DoS attacks can cause network congestion or paralysis by sending a large amount of useless request information, thereby blocking the transmission of signals [10,11]. Compared to the simple and direct blocking of signal transmission in DoS attacks, deception attacks are more subtle and difficult to detect. More specifically, deception attacks compromise data integrity by hijacking sensors to tamper with measurement data and control signals. In some cases, they may be more damaging than DoS attacks [12]. Therefore, many researchers have conducted analysis and synthesis of NCSs under deception attacks. For instance, Du et al. [13] presented stability conditions for wireless NCSs subjected to deception attacks on the data link layer, and determined the maximum permissible deception attack time. Hu et al. [14] examined discrete-time stochastic NCSs with deception attacks and packet loss, and gave security analysis and controller design. In [15], Gao et al. investigated nonlinear NCSs faced with several types of deception attacks, and proposed asynchronous observer design strategies. Notably, the existing literature characterized the random occurrence of deception attacks by introducing a stochastic variable that obeys the Bernoulli distribution with a fixed probability, which is over-limited in reality.
In previous literature on NCSs, control tasks are often executed in a fixed/variable period, giving rise to the so-called sampled-data control (time-triggered control) [16,17,18,19]. Although this control scheme is simple and easy to implement, it has two shortcomings. On the one hand, to stabilize the system in some extreme scenarios, it is necessary to set a small sampling interval, which results in a large number of redundant data packets and may cause network congestion. On the other hand, due to the lack of a judgment condition for the system state, even if the stabilization of the system is achieved, the sampling task will not stop, which is undoubtedly a waste of network resources. In contrast to the time-triggered scheme (TTS), the event-triggered scheme (ETS) can significantly conquer these shortcomings and save communication resources [20,21,22]. In the ETS, the execution frequency of the control task is limited by introducing an event generator. That is, only when the change in system state exceeds a given threshold, an event will be generated and the controller will execute [23,24,25]. Based on the above facts, a multitude of studies have been conducted on event-triggered control for NCSs suffering from deception attacks (see [26,27,28,29,30]). However, most ETS designs under deception attacks adopted the periodic event-triggered scheme (PETS). The PETS can avoid the Zeno phenomenon by periodically checking the event trigger conditions but inevitably lose some system state information. To resolve this contradiction, Selivanov et al. proposed a switched event-triggered scheme (SETS) [31]. By switching between TTS and continuous event triggering [32], the SETS not only avoids the Zeno phenomenon, but also fully utilizes the system information, thereby further reducing the number of event triggers [33,34,35,36].
Inspired by the above facts, the subject of this study is SETS-based stabilization for NCSs under random deception attacks. By means of the Lyapunov function method, a sufficient condition is developed to assure that the close-loop system is mean square exponentially (MSE) stable. Then, a co-design of the trigger and feedback-gain matrices for the SETS-based controller is presented in terms of linear matrix inequalities (LMIs), which can be checked easily. The major contributions can be outlined as follows: 1) A new SETS (NSETS), which additionally introduces a term concerning the last event triggering time, is designed. In contrast to the SETS in [31], the NSETS can further reduce the number of trigger times while maintaining performance. 2) Compared with the existing literature (see, e.g., [28,29,30]), the occurrence of deception attacks under our consideration is assumed to be a time-dependent stochastic variable that obeys the Bernoulli distribution with probability uncertainty, which is more realistic. 3) Stability analysis criterion and computationally tractable controller design strategy are presented by utilizing a piecewise-defined Lyapunov function together with a few matrix inequalities.
Notation. In this paper, we use Rm×n and Rm to denote m×n-dimensional real matrices and m-dimensional Euclidean space, respectively. For each Z∈Rm×n, we use Z<0 (Z≤0) to indicate that the matrix Z is real symmetric negative definite (semi-negative definite), S{Z} to denote the sum of Z+ZT, and λM(Z) and λm(Z) to represent the maximum eigenvalue and the minimum eigenvalue of the symmetric matrix Z, respectively. We use ||⋅||, Pr, and E to represent the Euclidean norm, probability operator, and expectation operator, respectively. In addition, we use diag{⋅} to denote a diagonal matrix and ∗ to denote a symmetric term in a symmetric matrix.
In this section, we first give the system description, deception-attack model, and NSETS design, and then formulate the switched closed-loop system.
Consider a linear time-invariant system (LTIS) described as
˙x(t)=Ax(t)+Bu(t). | (2.1) |
In system (2.1), A and B are known system matrices of suitable dimensions, x(t)∈Rnx, u(t)∈Rnu, denote the state, control input, respectively.
In the event-triggered NCS, an event generator is used to determine whether the lately sampled data should be forwarded to the controller. When cyber-attacks do not happen, any state signals that satisfy the triggering condition can be received successfully by the controller, and the corresponding control signals can be received successfully by the actuator. However, when the communication network is subject to deception attacks, the control signal will be substituted with fake data, the performance of the controller will inevitably decline, and even lead to system instability in some extreme cases.
In view of the openness of network protocols, it is quite possible that attackers can inject the information transmitted in NCSs with fake data. In this paper, we suppose that the deception signal d(x(t)) satisfying Assumption 1 will totally substitute the original transmission data.
Assumption 1. [26] The signal of deception attack d(x(t)) satisfies
||d(x(t))||≤||Dx(t)||, | (2.2) |
where D is a real constant matrix.
To demonstrate the randomness of deception attacks, a Bernoulli variable β(t)∈{0,1} with uncertain probability is introduced:
Pr(β(t)=1)=α+Δα(t), Pr(β(t)=0)=1−α−Δα(t). | (2.3) |
Clearly, E{β(t)}=α+Δα(t). Then, the signal transmitted under deception attacks can be presented as
˜x(t)=(1−β(t))d(x(t))+β(t)x(t). |
Remark 2.1. Motivated by [26,27,28,29,30], the deception attacks are assumed to be randomly occurring. However, different from these references, this paper supposes that the probability of deception attack occurrence allows for some uncertainty; that is, there is a small positive constant ˉα such that ||Δα(t)||≤ˉα.
Taking into consideration the constrained network resources, a NSETS is devised as follows:
tσ+1=min{t≥tσ+h∣[x(t)−x(tσ)]TM[x(t)−x(tσ)]>ε1xT(t)Mx(t)+ε2xT(tσ)Mx(tσ)}, | (2.4) |
where tσ is the last triggering moment with σ∈N, M>0 is a trigger matrix to be determined, h>0 and εi (i∈{1,2}) are predefined parameters that stand for the waiting interval and triggering thresholds, respectively.
Remark 2.2. Inspired by [31,33,34,35,36], the SETS is used in this paper. However, unlike the existing SETSs, the proposed NSETS introduces an additional term ε2xT(tσ)Mx(tσ) into the trigger condition to more efficiently utilize the state information at the current moment and previous triggering moment. The introduced ε2xT(tσ)Mx(tσ) increases the difficulty of the event triggering and, therefore, prolongs the interval between triggered events.
In accordance with the proposed NSETS, the control input of system (2.1) under deception attacks with uncertain probability can be designed as
u(t)=K(1−β(t))d(x(t))+Kβ(t)x(tσ), | (2.5) |
where K is the feedback gain that remains to be determined.
Then, we introduce T1σ=[tσ,tσ+h) and T2σ=[tσ+h,tσ+1), under event-triggered controller (2.5), system (2.1) can be characterized as
{˙x(t)=[A+BKβ(t)]x(t)+BK(1−β(t))d(x(t))−BKβ(t)∫ttσ˙x(s)ds,t∈T1σ,˙x(t)=[A+BKβ(t)]x(t)+BK(1−β(t))d(x(t))+BKβ(t)e(t),t∈T2σ, | (2.6) |
where σ∈N and e(t)=x(tσ)−x(t) satisfying
eT(t)Me(t)≤ε1xT(t)Mx(t)+ε2xT(tσ)Mx(tσ). | (2.7) |
Remark 2.3. Unlike general ETSs, the controlled system with the SETS needs to switch between periodic sampling and continuous event triggering to ensure the performance of the system. Inspired by [31], we denote the sampling error and triggering error by ∫ttσ˙x(s)ds and e(t), respectively, and rewrite the controlled system as switched system (2.6) with two different modes.
Next, we introduce a definition of mean square exponential stability and several lemmas.
