Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (6): 99-112.doi: 10.11959/j.issn.2096-109x.2021083
• TopicⅡ: Blockchain Technology • Previous Articles
Ming YANG1, Xuexian HU1, Qihui ZHANG1, Jianghong WEI1, Wenfen LIU2
Revised:
2021-03-30
Online:
2021-12-01
Published:
2021-12-01
Supported by:
CLC Number:
Ming YANG, Xuexian HU, Qihui ZHANG, Jianghong WEI, Wenfen LIU. Federated learning scheme for mobile network based on reputation evaluation mechanism and blockchain[J]. Chinese Journal of Network and Information Security, 2021, 7(6): 99-112.
[1] | LUETH K L . State of the IoT 2018:number of IoT devices now at 7B–Market accelerating[J]. IoT Analytics, 2018,8. |
[2] | PRYSS R , REICHERT M , HERRMANN J ,et al. Mobile crowd sensing in clinical and psychological trials:a case study[C]// Proceedings of International Symposium on Computer-Based Medical Systems. 2015: 23-24. |
[3] | 王仁生, 吴天昊, 张琳 ,等. 基于区块链的智能网联车队协同轨迹预测系统[J]. 网络与信息安全学报, 2020,6(3): 78-87. |
WANG R S , WU T H , ZHANG L ,et al. Cooperative trajectory prediction system for intelligent and automated connected convoy based on blockchain[J]. Chinese Journal of Network and Information Security, 2020,6(3): 78-87. | |
[4] | ZHU X , LI H , YU Y . Blockchain-based privacy preserving deep learning[C]// Proceedings of International Conference on Information Security and Cryptology. 2018: 370-383. |
[5] | MCMAHAN B , MOORE E , RAMAGE D ,et al. Communicationefficient learning of deep networks from decentralized data[C]// Proceedings of Artificial Intelligence and Statistics. 2017: 1273-1282. |
[6] | BONAWITZ K , EICHNER H , GRIESKAMP W ,et al. Towards federated learning at scale:system design[J]. arXiv preprint arXiv:1902.01046, 2019. |
[7] | YANG Q , LIU Y , CHEN T ,et al. Federated machine learning:Concept and applications[J]. ACM Transactions on Intelligent Systems and Technology, 2019,10(2): 1-19. |
[8] | ANH T T , LUONG N C , NIYATO D ,et al. Efficient training management for mobile crowd-machine learning:a deep reinforcement learning approach[J]. IEEE Wireless Communications Letters, 2019,8(5): 1345-1348. |
[9] | HARD A , RAO K , MATHEWS R ,et al. Federated learning for mobile keyboard prediction[J]. arXiv preprint arXiv:1811.03604, 2018. |
[10] | LIANG L , YE H , LI G Y . Toward intelligent vehicular networks:a machine learning framework[J]. IEEE Internet of Things Journal, 2018,6(1): 124-135. |
[11] | TRAN N H , BAO W , ZOMAYA A ,et al. Federated learning over wireless networks:optimization model design and analysis[C]// Proceedings of IEEE INFOCOM 2019-IEEE Conference on Computer Communications. 2019: 1387-1395. |
[12] | LI Y , COURCOUBETIS C , DUAN L . Recommending paths:Follow or not follow[C]// Proceedings of IEEE INFOCOM 2019-IEEE Conference on Computer Communications. 2019: 928-936. |
[13] | FUNG C , YOON C J M , BESCHASTNIKH I . Mitigating sybils in federated learning poisoning[J]. arXiv preprint arXiv:1808.04866, 2018. |
[14] | KANG J , XIONG Z , NIYATO D ,et al. Toward secure blockchain-enabled Internet of Vehicles:Optimizing consensus management using reputation and contract theory[J]. IEEE Transactions on Vehicular Technology, 2019,68(3): 2906-2920. |
[15] | REHMAN M H , SALAH K , DAMIANI E ,et al. Towards blockchain-based reputation-aware federated learning[C]// Proceedings of IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops. 2020: 183-188. |
[16] | LIU Y , AI Z , SUN S ,et al. Fedcoin:A peer-to-peer payment system for federated learning[M]// Federated Learning. Springer,Cham, 2020: 125-138. |
[17] | WU L , MENG K , XU S ,et al. Democratic centralism:A hybrid blockchain architecture and its applications in energy internet[C]// Proceedings of 2017 IEEE International Conference on Energy Internet (ICEI). IEEE, 2017: 176-181. |
[18] | LIND J , NAOR O , EYAL I ,et al. Teechain:reducing storage costs on the blockchain with offline payment channels[C]// Proceedings of the 11th ACM International Systems and Storage Conference. 2018: 125-125. |
[19] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. Manubot, 2019. |
[20] | BENJI M , SINDHU M . A study on the Corda and Ripple blockchain platforms[C]// Proceedings ofAdvances in Intelligent Systems and Computing. 2019: 179-187. |
