Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (6): 99-112.doi: 10.11959/j.issn.2096-109x.2021083
• TopicⅡ: Blockchain Technology • Previous Articles Next Articles
Ming YANG1, Xuexian HU1, Qihui ZHANG1, Jianghong WEI1, Wenfen LIU2
Revised:
2021-03-30
Online:
2021-12-15
Published:
2021-12-01
Supported by:
CLC Number:
Ming YANG, Xuexian HU, Qihui ZHANG, Jianghong WEI, Wenfen LIU. Federated learning scheme for mobile network based on reputation evaluation mechanism and blockchain[J]. Chinese Journal of Network and Information Security, 2021, 7(6): 99-112.
[1] | LUETH K L . State of the IoT 2018:number of IoT devices now at 7B–Market accelerating[J]. IoT Analytics, 2018,8. |
[2] | PRYSS R , REICHERT M , HERRMANN J ,et al. Mobile crowd sensing in clinical and psychological trials:a case study[C]// Proceedings of International Symposium on Computer-Based Medical Systems. 2015: 23-24. |
[3] | 王仁生, 吴天昊, 张琳 ,等. 基于区块链的智能网联车队协同轨迹预测系统[J]. 网络与信息安全学报, 2020,6(3): 78-87. |
WANG R S , WU T H , ZHANG L ,et al. Cooperative trajectory prediction system for intelligent and automated connected convoy based on blockchain[J]. Chinese Journal of Network and Information Security, 2020,6(3): 78-87. | |
[4] | ZHU X , LI H , YU Y . Blockchain-based privacy preserving deep learning[C]// Proceedings of International Conference on Information Security and Cryptology. 2018: 370-383. |
[5] | MCMAHAN B , MOORE E , RAMAGE D ,et al. Communicationefficient learning of deep networks from decentralized data[C]// Proceedings of Artificial Intelligence and Statistics. 2017: 1273-1282. |
[6] | BONAWITZ K , EICHNER H , GRIESKAMP W ,et al. Towards federated learning at scale:system design[J]. arXiv preprint arXiv:1902.01046, 2019. |
[7] | YANG Q , LIU Y , CHEN T ,et al. Federated machine learning:Concept and applications[J]. ACM Transactions on Intelligent Systems and Technology, 2019,10(2): 1-19. |
[8] | ANH T T , LUONG N C , NIYATO D ,et al. Efficient training management for mobile crowd-machine learning:a deep reinforcement learning approach[J]. IEEE Wireless Communications Letters, 2019,8(5): 1345-1348. |
[9] | HARD A , RAO K , MATHEWS R ,et al. Federated learning for mobile keyboard prediction[J]. arXiv preprint arXiv:1811.03604, 2018. |
[10] | LIANG L , YE H , LI G Y . Toward intelligent vehicular networks:a machine learning framework[J]. IEEE Internet of Things Journal, 2018,6(1): 124-135. |
[11] | TRAN N H , BAO W , ZOMAYA A ,et al. Federated learning over wireless networks:optimization model design and analysis[C]// Proceedings of IEEE INFOCOM 2019-IEEE Conference on Computer Communications. 2019: 1387-1395. |
[12] | LI Y , COURCOUBETIS C , DUAN L . Recommending paths:Follow or not follow[C]// Proceedings of IEEE INFOCOM 2019-IEEE Conference on Computer Communications. 2019: 928-936. |
[13] | FUNG C , YOON C J M , BESCHASTNIKH I . Mitigating sybils in federated learning poisoning[J]. arXiv preprint arXiv:1808.04866, 2018. |
[14] | KANG J , XIONG Z , NIYATO D ,et al. Toward secure blockchain-enabled Internet of Vehicles:Optimizing consensus management using reputation and contract theory[J]. IEEE Transactions on Vehicular Technology, 2019,68(3): 2906-2920. |
[15] | REHMAN M H , SALAH K , DAMIANI E ,et al. Towards blockchain-based reputation-aware federated learning[C]// Proceedings of IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops. 2020: 183-188. |
[16] | LIU Y , AI Z , SUN S ,et al. Fedcoin:A peer-to-peer payment system for federated learning[M]// Federated Learning. Springer,Cham, 2020: 125-138. |
[17] | WU L , MENG K , XU S ,et al. Democratic centralism:A hybrid blockchain architecture and its applications in energy internet[C]// Proceedings of 2017 IEEE International Conference on Energy Internet (ICEI). IEEE, 2017: 176-181. |
[18] | LIND J , NAOR O , EYAL I ,et al. Teechain:reducing storage costs on the blockchain with offline payment channels[C]// Proceedings of the 11th ACM International Systems and Storage Conference. 2018: 125-125. |