Definition 2.1 ([37]). System (2.6) is said to be MSE stable if there exist two scalars c1>0 and c2>0 such that
E{||x(t)||}≤c1e−c2tE{||x0||},∀t≥0, |
Lemma 2.2 ([38]). For any positive definite matrix S∈ Rn×n, scalars a, b (a>b), and a vector function η:[a,b]→Rn, we have
[∫abη(δ)dδ]TS[∫abη(δ)dδ]≤(a−b)∫abηT(δ)Sη(δ)dδ. |
Lemma 2.3 ([39]). For given a, b∈ Rn, and positive definite matrix Q∈Rn×n, we have
2aTb≤aTQa+bTQ−1b. |
Lemma 2.4 ([40]). For a prescribed constant ϑ>0 and real matrices Π, Xi, Yi, and Zi(i=1,…,n), if
[ΠXY∗Z]<0 |
holds, where XY=[X1+ϑY1,X2+ϑY2,…,Xn+ϑYn] and Z=diag{S{−ϑZ1},S{−ϑZ2},…,S{−ϑZn}}, then we have
Π+n∑i=1S{XiZ−1iYTi}<0. | (2.8) |
Now, the issue of event-triggered control in response to deception attacks can be expressed more specifically as follows: given a LTIS in (2.1), determine the NSETS-based controller in (2.5) such that, for all admissible deception attacks d(x(t)), the switched closed-loop system in (2.6) is MSE stable.
In this section, we first establish the exponential stability criterion for system (2.1), then develop a joint design method for the trigger matrix and feedback gain.
To be consistent with the switched closed-loop system (2.6), we construct the following Lyapunov function:
V(t)={V1(t)=Vp(t)+Vq(t)+Vu(t),t∈T1σ,V2(t)=Vp(t),t∈T2σ | (3.1) |
where
Vp(t)=xT(t)Px(t),Vq(t)=(tσ+h−t)∫ttσe−2θ(t−s)˙xT(s)Q˙x(s)ds,Vu(t)=(tσ+h−t)[x(t)x(tσ)]T[S{U1}2−U1+U2∗S{U12−U2}][x(t)x(tσ)], |
and P, Q are symmetric positive matrices, U1, U2 are general matrices, and θ is a positive constant.
Based on Lyapunov function (3.1), an exponential stability criterion of system (2.6) can be established, which is provided as follows:
Theorem 3.1. For given positive scalars ε1, ε2, h, θ, α, ˉα and matrices K, D, under the NSETS (2.4) and random deception attacks, system (2.6) is MSE stable, if there exist symmetric matrices P>0, Q>0, M>0, Λi>0 (i∈{1,2,3,4}), and general matrices U1, U2, W1, W2, W3, N1,1, N2,1, N1,2, N2,2, such that
Σ=[P+hS{U12}−hU1+hU2∗−hS{U2−U12}]>0, | (3.2) |
Σ1=[Ω11Ω12∗Ω3]<0, | (3.3) |
Σ2=[Ω21Ω22∗Ω3]<0, | (3.4) |
Σ3=[Ω31Ω32∗Ω33]<0 | (3.5) |
hold true, where
Ω11=[Ω11,1Ω11,2Ω11,3Ω1,4∗Ω12,2Ω12,3Ω2,4∗∗Ω13,30∗∗∗−I]+ˉα2RT1(Λ1+Λ2)R1,R1=[I00−I],Ω21=[Ω21,1Ω21,2Ω21,3Ω1,4Ω1,5∗−S{N2,1}WT2Ω2,4Ω2,5∗∗Ω23,30hWT3∗∗∗−I0∗∗∗∗Ω5,5]+ˉα2RT2(Λ1+Λ2)R2,R2=[I00−I−hI],R3=[I0−II],Ω31=[Ω31,1Ω31,2Ω31,3Ω31,4∗−S{N2,2}Ω32,3Ω32,4∗∗Ω33,30∗∗∗−I]+ˉα2RT3(Λ3+Λ4)R3,Ω12=[ΩT1,60000ΩT2,700]T,Ω32=[Ω3T1,50000Ω3T2,600]T,Ω22=[Ω120], Ω3=[−Λ100−Λ2],Ω33=[−Λ300−Λ4],Ω11,1=S{NT1,1(A+BKα)−W1+(2θh−1)U12}+2θP+DTD,Ω21,1=Ω11,1−θhS{U1},Ω11,2=P−W2−NT1,1+h2S{U1}+(A+BKα)TN2,1,Ω21,2=Ω11,2−h2S{U1},Ω11,3=WT1−W3+(1−2θh)(U1−U2), Ω21,3=Ω11,3+2θh(U1−U2),Ω1,4=(1−α)NT1,1BK, Ω1,5=h(WT1−αNT1,1BK), Ω1,6=NT1,1BK,Ω12,2=hQ−S{N2,1}, Ω12,3=WT2−h(U1−U2),Ω2,4=(1−α)NT2,1BK, Ω2,5=h(WT2−αNT2,1BK),Ω2,7=NT2,1BK, Ω5,5=−he−2θhQ,Ω13,3=S{W3+(2θh−1)(U12−U2)},Ω23,3=Ω13,3−S{2θh(U12−U2)},Ω31,1=2θP+S{NT1,2(A+BKα)}+(ε1+ε2)M+DTD,Ω31,2=P−NT1,2+(A+BKα)TN2,2, Ω31,3=NT1,2BKα+ε2M,Ω31,4=NT1,2BK(1−α), Ω31,5=NT1,2BK, Ω32,3=αNT2,2BK,Ω32,4=(1−α)NT2,2BK, Ω32,6=NT2,2BK, Ω33,3=(ε2−1)M. |
Proof. Since
Vp(t)+Vu(t)=xT(t)Px(t)+(tσ+h−t)[x(t)x(tσ)]T[S{U1}2−U1+U2∗S{U12−U2}][x(t)x(tσ)]=tσ+h−th[x(t)x(tσ)]TΣ[x(t)x(tσ)]+t−tσh[x(t)x(tσ)]T[P0∗0][x(t)x(tσ)], | (3.6) |
which, in conjunction with P>0 and Σ>0, ensures the positive definiteness of Vp(t) + Vu(t). From (3.1) and (3.6), we have
min{λm(P),λm(Σ)}||x(t)||2≤V(t). | (3.7) |
For any t∈T1σ, σ∈N, differentiating V1(t) along the trajectories of the system (2.6) and taking mathematical expectations on it yields:
E{˙V1(t)}=E{˙Vp(t)}+E{˙Vq(t)}+E{˙Vu(t)}, |
where
E{˙Vp(t)}=E{−2θVp(t)}+2θxT(t)Px(t)+2xT(t)P˙x(t),E{˙Vq(t)}=E{−2θVq(t)}−∫ttσe−2θ(t−s)˙xT(s)Q˙x(s)ds+(tσ+h−t)˙xT(t)Q˙x(t),E{˙Vu(t)}=E{−2θVu(t)}+(tσ+h−t)[˙xT(t)S{U1}x(t)+2˙xT(t)(−U1+U2)x(tσ)]+[2θ(tσ+h−t)−1]×[xT(t)S{U1}2x(t)+2xT(t)(−U1+U2)x(tσ)+xT(tσ)S{U12−U2}x(tσ)]. |
Thus
E{˙V1(t)}≤E{−2θV1(t)}+2θxT(t)Px(t)+2xT(t)P˙x(t)+(tσ+h−t)˙xT(t)Q˙x(t)−e−2θh∫ttσ˙xT(s)Q˙x(s)ds+(tσ+h−t)[˙xT(t)S{U1}x(t)+2˙xT(t)(−U1+U2)x(tσ)]+[2θ(tσ+h−t)−1]×[xT(t)S{U1}2x(t)+2xT(t)(−U1+U2)x(tσ)+xT(tσ)S{U12−U2}x(tσ)]. | (3.8) |
Denote
ϕ(t)=1t−tσ∫ttσ˙x(s)ds, |
where the case that ϕ(t)|t=tσ can be understood as limt→tσϕ(t)=˙x(tσ) [41]. Then, utilizing Lemma 2.2 gives
−∫ttσ˙x(s)Q˙x(s)ds≤−(t−tσ)ϕT(t)Qϕ(t). | (3.9) |
Furthermore, using the Newton-Leibniz formula and the expectation of (2.6), we can write
0=2[xT(t)WT1+˙xT(t)WT2+xT(tσ)WT3]×[−x(t)+x(tσ)+(t−tσ)ϕ(t)], | (3.10) |
0=2[xT(t)NT1,1+˙xT(t)NT2,1][−˙x(t)+Ax(t)+BK(α+Δα(t))x(t)+BK(1−α−Δα(t))d(x(t))−(t−tσ)BK(α+Δα(t))ϕ(t)]. | (3.11) |
Setting ς1(t)=col{x(t),˙x(t),x(tσ),d(x(t))}, ς2(t)= col{x(t),˙x(t),x(tσ),d(x(t)),ϕ(t)}, by employing Lemma 2.3, for positive definite matrices Λ1 and Λ2, we can write the following inequalities:
2xT(t)NT1,1BKΔα(t)[x(t)−d(x(t))−(t−tσ)ϕ(t)]=2xT(t)NT1,1BKΔα(t)[tσ+h−thR1ς1(t)+t−tσhR2ς2(t)]≤tσ+h−thˉα2ςT1(t)RT1Λ1R1ς1(t)+t−tσhˉα2ςT2(t)RT2Λ1R2ς2(t)+xT(t)NT1,1BKΛ−11KTBTN1,1x(t). | (3.12) |
