-
Towards Reliable Participation in UAV-Enabled Federated Edge Learning on Non-IID Data
Authors:
Youssra Cheriguene,
Wael Jaafar,
Halim Yanikomeroglu,
Chaker Abdelaziz Kerrache
Abstract:
Federated Learning (FL) is a decentralized machine learning (ML) technique that allows a number of participants to train an ML model collaboratively without having to share their private local datasets with others. When participants are unmanned aerial vehicles (UAVs), UAV-enabled FL would experience heterogeneity due to the majorly skewed (non-independent and identically distributed -IID) collect…
▽ More
Federated Learning (FL) is a decentralized machine learning (ML) technique that allows a number of participants to train an ML model collaboratively without having to share their private local datasets with others. When participants are unmanned aerial vehicles (UAVs), UAV-enabled FL would experience heterogeneity due to the majorly skewed (non-independent and identically distributed -IID) collected data. In addition, UAVs may demonstrate unintentional misbehavior in which the latter may fail to send updates to the FL server due, for instance, to UAVs' disconnectivity from the FL system caused by high mobility, unavailability, or battery depletion. Such challenges may significantly affect the convergence of the FL model. A recent way to tackle these challenges is client selection, based on customized criteria that consider UAV computing power and energy consumption. However, most existing client selection schemes neglected the participants' reliability. Indeed, FL can be targeted by poisoning attacks, in which malicious UAVs upload poisonous local models to the FL server, by either providing targeted false predictions for specifically chosen inputs or by compromising the global model's accuracy through tampering with the local model. Hence, we propose in this paper a novel client selection scheme that enhances convergence by prioritizing fast UAVs with high-reliability scores, while eliminating malicious UAVs from training. Through experiments, we assess the effectiveness of our scheme in resisting different attack scenarios, in terms of convergence and achieved model accuracy. Finally, we demonstrate the performance superiority of the proposed approach compared to baseline methods.
△ Less
Submitted 16 December, 2023;
originally announced December 2023.
-
Data-Efficient Energy-Aware Participant Selection for UAV-Enabled Federated Learning
Authors:
Youssra Cheriguene,
Wael Jaafar,
Chaker Abdelaziz Kerrache,
Halim Yanikomeroglu,
Fatima Zohra Bousbaa,
Nasreddine Lagraa
Abstract:
Unmanned aerial vehicle (UAV)-enabled edge federated learning (FL) has sparked a rise in research interest as a result of the massive and heterogeneous data collected by UAVs, as well as the privacy concerns related to UAV data transmissions to edge servers. However, due to the redundancy of UAV collected data, e.g., imaging data, and non-rigorous FL participant selection, the convergence time of…
▽ More
Unmanned aerial vehicle (UAV)-enabled edge federated learning (FL) has sparked a rise in research interest as a result of the massive and heterogeneous data collected by UAVs, as well as the privacy concerns related to UAV data transmissions to edge servers. However, due to the redundancy of UAV collected data, e.g., imaging data, and non-rigorous FL participant selection, the convergence time of the FL learning process and bias of the FL model may increase. Consequently, we investigate in this paper the problem of selecting UAV participants for edge FL, aiming to improve the FL model's accuracy, under UAV constraints of energy consumption, communication quality, and local datasets' heterogeneity. We propose a novel UAV participant selection scheme, called data-efficient energy-aware participant selection strategy (DEEPS), which consists of selecting the best FL participant in each sub-region based on the structural similarity index measure (SSIM) average score of its local dataset and its power consumption profile. Through experiments, we demonstrate that the proposed selection scheme is superior to the benchmark random selection method, in terms of model accuracy, training time, and UAV energy consumption.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
Interest Flooding Attacks in Named Data Networking: Survey of Existing Solutions, Open Issues, Requirements and Future Directions (Extended version)
Authors:
Ahmed Benmoussa,
Chaker Abdelaziz Kerrache,
Nasreddine Lagraa,
Spyridon Mastorakis,
Abderrahmane Lakas,
Abdou el Karim Tahari
Abstract:
Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric Networking. The NDN architecture adopts name-based routing and location-independent data retrieval. Among other important features, NDN integrates security mechanisms and focuses on protecting the content rather than the communications channels. Along with a new architecture come new threats and NDN is no e…
▽ More
Named Data Networking (NDN) is a prominent realization of the vision of Information-Centric Networking. The NDN architecture adopts name-based routing and location-independent data retrieval. Among other important features, NDN integrates security mechanisms and focuses on protecting the content rather than the communications channels. Along with a new architecture come new threats and NDN is no exception. NDN is a potential target for new network attacks such as Interest Flooding Attacks (IFAs). Attackers take advantage of IFA to launch (D)DoS attacks in NDN. Many IFA detection and mitigation solutions have been proposed in the literature. However, there is no comprehensive review study of these solutions that has been proposed so far. Therefore, in this paper, we propose a survey of the various IFAs with a detailed comparative study of all the relevant proposed solutions as counter-measures against IFAs. We also review the requirements for a complete and efficient IFA solution and pinpoint the various issues encountered by IFA detection and mitigation mechanisms through a series of attack scenarios. Finally, in this survey, we offer an analysis of the open issues and future research directions regarding IFAs. This manuscript consists of an extended version of the paper published in ACM Computing Surveys: https://dl.acm.org/doi/10.1145/3539730.
△ Less
Submitted 11 June, 2022;
originally announced June 2022.
-
Remote Sensing to Control Respiratory Viral Diseases Outbreaks using Internet of Vehicles
Authors:
Yesin Sahraoui,
Ahmed Korichi,
Chaker Abdelaziz Kerrache,
Muhammad Bilal,
Marica Amadeo
Abstract:
The respiratory viral diseases, such as those caused by the family of coronaviruses, can be extremely contagious and spread through saliva droplets generated by coughing, sneezing, or breathing. In humans, the most common symptoms of the infection include fever and difficulty in breathing. In order to reduce the diffusion of the current "Coronavirus disease 2019 (COVID-19)" pandemic, the Internet…
▽ More
The respiratory viral diseases, such as those caused by the family of coronaviruses, can be extremely contagious and spread through saliva droplets generated by coughing, sneezing, or breathing. In humans, the most common symptoms of the infection include fever and difficulty in breathing. In order to reduce the diffusion of the current "Coronavirus disease 2019 (COVID-19)" pandemic, the Internet of Things (IoT) technologies can play an important role; for instance, they can be effectively used for implementing a real-time patient tracking and warning system at a city scale. Crucial places to install the tracking IoT devices are the public/private vehicles that, augmented with multiple connectivity solutions, can implement the Internet of Vehicles (IoV) paradigm. In such a ubiquitous network environment, vehicles are equipped with a variety of sensors, including regular cameras that can be replaced with thermal cameras. Therefore, this paper proposes a new design for widely detecting respiratory viral diseases that leverages IoV to collect real-time body temperature and breathing rate measurements of pedestrians. This information can be used to recognize geographic areas affected by possible COVID-19 cases and to implement proactive preventive strategies that would further limit the spread of the disease.
△ Less
Submitted 13 August, 2020;
originally announced March 2021.