Please use this identifier to cite or link to this item:
http://bura.brunel.ac.uk/handle/2438/31240
Title: | Secure and Private Over-the-air Federated Learning: Biased and Unbiased Aggregation Design |
Authors: | Yan, N Wang, K Zhi, K Pan, C Chai, KK Poor, HV |
Keywords: | federated learning (FL);differential privacy (DP);mean square error security (MSE-security) |
Issue Date: | 18-Mar-2025 |
Publisher: | Institute of Electrical and Electronics Engineers (IEEE). |
Citation: | Yan, N. et al. (2025) 'Secure and Private Over-the-air Federated Learning: Biased and Unbiased Aggregation Design', IEEE Transactions on Wireless Communications, 0 (early access), pp. 1 - 16. doi: 10.1109/TWC.2025.3550159. |
Abstract: | Over-the-air federated learning (OTA-FL) presents a promising paradigm that improves the efficiency of local update aggregation by leveraging the superposition property of wireless multiple access channels (MACs). However, it faces significant security and privacy concerns that demand careful consideration. To address these threats associated with OTA-FL, we develop a secure and private over-the-air federated learning (SP-OTA-FL) framework, which can realize the secure and private aggregation for both OTA-FL with unbiased aggregation (UB-OTA-FL) and OTA-FL with biased aggregation (B-OTA-FL). In this framework, a subset of devices participate in training, while another subset functions as jammers, emitting jamming signals to enhance the security and privacy of the OTA-FL process. In particular, we measure the privacy leakage of users’ data using differential privacy (DP) and introduce an innovative application of mean squared error security (MSE-security) to evaluate the security of the OTA-FL system. We conduct convergence analyses for both convex and non-convex loss functions. Building on these analytical results, we separately formulate optimization problems for UB-OTA-FL and B-OTA-FL to enhance the learning performance of SP-OTA-FL by strategically optimizing the scheduling of training participants and jammers. The effectiveness of the proposed schemes is verified through simulations. |
URI: | https://bura.brunel.ac.uk/handle/2438/31240 |
ISSN: | 1536-1276 |
Appears in Collections: | Dept of Computer Science Research Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
FullText.pdf | Copyright © 2025 Institute of Electrical and Electronics Engineers (IEEE). Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works ( https://journals.ieeeauthorcenter.ieee.org/become-an-ieee-journal-author/publishing-ethics/guidelines-and-policies/post-publication-policies/ ). | 1.72 MB | Adobe PDF | View/Open |
Items in BURA are protected by copyright, with all rights reserved, unless otherwise indicated.