Similarly,
2˙xT(t)NT2,1BKΔα(t)[x(t)−d(x(t))−(t−tσ)ϕ(t)]≤tσ+h−thˉα2ςT1(t)RT1Λ2R1ς1(t)+t−tσhˉα2ςT2(t)RT2Λ2R2ς2(t)+˙xT(t)NT2,1BKΛ−12KTBTN2,1˙x(t). | (3.13) |
Moreover, by using Assumption 1, we can derive
xT(t)DTDx(t)−dT(x(t))d(x(t))≥0. | (3.14) |
By using inequalities (3.8)–(3.14), we have
E{˙V1(t)}+2θE{V1(t)}≤tσ+h−thςT1(t)Ω11ς1(t)+t−tσhςT2(t)Ω21ς2(t)+xT(t)NT1,1BKΛ−11KTBTN1,1x(t)+˙xT(t)NT2,1BKΛ−12KTBTN2,1˙x(t), |
which, in conjunction with the Schur complement, Σ1<0, and Σ2<0, guarantees that
E{˙V1(t)}+2θE{V1(t)}≤0. | (3.15) |
Denote ξ3(t)=col{x(t),˙x(t),e(t),d(x(t))}. Then, in a similar way to the above proof, it is not hard to obtain
E{˙V2(t)}≤−2θE{V2(t)}+2θxT(t)Px(t)+xT(t)DTDx(t)+2xT(t)P˙x(t)+2[xT(t)NT1,2+˙xT(t)NT2,2]×[−˙x(t)+Ax(t)+BK(α+Δα(t))x(t)+BK(1−α−Δα(t))d(x(t))+BK(α+Δα(t))e(t)]+ε1xT(t)Mx(t)+ε2[e(t)+x(t)]TM[e(t)+x(t)]−eT(t)Me(t)−dT(x(t))d(x(t)). | (3.16) |
By using Lemma 2.3, for given positive definite matrices Λ3 and Λ4, we can obtain
2xT(t)NT1,2BKΔα(t)ς3(t)≤xT(t)NT1,2BKΛ−13KTBTN1,2x(t)+ˉα2ςT3(t)RT3Λ3R3ς3(t), | (3.17) |
2˙xT(t)NT2,2BKΔα(t)(t)ς3(t)≤˙xT(t)NT2,2BKΛ−14KTBTN2,2˙x(t)+ˉα2ςT3(t)RT3Λ4R3ς3(t). | (3.18) |
Combining (3.16)–(3.18), we get
E{˙V2(t)}+2θE{V2(t)}≤ςT3(t)Σ3ς3(t)+xT(t)NT1,2BKΛ−13KTBTN1,2x(t)+˙xT(t)NT2,2BKΛ−14KTBTN2,2˙x(t) |
for any t∈T2σ, which together with the Schur complement and Ω31<0, implies that
E{˙V2(t)}+2θE{V2(t)}≤0. | (3.19) |
According to the expression of V(t), it is easy to obtain that
Vq(tσ)=Vu(tσ)=0,limt→(tσ+h)−Vq(t)=limt→(tσ+h)−Vu(t)=0, |
which confirms the continuity of V(t) at instants tσ and tσ+h.
Then combining (3.15) and (3.19), for t∈T1σ we can derive
E{V(t)}≤E{V(tσ)}e−2θ(t−tσ)≤E{V(tσ−1)}e−2θ(t−tσ−1)⋯≤E{V(0)}e−2θt. |
Similarly, for t∈T2σ, the same results can be obtained. In the light of (3.1), we get
E{V(0)}≤λM(P)E{‖x(0)‖2}. |
It can be concluded that for any t∈T1σ∪T2σ,
E{V(t)}≤e−2θtE{V(0)}, |
which, together with (3.7), gives
E{‖x(t)‖}≤√min{λm(P),λm(Σ)}λM(P)e−θtE{‖x0‖}. |
This completes the proof.
When there is no deception attacks, d(x(t))=0, and system (2.6) becomes
{˙x(t)=(A+BK)x(t)−BK∫ttσ˙x(s)ds,t∈T1σ,˙x(t)=(A+BK)x(t)+BKe(t),t∈T2σ, | (3.20) |
and we can write the following sufficient condition:
Corollary 1. For given feedback gain matrix K and positive scalars ε1, ε2, h, θ, under the NSETS (2.4), system (3.20) is exponentially stable, if there exist symmetric matrices P>0, Q>0, M>0, and general matrices U1, U2, W1, W2, W3, N1,1, N2,1, N1,2, N2,2, such that (3.2) and the following LMIs
[Ω11,1Ω11,2Ω11,3∗Ω12,2Ω12,3∗∗Ω13,3]<0, | (3.21) |
[Ω21,1Ω21,2Ω21,3Ω1,5∗−S{N2,1}WT2Ω2,5∗∗Ω23,3hWT3∗∗∗Ω5,5]<0, | (3.22) |
[Ω31,1Ω31,2Ω31,3∗−S{N2,2}Ω32,3∗∗Ω33,3]<0 | (3.23) |
hold true, where matrix blocks such as Ω11,1, Ω11,2, and Ω11,3 are the same as those in Theorem 3.1 except that α=1 and ˉα=0.
In this section, we will explore the feasibility of the event-triggered controller design. On the basis of Theorem 3.1, the trigger matrix M and feedback-gain matrix K can be derived from the following result:
Theorem 3.2. For given positive scalars ε1, ε2, h, θ, α, ˉα, ϑ and matrix D, under the NSETS (2.4) and random deception attacks, switched system (2.6) with control gain K=X−1Y is MSE stable, if there exist symmetric matrices P>0, Q>0, U>0, M>0, ˉΛi>0 (i∈{1,2,3,4}), and general matrices X, Y, ˜W1, ˜W2, ˜W3, ˜N1,1, ˜N2,1, ˜N1,2, ˜N2,2, such that (3.2) and the following LMIs
[˜Ω11˜Ω12∗˜Ω3]<0, | (3.24) |
[˜Ω21˜Ω22∗˜Ω3]<0, | (3.25) |
[˜Ω31˜Ω32∗˜Ω3]<0 | (3.26) |
hold true, where
˜Ω11=[˜Ω11˜Ω12∗˜Ω13],˜Ω21=[˜Ω21˜Ω22∗˜Ω13],˜Ω31=[˜Ω31˜Ω32∗˜Ω33],˜Ω11=[˜Ω11,1˜Ω11,2˜Ω11,3˜Ω1,4∗˜Ω12,2˜Ω12,3˜Ω2,4∗∗˜Ω13,30∗∗∗−I]+ˉα2˜RT1(˜Λ1+˜Λ2)˜R1,˜R1=[I00−I],˜Ω21=[˜Ω21,1˜Ω21,2˜Ω21,3˜Ω1,4˜Ω1,5∗˜Ω22,2˜WT2˜Ω2,4˜Ω2,5∗∗˜Ω23,30h˜WT3∗∗∗−I0∗∗∗∗−he−2θhQ]+ˉα2˜RT2(˜Λ1+˜Λ2)˜R2,˜R2=[I00−I−hI], ˜R3=[I0−II],˜Ω31=[˜Ω31,1˜Ω31,2˜Ω31,3˜Ω31,4∗−S{˜N2,2}αGTY˜Ω32,4∗∗(ε2−1)M0∗∗∗−I]+ˉα2˜RT3(˜Λ3+˜Λ4)˜R3,˜Ω12=[YTG0000YTG00]T,˜Ω22=[˜Ω120],˜Ω32=[YTG0000YTG00]T,˜Ω13=[−˜Λ100−˜Λ2],˜Ω33=[−˜Λ300−˜Λ4],˜Ω3=−ϑ[X00X]−ϑ[XT00XT],˜Ω12=[˜ΩT1,800(1−α)ϑYϑY0αϑY˜ΩT2,90(1−α)ϑY0ϑY]T,˜Ω22=[˜ΩT1,800(1−α)ϑY−αϑhYϑY0αϑY˜ΩT2,90(1−α)ϑY−αϑhY0ϑY]T,˜Ω32=[˜Ω3T1,80αϑY(1−α)ϑYϑY0αϑY˜Ω3T2,9αϑY(1−α)ϑY0ϑY]T,˜Ω11,1=2θP+DTD+S{˜NT1,1A−˜W1+(2θh−1)U12+αGTY},˜Ω21,1=˜Ω11,1−θhS{U1},˜Ω11,2=P−˜W2−˜NT1,1+h2S{U1}+AT˜N2,1,˜Ω21,2=˜Ω11,2−h2S{U1},˜Ω11,3=˜WT1−˜W3+(1−2θh)(U1−U2), ˜Ω21,3=˜Ω11,3+2θh(U1−U2),˜Ω1,4=(1−α)GTY, ˜Ω1,5=h(˜WT1−αGTY),˜Ω1,8=˜NT1,1B−GTX+αϑYT, ˜Ω12,2=hQ−S{˜N2,1},˜Ω22,2=−S{˜N2,1}, ˜Ω12,3=˜WT2−h(U1−U2),˜Ω2,4=(1−α)GTY,˜Ω2,5=h(˜WT2−αGTY), ˜Ω2,9=˜NT2,1B−GTX,˜Ω13,3=S{˜W3+(2θh−1)(U12−U2)},˜Ω23,3=˜Ω13,3−S{2θh(U12−U2)},˜Ω31,1=2θP+S{˜NT1,2A+αGTY} +(ε1+ε2)M+DTD,˜Ω31,2=P−˜NT1,2+AT˜N2,2+αYTG,˜Ω31,3=ε2M+αGTY,˜Ω31,4=(1−α)GTY, ˜Ω31,8=˜NT1,2B−GTX+αϑYT,˜Ω32,4=(1−α)GTY, ˜Ω32,9=˜NT2,2B−GTX, |
and G is an all-ones matrix with the same dimension as B.