[21] | BOGNER A , CHANSON M , MEEUW A . A decentralised sharing app running a smart contract on the ethereum blockchain[C]// Proceedings of the 6th International Conference on the Internet of Things. 2016: 177-178. |
[22] | 孟博, 刘加兵, 刘琴 ,等. 智能合约安全综述[J]. 网络与信息安全学报, 2020,6(3): 1-13. |
MENG B , LIU J B , LIU Q ,et al. Survey of smart contract security[J]. Chinese Journal of Network and Information Security, 2020,6(3): 1-13. | |
[23] | BENJI M , SINDHU M . A study on the Corda and Ripple blockchain platforms[M]// Advances in Big Data and Cloud Computing. Springer,Singapore, 2019: 179-187. |
[24] | 张凯, 潘晓中 . 云计算下基于用户行为信任的访问控制模型[J]. 计算机应用, 2014,34(4): 1051-1054. |
ZHANG K , PAN X Z . Access control model based on user behavior trust in cloud computing[J]. Journal of Computer Applications, 2014,34(4): 1051-1054. | |
[25] | 王海勇, 潘启青, 郭凯璇 . 基于区块链和用户信用度的访问控制模型[J]. 计算机应用, 2020,40(6): 1674-1679. |
WANG H Y , PAN Q Q , GUO K X . Access control model based on blockchain and user credit[J]. Journal of Computer Applications, 2020,40(6): 1674-1679. | |
[26] | HUANG X , YU R , KANG J ,et al. Software defined networking for energy harvesting internet of things[J]. IEEE Internet of Things Journal, 2018,5(3): 1389-1399. |
[27] | XIONG L , LIU L . Peertrust:Supporting reputation-based trust for peer-to-peer electronic communities[J]. IEEE Transactions on Knowledge and Data Engineering, 2004,16(7): 843-857. |
[28] | KANG J , XIONG Z , NIYATO D ,et al. Reliable federated learning for mobile networks[J]. IEEE Wireless Communications, 2020,27(2): 72-80. |
[1] | Zhensheng GAO, Lifeng CAO, Xuehui DU. Research progress of access control based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 68-87. |
[2] | Guanqun YANG, Yin LIU, Hao XU, Hongwei XING, Jianhui ZHANG, Entang LI. Credible distributed identity authentication system of microgrid based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 88-98. |
[3] | Chuanxin ZHOU, Yi SUN, Degang WANG, Huawei GE. Survey of federated learning research [J]. Chinese Journal of Network and Information Security, 2021, 7(5): 77-92. |
[4] | Hao ZHAO, Hui SHU, Fei KANG, Ying XING. High resistance botnet based on smart contract [J]. Chinese Journal of Network and Information Security, 2021, 7(4): 30-41. |
[5] | Bohan KANG, Ning ZHANG, Jianming ZHU. Research on inter-blockchain service framework and communication mechanism based on smart service transaction [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 105-114. |
[6] | Yueyang YE, Xinglan ZHANG. Research on anonymous identity authentication technology in Fabric [J]. Chinese Journal of Network and Information Security, 2021, 7(3): 134-140. |
[7] | Qi CAO, Shuhua RUAN, Xingshu CHEN, Xiao LAN, Hongxia ZHANG, Hongjian JIN. Embedding of national cryptographic algorithm in Hyperledger Fabric [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 65-75. |
[8] | Xiaojiao CHEN, Xianzheng LIN, Nenghai YU. Compression of bitcoin blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 76-83. |
[9] | Tao ZHANG, Qianhong WU, Zongxun TANG. Bitcoin blockchain based information convert transmission [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 84-92. |
[10] | Zhenhua CAI,Jiayun LIN,Fang LIU. Blockchain storage:technologies and challenges [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 11-20. |
[11] | Sui CHENG,Xianzheng LIN,Nenghai YU. Improvement of the blockchain protocol based on memory-hard function [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 21-26. |
[12] | Hao WANG,Tianhao WU,Konglin ZHU,Lin ZHANG. Anonymous vehicle authentication scheme based on blockchain technology in the intersection scenario [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 27-35. |
[13] | Xu ZHANG,Xin MA. Lightweight mobile Ad Hoc network authentication scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2020, 6(4): 14-22. |
[14] | Kang QIAO,Hongbo TANG,Wei YOU,Haitao LI. Efficient and safe auditable mixed-coin service scheme based on blind signature [J]. Chinese Journal of Network and Information Security, 2020, 6(4): 23-36. |
[15] | Sijie QIAN,Liquan CHEN,Shihui WANG. PKI cross-domain authentication scheme based on advanced PBFT algorithm [J]. Chinese Journal of Network and Information Security, 2020, 6(4): 37-44. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|