[19] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. Manubot, 2019. |
[20] | BENJI M , SINDHU M . A study on the Corda and Ripple blockchain platforms[C]// Proceedings ofAdvances in Intelligent Systems and Computing. 2019: 179-187. |
[21] | BOGNER A , CHANSON M , MEEUW A . A decentralised sharing app running a smart contract on the ethereum blockchain[C]// Proceedings of the 6th International Conference on the Internet of Things. 2016: 177-178. |
[22] | 孟博, 刘加兵, 刘琴 ,等. 智能合约安全综述[J]. 网络与信息安全学报, 2020,6(3): 1-13. |
MENG B , LIU J B , LIU Q ,et al. Survey of smart contract security[J]. Chinese Journal of Network and Information Security, 2020,6(3): 1-13. | |
[23] | BENJI M , SINDHU M . A study on the Corda and Ripple blockchain platforms[M]// Advances in Big Data and Cloud Computing. Springer,Singapore, 2019: 179-187. |
[24] | 张凯, 潘晓中 . 云计算下基于用户行为信任的访问控制模型[J]. 计算机应用, 2014,34(4): 1051-1054. |
ZHANG K , PAN X Z . Access control model based on user behavior trust in cloud computing[J]. Journal of Computer Applications, 2014,34(4): 1051-1054. | |
[25] | 王海勇, 潘启青, 郭凯璇 . 基于区块链和用户信用度的访问控制模型[J]. 计算机应用, 2020,40(6): 1674-1679. |
WANG H Y , PAN Q Q , GUO K X . Access control model based on blockchain and user credit[J]. Journal of Computer Applications, 2020,40(6): 1674-1679. | |
[26] | HUANG X , YU R , KANG J ,et al. Software defined networking for energy harvesting internet of things[J]. IEEE Internet of Things Journal, 2018,5(3): 1389-1399. |
[27] | XIONG L , LIU L . Peertrust:Supporting reputation-based trust for peer-to-peer electronic communities[J]. IEEE Transactions on Knowledge and Data Engineering, 2004,16(7): 843-857. |
[28] | KANG J , XIONG Z , NIYATO D ,et al. Reliable federated learning for mobile networks[J]. IEEE Wireless Communications, 2020,27(2): 72-80. |
[1] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[2] | Jinyin CHEN, Rongchang LI, Guohan HUANG, Tao LIU, Haibin ZHENG, Yao CHENG. Survey on vertical federated learning: algorithm, privacy and security [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 1-20. |
[3] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[4] | Heli WANG, Qiao YAN. Selfish mining detection scheme based on the characters of transactions [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114. |
[5] | Beiyuan YU, Shanyao REN, Jianwei LIU. Overview of blockchain assets theft attacks and defense technology [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17. |
[6] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[7] | Zuobin YING, Yichen FANG, Yiwen ZHANG. Privacy-preserving federated learning framework with dynamic weight aggregation [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 56-65. |
[8] | Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG. Bytecode-based approach for Ethereum smart contract classification [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 111-120. |
[9] | Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN. Blockchain-based high transparent PKI authentication protocol [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11. |
[10] | Wenbo ZHANG, Simin CHEN, Lifei WEI, Wei SONG, Dongmei HUANG. State-of-the-art survey of smart contract verification based on formal methods [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 12-28. |
[11] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[12] | Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG. Application and prospect of blockchain in Metaverse [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 45-65. |
[13] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[14] | Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG. Blockchain covert communication scheme based on the cover of normal transactions [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 77-86. |
[15] | Jianlin NIU, Zhiyu REN, Xuehui DU. Cross-domain authentication scheme based on consortium blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 123-133. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|