Proof. By Lemma 2.4, it follows from (3.24) that
˜Ω11+S{[˜NT1,1B−GTL00˜NT2,1B−GTL00000000][X00X]−1[αY00(1−α)YY0αY00(1−α)Y0Y]}<0, |
which can be equivalently rewritten as
[Ω11Ω12∗Ω3]<0. |
In other words, we can derive (3.3) from (3.24). Similarly, (3.4)–(3.5) can be obtained from (3.25)–(3.26). The proof is complete.
Corollary 2. For given positive scalars ε1, ε2, h, θ, ϑ, under the NSETS (2.4), switched system (3.20) with control gain K=X−1Y is exponentially stable, if there exist symmetric matrices P>0, Q>0, U>0, M>0, and general matrices X, Y, ˜W1, ˜W2, ˜W3, ˜N1,1, ˜N2,1, ˜N1,2, ˜N2,2, such that (3.2) and the following LMIs
[˜Ω11,1˜Ω11,2˜Ω11,3˜Ω1,8∗˜Ω12,2˜Ω12,3˜Ω2,9∗∗˜Ω13,30∗∗∗−ϑS{X}]<0, | (3.27) |
[˜Ω21,1˜Ω21,2˜Ω21,3˜Ω1,5˜Ω1,8∗˜Ω22,2˜WT2˜Ω2,5˜Ω2,9∗∗˜Ω23,3h˜WT30∗∗∗−he−2θhQ−hϑYT∗∗∗∗−ϑS{X}]<0, | (3.28) |
[˜Ω31,1˜Ω31,2˜Ω31,3˜Ω31,8∗−S{˜N2,2}GTY˜Ω32,9∗∗(ε2−1)M0∗∗∗−ϑS{X}]<0 | (3.29) |
hold true, where matrix blocks such as ˜Ω11,1, ˜Ω11,2, and ˜Ω11,3 are the same as those in Theorem 3.2 except that α=1 and ˉα=0.
In this section, we use a simplified inverted pendulum model [42] to illustrate the validity of the proposed NSETS-based controller design scheme under random deception attacks. This model can be described as follows:
˙x(t)=[−1.840.337.18−1.14]x(t)+[2.43−0.42]u(t). |
First, we will co-design the triggering matrix W and control gain K to guarantee the MSE stability of the above system.
Choosing triggering thresholds ε1=ε2=0.1, waiting interval h=0.05, deception attack signal d(x(t))=tanh(0.15x(t)), uncertain probability term Δα(t)=αpsin(t), and ϑ=0.01. Then, based on Theorem 3.2, when α=0.8, for different probability uncertainty coefficient αp, the maximum exponential decay rate θmax can be obtained, which is listed in Table 1. It is straightforward to see that, as the probability uncertainty coefficient grows, the maximum exponential decay rate continues to deteriorate. In addition, Table 2 gives the values of θmax under the different probability α of deception attacks occurrence (when αp=0.1). It can be found that as the value of α decreases (which means the frequency of deception attacks increases), the performance of the controller declines.
αp | 0.06 | 0.07 | 0.08 | 0.09 | 0.1 |
θmax | 0.5843 | 0.5459 | 0.5080 | 0.4708 | 0.4341 |
α | 0.88 | 0.86 | 0.84 | 0.82 | 0.8 |
θmax | 0.4655 | 0.4613 | 0.4549 | 0.4459 | 0.4341 |
Next, to further reflect on the impact of deception attacks, we consider two cases: with and without deception attacks. In Case 1, the estimated probability of deception attacks and uncertainty coefficient are fixed as α=0.5, αp=0.08, and other parameters are unchanged. By solving the LMIs in Theorem 3.2, the matrices M and K can be computed as
M=[0.7893−0.0158−0.01580.4791],K=[−0.0695−0.3175]. |
In Case 2, α=1 and αp=0 (that is, the probability of occurring deception attacks is 0). By solving the LMIs in Corollary 2, the matrices M and K are calculated as
M=[1.23330.41990.41991.3964],K=[−0.1841−0.2688]. |
In the simulations, the initial condition is taken as x0=[1,−1]T, and the running time is set as 10s. Figures 1–3 depict the state trajectories, control inputs, and release moment intervals between any two successively release moments of Cases 1 and 2, respectively. It can be seen that the state variables can converge to zero faster in the absence of deception attacks, which is consistent with the information in Table 2.
Finally, we will show the effect of triggering thresholds ε1 and ε2 in NSETS on the number of transmitted signals. Let tn and tr denote the number of trigger times and the ratio of transmitted signals, respectively, and other parameters are the same as those in Case 1. Then, as shown in Table 3, when ε1 and ε2 are both set to 0, the NSETS degenerates into the TTS in [16], and tn is as high as 200; when ε1=0.1 and ε2=0, the ETS changes into the SETS in [31], and tn is reduced to 71; when ε1 is fixed, tn will continue to decrease as ε2 increases. It can be observed that compared with SETS, the tr of the NSETS decreases by more than 8.5%, and compared with TTS, the rate can be reduced by more than 73%. These results demonstrate that the addition of trigger condition xT(tσ)Mx(tσ) significantly conserves network resources while ensuring stability.
Scheme | TTS in [16] | SETS in [31] | NSETS in this paper | |||
(ε1,ε2) | (0,0) | (0.1,0) | (0.1,0.05) | (0.1,0.1) | (0.1,0.15) | (0.1,0.2) |
tn | 200 | 71 | 54 | 43 | 36 | 32 |
tr | 100% | 35.5% | 27% | 21.5% | 18% | 16% |
In this paper, the event-triggered exponential stabilization of NCSs under deception attacks has been investigated. Unlike existing ETSs, an NSETS, which additionally introduces a prescribed trigger term regarding the last triggering moment (i.e., ε2xT(tσ)Mx(tσ)), has been designed in (2.4). It has been demonstrated that the additional trigger term plays a positive role in reducing the number of trigger times. Moreover, by using a Bernoulli variable with uncertain probability to characterize the randomness of deception attacks, a new mathematical model of random deception attacks has been constructed in (2.3). A piecewise-defined Lyapunov function, which can make use of the system information at the instants tσ and tσ+h, has been established, which allows us to establish a sufficient exponential stability conation. Based on this, a co-design of the trigger and feedback-gain matrices under NSETS has been derived in terms of LMIs. Finally, a simulation example has been given to confirm the effectiveness of the developed design method. Future attention will be focused on the event-triggered security control problem of time-delay Markov jump systems [43,44,45,46].
This work was supported by the Key Research and Development Project of Anhui Province (Grant No. 202004a07020028).
The authors declare there is no conflict of interest.
[1] | N. Gruschka, V. Mavroeidis, K. Vishi, M. Jensen, Privacy issues and data protection in big data: A case study analysis under GDPR, in IEEE International Conference on Big Data (Big Data), (2018), 5027–5033. https://doi.org/10.1109/BigData.2018.8622621 |
[2] | M. Rhahla, T. Abdellatif, R. Attia, W. Berrayana, A GDPR controller for IoT systems: Application to e-Health, in IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), (2019), 170–173. https://doi.org/10.1109/wetice.2019.00044 |
[3] | X. Yu, Y. Yang, W. Wang, Y. Zhang, Whether the sensitive information statement of the IoT privacy policy is consistent with the actual behavior, in Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), (2021), 85–92. https://doi.org/10.1109/dsn-w52860.2021.00025 |
[4] |
P. Liu, S. Ji, L. Fu, K. Lu, X, Zhang, J. Qin, et al., How IoT re-using threatens your sensitive data: Exploring the user-data disposal in used IoT devices, in IEEE Symposium on Security and Privacy (SP), (2023), 3365–3381. https://doi.org/10.1109/sp46215.2023.10179294 doi: 10.1109/sp46215.2023.10179294
![]() |
[5] | C. Thirumalai, H. S. Kar, Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices, in Innovations in Power and Advanced Computing Technologies (i-PACT), (2017), 1–6. https://doi.org/10.1109/ipact.2017.8244948 |
[6] |
W. Xu, T. Xiao, J. Zhang, W. Liang, Z. Xu, X. Liu, et al., Minimizing the deployment cost of UAVs for delay-sensitive data collection in IoT networks, IEEE/ACM Trans. Networking, 30 (2022), 812–825. https://doi.org/10.1109/tnet.2021.3123606 doi: 10.1109/tnet.2021.3123606
![]() |
[7] | R. Parasnis, S. Hosseinalipour, Y. W. Chu, M. Chiang, C. G. Brinton, Connectivity-aware semi-decentralized federated learning over time-varying D2D networks, in ACM on Mobile Computing and Communications (MobileCom), (2023), 31–40. https://doi.org/10.1145/3565287.3610278 |
[8] |
P. Qi, D. Chiaro, A. Guzzo, M. Ianni, G. Fortino, F. Piccialli, Model aggregation techniques in federated learning: A comprehensive survey, Future Gener. Comput. Syst., 150 (2024), 272–293. https://doi.org/10.1016/j.future.2023.09.008 doi: 10.1016/j.future.2023.09.008
![]() |
[9] |
M. Chahoud, S. Otoum, A. Mourad, On the feasibility of federated learning towards on-demand client deployment at the edge, Inf. Process. Manage., 60 (2023), 103150. https://doi.org/10.1016/j.ipm.2022.103150 doi: 10.1016/j.ipm.2022.103150
![]() |
[10] |
A. Rahan, K. Hasan, D. Kundu, Md. J. Islam, T. Debnath, S. S. Band, et al., On the ICN-IoT with federated learning integration of communication: Concepts, security-privacy issues, applications, and future perspectives, Future Gener. Comput. Syst., 138 (2023), 61–88. https://doi.org/10.1016/j.future.2022.08.004 doi: 10.1016/j.future.2022.08.004
![]() |
[11] |
G. Lan, X. Y. Liu, Y. Zhang, X. Wang, Communication-efficient federated learning for resource-constrained edge devices, IEEE Trans. Mach. Learn. Commun. Networking, 1 (2023), 210–224. https://doi.org/10.1109/TMLCN.2023.3309773 doi: 10.1109/TMLCN.2023.3309773
![]() |
[12] |
C. Zhang, J. Sun, X. Zhu, Y. Fang, Privacy and security for online social networks: Challenges and opportunities, IEEE Network, 24 (2010), 13–18. https://doi.org/10.1109/mnet.2010.5510913 doi: 10.1109/mnet.2010.5510913
![]() |
[13] |
K. Yang, K. Zhang, J. Ren, X. Shen, Security and privacy in mobile crowdsourcing networks: Challenges and opportunities, IEEE Commun. Mag., 53 (2015), 75–81. https://doi.org/10.1109/mcom.2015.7180511 doi: 10.1109/mcom.2015.7180511
![]() |
[14] | H. B. McMahan, E. Moore, D. Ramage, S. Hampson, B. Arcas, Communication-efficient learning of deep networks from decentralized data, arXiv preprint, (2023), arXiv: 1602.05629. https://doi.org/10.48550/arXiv.1602.05629 |
[15] |
N. Shan, X. Cui, Z. Gao, "DRL+FL": An intelligent resource allocation model based on deep reinforcement learning for mobile edge computing, Comput. Commun., 160 (2020), 14–24. https://doi.org/10.1016/j.comcom.2020.05.037 doi: 10.1016/j.comcom.2020.05.037
![]() |
[16] |
X. Wang, Y. Han, C. Wang, Q. Zhao, X. Chen, M. Chen, In-edge AI: Intelligentizing mobile edge computing, caching and communication by federated learning, IEEE Network, 33 (2019), 156–165. https://doi.org/10.1109/mnet.2019.1800286 doi: 10.1109/mnet.2019.1800286
![]() |
[17] |
Z. Xu, J. Li, M. Zhang, A surveillance video real-time analysis system based on edge-cloud and FL-YOLO cooperation in coal mine, IEEE Access, 9 (2021), 68482–68497. https://doi.org/10.1109/access.2021.3077499 doi: 10.1109/access.2021.3077499
![]() |
[18] | S. Ye, L. Zeng, Q. Wu, K. Luo, Q. Fang, X. Chen, Eco-FL: Adaptive federated learning with efficient edge collaborative pipeline training, in Proceedings of the 51st International Conference on Parallel Processing, (2022), 1–11. https://doi.org/10.1145/3545008.3545015 |
[19] |
S. S. Musa, M. Zennaro, M. Libsie, E. Pietrosemoli, Convergence of information-centric networks and edge intelligence for IoV: Challenges and future directions, Future Internet, 14 (2022), 192. https://doi.org/10.3390/fi14070192 doi: 10.3390/fi14070192
![]() |
[20] |
Q. Qi, X. Chen, Robust design of federated learning for edge-intelligent networks, IEEE Trans. Commun., 70 (2022), 4469–4481. https://doi.org/10.1109/tcomm.2022.3175921 doi: 10.1109/tcomm.2022.3175921
![]() |
[21] |
S. Peng, Y. Yang, M. Mao, D. Park, Centralized machine learning versus federated averaging: A comparison using mnist dataset, KSII Trans. Internet Inf. Syst., 16 (2022), 742–756. https://doi.org/10.3837/tiis.2022.02.020 doi: 10.3837/tiis.2022.02.020
![]() |
[22] |
W. Y. B. Lim, N. C. Luong, D. T. Hoang, Y. Jiao, Y. Liang, Q. Yang, et al., Federated learning in mobile edge networks: A comprehensive survey, IEEE Commun. Surv. Tutorials, 22 (2020), 2031–2063. https://doi.org/10.1109/COMST.2020.2986024 doi: 10.1109/COMST.2020.2986024
![]() |
[23] |
D. C. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, H. V. Poor, Federated learning for Internet of Things: A comprehensive survey, IEEE Commun. Surv. Tutorials, 23 (2021), 1622–1658. https://doi.org/10.1109/COMST.2021.3075439 doi: 10.1109/COMST.2021.3075439
![]() |
[24] |
R. Gupta, T. Alam, Survey on federated-learning approaches in distributed environment, Wireless Pers. Commun., 125 (2022), 1631–1652. https://doi.org/10.1007/s11277-022-09624-y doi: 10.1007/s11277-022-09624-y
![]() |
[25] |
L. Witt, M. Heyer, K. Toyoda, W. Samek, D. Li, Decentral and incentivized federated learning frameworks: A systematic literature review, IEEE Internet Things J., 10 (2023), 3642–3663. https://doi.org/10.1109/JIOT.2022.3231363 doi: 10.1109/JIOT.2022.3231363
![]() |
[26] | H. Chen, H. Wang, Q. Long, D. Jin, Y. Li, Advancements in federated learning: Models, methods, and privacy, arXiv preprint, (2023), arXiv: 2302.11466. https://doi.org/10.48550/arXiv.2302.11466 |
[27] |
M. Al-Quraan, L. Mohjazi, L. Bariah, A. Centeno, A. Zoha, K. Arshad, et al., Edge-native intelligence for 6G communications driven by federated learning: A survey of trends and challenges, IEEE Trans. Emerging Top. Comput. Intell., 7 (2023), 957–979. https://doi.org/10.1109/TETCI.2023.3251404 doi: 10.1109/TETCI.2023.3251404
![]() |
[28] | B. Soltani, V. Haghighi, A. Mahmood, Q. Z. Sheng, L. Yao, A survey on participant selection for federated learning in mobile networks, in ACM Workshop on Mobility in the Evolving Internet Architecture, (2022), 19–24. https://doi.org/10.1145/3556548.3559633 |
[29] |
L. Fu, H. Zhang, G. Gao, M. Zhang, X. Liu, Client selection in federated learning: Principles, challenges, and opportunities, IEEE Internet of Things J., 10 (2023), 21811–21819. https://doi.org/10.1109/jiot.2023.3299573. doi: 10.1109/jiot.2023.3299573
![]() |
[30] | Y. Jin, L. Jiao, Z. Qian, S. Zhang, S. Lu, X. Wang, Resource-efficient and convergence-preserving online participant selection in federated learning, in IEEE 40th International Conference on Distributed Computing Systems (ICDCS), (2020), 606–616. https://doi.org/10.1109/ICDCS47774.2020.00049 |
[31] | Y. J. Cho, J. Wang, G. Joshi, Client selection in federated learning: Convergence analysis and power-of-choice selection strategies, arXiv preprint, (2020), arXiv: 2010.01243. https://doi.org/10.48550/arXiv.2010.01243 |
[32] | C. Li, X. Zeng, M. Zhang, Z. Cao, PyramidFL: A fine-grained client selection framework for efficient federated learning, in Annual International Conference on Mobile Computing and Networking, (2022), 158–171. https://doi.org/10.1145/3495243.3517017 |
[33] |
T. Huang, W. Lin, L. Shen, K. Li, A. Y. Zomaya, Stochastic client selection for federated learning with volatile clients, IEEE Internet of Things J., 9 (2022), 20055–20070. https://doi.org/10.1109/jiot.2022.3172113 doi: 10.1109/jiot.2022.3172113
![]() |
[34] |
J. Zhao, P. Vandenhove, P. Xu, H. Tao, L. Wang, C. H. Liu, et al., Parallel and memory-efficient distributed edge learning in B5G IoT networks, IEEE J. Sel. Top. Signal Process., 17 (2022), 222–233. https://doi.org/10.1109/jstsp.2022.3223759 doi: 10.1109/jstsp.2022.3223759
![]() |
[35] | C. Briggs, Z. Fan, P. Andras, Federated learning with hierarchical clustering of local updates to improve training on non-ⅡD data, in 2020 International Joint Conference on Neural Networks (IJCNN), (2020), 1–9. https://doi.org/10.1109/IJCNN48605.2020.9207469 |
[36] | W. Q. Shi, S. Zhou, Z. Niu, Device scheduling with fast convergence for wireless federated learning, in IEEE International Conference on Communications (ICC), (2020), 1–6. https://doi.org/10.1109/icc40277.2020.9149138 |
[37] |
Z. Ji, L. Chen, N. Zhao, Y. Chen, G. Wei, F. R. Yu, Computation offloading for edge-assisted federated learning, IEEE Trans. Veh. Technol., 70 (2021), 9330–9344. https://doi.org/10.1109/tvt.2021.3098022 doi: 10.1109/tvt.2021.3098022
![]() |
[38] |
S. Wu, H. Xue, L. Zhang, Q-learning-aided offloading strategy in edge-assisted federated learning over industrial IoT, Electronics, 12 (2023), 1706. https://doi.org/10.3390/electronics12071706 doi: 10.3390/electronics12071706
![]() |
[39] | C. Yu, S. Shen, K. Zhang, Z. Hai, Y. Shi, Energy-aware device scheduling for joint federated learning in edge-assisted internet of agriculture things, in IEEE Wireless Communications and Networking Conference (WCNC), (2022), 1140–1145. https://doi.org/10.1109/wcnc51071.2022.9771547 |
[40] | X. Yao, T. Huang, R. X. Zhang, R. Li, L. Sun, Federated learning with unbiased gradient aggregation and controllable meta updating, arXiv preprint, (2020), arXiv: 1910.08234. https://doi.org/10.48550/arXiv.1910.08234 |
[41] |
A. R. Elkordy, A. S. Avestimehr, HeteroSAg: Secure aggregation with heterogeneous quantization in federated learning, IEEE Trans. Commun., 70 (2022), 2372–2386. https://doi.org/10.1109/tcomm.2022.3151126 doi: 10.1109/tcomm.2022.3151126
![]() |
[42] | C. H. Hu, Z. Chen, E. G. Larsson, Device scheduling and update aggregation policies for asynchronous federated learning, arXiv preprint, (2021), arXiv: 2107.11415. https://doi.org/10.48550/arXiv.2107.11415 |
[43] | L. Wang, W. Wang, B. Li, CMFL: Mitigating communication overhead for federated learning, in IEEE 39th International Conference on Distributed Computing Systems (ICDCS), (2019), 954–964. https://doi.org/10.1109/ICDCS.2019.00099 |
[44] |
S. Truex, N. Baracaldo, A. Anwar, T. Steinke, H. Ludwig, R. Zhang, et al., A hybrid approach to privacy-preserving federated learning, in ACM Workshop on Artificial Intelligence and Security, (2019), 1–11. https://doi.org/10.1145/3338501.3357370 doi: 10.1145/3338501.3357370
![]() |
[45] |
P. Liu, S. Xie, Z. Shen, H. Wang, Enhancing location privacy through P2P network and caching in anonymizer, KSII Trans. Internet Inf. Syst., 16 (2022), 1653–1670. https://doi.org/10.3837/tiis.2022.05.013 doi: 10.3837/tiis.2022.05.013
![]() |
[46] | Y. Zhu, C. Liu, Y. Zhang, W. You, Research on 5G core network trust model based on NF interaction behavior, KSII Trans. Internet Inf. Syst., 16 (2022), 3333–3354. http://doi.org/10.3837/tiis.2022.10.007 |
[47] | Network simulation version3, 2008. Available from: https://www.nsnam.org/. |
[48] | G. F. Riley, T. R. Henderson, The ns-3 network simulator, in Modeling and Tools for Network Simulation, Springer, (2021), 15–34. https://doi.org/10.1007/978-3-642-12331-3_2 |
[49] | Gawłowicz, A. Zubow, ns3-gym: Extending OpenAI gym for networking research, arXiv preprint, (2018), arXiv: 1810.03943. https://doi.org/10.48550/arXiv.1810.03943 |
[50] | Network simulation version2, 1997. Available from: https://www.isi.edu/nsnam/ns/. |
[51] | Mininet: Network emulator/simulator, 2010. Available from: http://mininet.org/. |
[52] | Mininet WiFi, 2021. Available from: https://mininet-wifi.github.io/. |
[53] | MATLAB. Available from: https://www.mathworks.com/help/index.html?s_tid = CRUX_lftnav. |
[54] | OMNET++. Available from: https://omnetpp.org/download/models-and-tools. |
[55] | OpenDaylight. Available from: https://www.opendaylight.org. |
[56] | Floodlight. Available from: https://github.com/floodlight/floodlight. |
[57] | Ryu-Controller. Available from: https://ryusdn.org/index.html. |
[58] | OpenStack. Available from: https://www.openstack.org/. |
[59] | Iperf. Available from: https://iperf.fr/. |
[60] | S. Avallone, S. Guadagno, D. Emma, A. Pescapé, G. Ventre, D-ITG distributed internet traffic generator, in First International Conference on the Quantitative Evaluation of Systems, 2004. QEST 2004. Proceedings, (2004), 316–317. https://doi.org/10.1109/qest.2004.1348045 |
[61] | Open network foundation. Available from: https://opennetworking.org/. |
[62] | D. J. Beutel, T. Topal, A. Mathur, X. Qiu, T. Parcollet, P. de Gusmao, et al., Flower: A friendly federated learning research framework, arXiv preprint, (2022), arXiv: 2007.14390. https://doi.org/10.48550/arXiv.2007.14390 |
[63] | C. He, S. Li, J. So, X. Zeng, M. Zhang, H. Wang, et al., FedML: A research library and benchmark for federated machine learning, arXiv preprint, (2020), arXiv: 2007.13518. https://doi.org/10.48550/arXiv.2007.13518 |
[64] | FederatedAi/FATE. Available from: https://github.com/FederatedAI/FATE. |
[65] | Tensorflow/federated. Available from: https://github.com/tensorflow/federated. |
[66] | A. Ziller, A. Trask, A, Loardo, B. Wagner, J. Nounahon, J. Passerat-Palmach, et al., PySyft: A library for easy federated learning, in Federated Learning Systems, Springer, (2021), 111–139. https://doi.org/10.1007/978-3-030-70604-3_5 |
[67] | M. H. Garcia, A. Manoel, D. M. Diaz, F. Mireshghallah, R. Sim, D. Dimitriadis, Flute: A scalable, extensible framework for high-performance federated learning simulations, arXiv preprint, (2022), arXiv: 2203.13789. https://doi.org/10.48550/arXiv.2203.13789 |
[68] | E. Ekaireb, X. Yu, K. Ergun, Q. Zhao, K. Lee, M. Huzaifa, et al., ns3-fl: Simulating federated learning with ns-3, (2022), 99–104. https://doi.org/10.1145/3532577.3532591 |
[69] | H. Ludwig, N. Baracaldo, G. Thomas, Y. Zhou, A. Anwar, S. Rajamoni, et al., IBM federated learning: An enterprise framework white paper V0.1, arXiv preprint, (2020), arXiv: 2007.10987. https://doi.org/10.48550/arXiv.2007.10987 |
[70] | G. Ulm, E. Gustavsson, M. Jirstrand, Functional federated learning in Erlang (ffl-erl), in Functional and Constraint Logic Programming, Springer, (2018), 162–178. https://doi.org/10.1007/978-3-030-16202-3_10 |
[71] |
M. Daole, A. Schiavo, J. Bárcena, P. Ducange, F. Marcelloni, A. Renda, OpenFL-XAI: Federated learning of explainable artificial intelligence models in Python, SoftwareX, 23 (2023), 101505. https://doi.org/10.1016/j.softx.2023.101505 doi: 10.1016/j.softx.2023.101505
![]() |
[72] | B. Knott, S. Venkataraman, A. Hannun, S. Sengupta, M. Ibrahim, L. van der Maaten, CrypTen: Secure multi-party computation meets machine learning, arXiv preprint, (2022), arXiv: 2109.00984. https://doi.org/10.48550/arXiv.2109.00984 |
[73] |
Y. Xie, Z. Wang, D. Chen, D. Gao, L. Yao, W. Kuang, et al., FederatedScope: A flexible federated learning platform for heterogeneity, in Proceedings of the VLDB Endowment, (2023), 1059–1072. https://doi.org/10.14778/3579075.3579081 doi: 10.14778/3579075.3579081
![]() |
[74] | H. R. Roth, Y. Chen, Y. Wen, I. Yang, Z. Xu, Y. Hsieh, et al., Nvidia flare: Federated learning from simulation to real-world, arXiv preprint, (2023), arXiv: 2210.13291. https://doi.org/10.48550/arXiv.2210.13291 |
[75] |
W. Zhuang, X. Gan, Y. Wen, S. Zhang, EasyFL: A low-code federated learning platform for dummies, IEEE Internet of Things J., 9 (2022), 13740–13754. https://doi.org/10.1109/jiot.2022.3143842 doi: 10.1109/jiot.2022.3143842
![]() |
[76] | S. Caldas, S. Duddu, P. Wu, T. Li, J. Konecny, H. B. McMahan, et al., LEAF: A benchmark for federated settings, arXiv preprint, (2019), arXiv: 1812.01097. https://doi.org/10.48550/arXiv.1812.01097 |
[77] | PaddlePaddle/PaddleFL. Available from: https://github.com/PaddlePaddle/PaddleFL. |
[78] | L. Sani, P. Porto, A. lacob, W. Zhao, X. Qiu, Y. Gao, et al., IBM federated learning: An enterprise framework white paper V0.1, arXiv preprint, (2020), arXiv: 2007.10987v1. https://doi.org/10.48550/arXiv.2007.10987 |
[79] |
P. Tam, S. Math, C. Nam, S. Kim, Adaptive resource optimized edge federated learning in real-time image sensing classifications, IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens., 14 (2021), 10929–10940. https://doi.org/ 10.1109/JSTARS.2021.3120724 doi: 10.1109/JSTARS.2021.3120724
![]() |
[80] |
V. Balasubramanian, M. Aloqaily, M. Reisslein, A. Scaglione, Intelligent resource management at the edge for ubiquitous IoT: An SDN-based federated learning approach, IEEE Network, 35 (2021), 114–121. https://doi.org/10.1109/MNET.011.2100121 doi: 10.1109/MNET.011.2100121
![]() |
[81] | R. Uddin, S. Kumar, SDN-based federated learning approach for satellite-iot framework to enhance data security and privacy in space communication, in 2022 IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE), (2022), 71–76. https://doi.org/10.1109/WiSEE49342.2022.9926943 |
[82] | V. Balasubramanian, M. Aloqaily, M. Reisslein, FedCo: A federated learning controller for content management in multi-party edge systems, in 2021 International Conference on Computer Communications and Networks (ICCCN), (2021), 1–9. https://doi.org/10.1109/ICCCN52240.2021.9522153 |
[83] | A. R. Mahmod, G. Caliciuri, P. Pace, A. Iera, Improving the quality of federated learning processes via software defined networking, in International Workshop on Networked AI Systems (NetAISys'23), (2023), 1–6. https://doi.org/10.1145/3597062.3597281 |
[84] |
G. Li, J. Wu, S. Li, W. Yang, C. Li, Multi-tentacle federated learning over software-defined industrial internet of things against adaptive poisoning attacks, IEEE Trans. Ind. Inf., 19 (2022), 1260–1269. https://doi.org/10.1109/tii.2022.3173996 doi: 10.1109/tii.2022.3173996
![]() |
[85] |
L. Chen, H. Tang, Y. Zhao, W. You, K. Wang, A privacy-preserving and energy-efficient offloading algorithm based on lyapunov optimization, KSII Trans. Internet Inf. Syst., 16 (2022), 2490–2506. https://doi.org/10.3837/tiis.2022.08.002 doi: 10.3837/tiis.2022.08.002
![]() |
[86] |
K. M. M. Fathima, M. Suganthi, N. Santhiyakumari, Enhancing the quality of service by GBSO splay tree routing framework in wireless sensor network, KSII Trans. Internet Inf. Syst., 17 (2023), 2188–2208. https://doi.org/10.3837/tiis.2023.08.013 doi: 10.3837/tiis.2023.08.013
![]() |
[87] |
P. Tam, S. Math, S. Kim, Intelligent massive traffic handling scheme in 5G bottleneck backhaul networks, KSII Trans. Internet Inf. Syst., 15 (2021), 874–890. https://doi.org/10.3837/tiis.2021.03.004 doi: 10.3837/tiis.2021.03.004
![]() |
[88] |
X. Huang, Z. Chen, Q. Chen, J. Zhang, Federated learning based QoS-aware caching decisions in fog-enabled internet of things networks, Digital Commun. Networks, 9 (2023), 580–589. https://doi.org/10.1016/j.dcan.2022.04.022 doi: 10.1016/j.dcan.2022.04.022
![]() |
[89] |
P. Tam, S. Math, S. Kim, Optimized multi-service tasks offloading for federated learning in edge virtualization, IEEE Trans. Network Sci. Eng., 9 (2022), 4363–4378. https://doi.org/10.1109/TNSE.2022.3200057 doi: 10.1109/TNSE.2022.3200057
![]() |
[90] |
J. Xu, J. Lin, Y. Li, Z. Xu, MultiFed: A fast converging federated learning framework for services QoS prediction via cloud–edge collaboration mechanism, Knowledge-Based Syst., 268 (2023), 110463. https://doi.org/10.1016/j.knosys.2023.110463 doi: 10.1016/j.knosys.2023.110463
![]() |
[91] |
V. Gugueoth, S. Safavat, S. Shetty, Security of internet of things (IoT) using federated learning and deep learning-recent advancements, issues and prospects, ICT Express, 9 (2023), 941–960. https://doi.org/10.1016/j.icte.2023.03.006 doi: 10.1016/j.icte.2023.03.006
![]() |
[92] | S. Zarandi, H. Tabassum, Federated double deep Q-learning for joint delay and energy minimization in IoT networks, in IEEE International Conference on Communications Workshops (ICC Workshops), (2021), 1–6. https://doi.org/10.1109/iccworkshops50388.2021.9473821 |
[93] |
Y. Ren, A. Guo, C. Song, Multi-slice joint task offloading and resource allocation scheme for massive mimo enabled network, KSII Trans. Internet Inf. Syst., 17 (2023), 794–815. https://doi.org/10.3837/tiis.2023.03.007 doi: 10.3837/tiis.2023.03.007
![]() |
[94] | Y. Xu, H. Zhou, J. Chen, T. Ma, S. Shen, Cybertwin assisted wireless asynchronous federated learning mechanism for edge computing, in IEEE Global Communications Conference (GLOBECOM), (2021), 1–6. https://doi.org/10.1109/globecom46510.2021.9685076 |
[95] |
A. Alferaidi, K. Yadav, Y. Alharbi, W. Viriyasitavat, S. Kautish, G. Dhiman, Federated learning algorithms to optimize the client and cost selections, Math. Probl. Eng., 2022 (2022), 1–9. https://doi.org/10.1155/2022/8514562 doi: 10.1155/2022/8514562
![]() |
[96] |
S. Tang, W. Zhou, L. Chen, L. Lai, J. Xia, L. Fan, Battery-constrained federated edge learning in UAV-enabled IoT for B5G/6G networks, Phys. Commun., 47 (2021), 101381. https://doi.org/10.1016/j.phycom.2021.101381 doi: 10.1016/j.phycom.2021.101381
![]() |
[97] |
D. J. Han, M. Choi, J. Park, J. Moon, FedMes: Speeding up federated learning with multiple edge servers, IEEE J. Sel. Areas Commun., 39 (2021), 3870–3885. https://doi.org/10.1109/JSAC.2021.3118422 doi: 10.1109/JSAC.2021.3118422
![]() |
[98] |
W. Liu, L. Chen, Y. Chen, W. Zhang, Accelerating federated learning via momentum gradient descent, IEEE J. Sel. Areas Commun., 31 (2020), 1754–1766. https://doi.org/10.1109/TPDS.2020.2975189 doi: 10.1109/TPDS.2020.2975189
![]() |
[99] |
R. Chen, D. Shi, X. Qin, D. Liu, M. Pan, S. Cui, Service delay minimization for federated learning over mobile devices, IEEE J. Sel. Areas Commun., 41 (2023), 990–1006. https://doi.org/10.1109/JSAC.2023.3242711 doi: 10.1109/JSAC.2023.3242711
![]() |
[100] | S. Caldas, J. Konečny, H. B. McMahan, A. Talwalkar, Expanding the reach of federated learning by reducing client resource requirements, arXiv preprint, (2019), arXiv: 1812.07210. https://doi.org/10.48550/arXiv.1812.07210 |
[101] |
M. Chen, Z. Yang, W. Saad, C. Yin, H. V. Poor, S. Cui, A joint learning and communications framework for federated learning over wireless networks, IEEE Trans. Wireless Commun., 20 (2021), 269–283. https://doi.org/10.1109/TWC.2020.3024629 doi: 10.1109/TWC.2020.3024629
![]() |
[102] |
C. Ma, Distributed optimization with arbitrary local solvers, Optim. Methods Software, 32 (2017), 813–848. https://doi.org/10.1080/10556788.2016.1278445 doi: 10.1080/10556788.2016.1278445
![]() |
[103] | X. Yao, C. Huang, L. Sun, Two-stream federated learning: Reduce the communication costs, in 2018 IEEE Visual Communications and Image Processing (VCIP), (2018), 1–4. https://doi.org/10.1109/VCIP.2018.8698609 |
[104] |
B. Luo, X. Li, S. Wang, J. Huang, L. Tassiulas, Cost-effective federated learning in mobile edge networks, IEEE J. Sel. Areas Commun., 39 (2021), 3606–3621. https://doi.org/10.1109/JSAC.2021.3118436 doi: 10.1109/JSAC.2021.3118436
![]() |
[105] | J. Konečný, H. B. McMahan, F. X. Yu, P. Richtárik, A. T. Suresh, D. Bacon, Federated learning: Strategies for improving communication efficiency, arXiv preprint, (2019), arXiv: 1610.05492. https://doi.org/10.48550/arXiv.1610.05492 |
[106] |
J. Xu, H. Wang, L. Chen, Bandwidth allocation for multiple federated learning services in wireless edge networks, IEEE Trans. Wireless Commun., 21 (2022), 2534–2546. https://doi.org/10.1109/TWC.2021.3113346 doi: 10.1109/TWC.2021.3113346
![]() |
[107] | A. K. Abasi, M. Aloqaily, M. Guizani, Grey wolf optimizer for reducing communication cost of federated learning, in GLOBECOM 2022 - 2022 IEEE Global Communications Conference, (2022), 1049–1054. https://doi.org/10.1109/GLOBECOM48099.2022.10001681 |
[108] | D. Gurung, S. R. Pokhrel, G. Li, Quantum federated learning: Analysis, design and implementation challenges, arXiv preprint, (2023), arXiv: 2306.15708. https://doi.org/10.48550/arXiv.2306.15708 |
[109] |
N. Bouacida, P. Mohapatra, Vulnerabilities in federated learning, IEEE Access, 9 (2021), 63229–63249. https://doi.org/10.1109/ACCESS.2021.3075203 doi: 10.1109/ACCESS.2021.3075203
![]() |
[110] | F. K. Dankar, K. E. Emam, Practicing differential privacy in health care: A review, IEEE Intell. Inf. Bull., 6 (2013), 35–67. https://dl.acm.org/doi/10.5555/2612156.2612159 |
[111] |
V. Mothukuri, R. M. Parizi, S. Pouriyeh, Y. Huang, A. Dehghantanha, G. Srivastava, A survey on security and privacy of federated learning, Future Gener. Comput. Syst., 115 (2020), 619–640. https://doi.org/10.1016/j.future.2020.10.007 doi: 10.1016/j.future.2020.10.007
![]() |
1. | Xinling Li, Xueli Qin, Zhiwei Wan, Weipeng Tai, Chaos synchronization of stochastic time-delay Lur'e systems: An asynchronous and adaptive event-triggered control approach, 2023, 31, 2688-1594, 5589, 10.3934/era.2023284 | |
2. | Xiaoyu Wang, Yingqi Zhang, Jingjing Yan, Yan Shi, Event-triggered finite-time state estimation for discrete singular Markovian systems with quantization, 2023, 360, 00160032, 14430, 10.1016/j.jfranklin.2023.11.013 | |
3. | Yuxiang Ji, Yu Zhang, Xiaofeng Ma, Xinling Li, Taiping Jiang, Resilient Energy-to-peak Event-triggered Control of NCSs, 2023, 2638, 1742-6588, 012006, 10.1088/1742-6596/2638/1/012006 | |
4. | Xinling Li, Xiaofeng Ma, Weipeng Tai, Jianping Zhou, Designing an event-triggered H∞ filter with possibly inconsistent modes for Markov jump systems, 2023, 139, 10512004, 104092, 10.1016/j.dsp.2023.104092 | |
5. | Suhuan Zhang, Fanglai Zhu, Xufeng Ling, Event-triggered UIO-based security control for discrete-time systems under deception attacks, 2025, 00200255, 121902, 10.1016/j.ins.2025.121902 |
αp | 0.06 | 0.07 | 0.08 | 0.09 | 0.1 |
θmax | 0.5843 | 0.5459 | 0.5080 | 0.4708 | 0.4341 |
α | 0.88 | 0.86 | 0.84 | 0.82 | 0.8 |
θmax | 0.4655 | 0.4613 | 0.4549 | 0.4459 | 0.4341 |
αp | 0.06 | 0.07 | 0.08 | 0.09 | 0.1 |
θmax | 0.5843 | 0.5459 | 0.5080 | 0.4708 | 0.4341 |
α | 0.88 | 0.86 | 0.84 | 0.82 | 0.8 |
θmax | 0.4655 | 0.4613 | 0.4549 | 0.4459 | 0.4341 |
Scheme | TTS in [16] | SETS in [31] | NSETS in this paper | |||
(ε1,ε2) | (0,0) | (0.1,0) | (0.1,0.05) | (0.1,0.1) | (0.1,0.15) | (0.1,0.2) |
tn | 200 | 71 | 54 | 43 | 36 | 32 |
tr | 100% | 35.5% | 27% | 21.5% | 18% | 16% |