42 research outputs found
A novel multipath-transmission supported software defined wireless network architecture
The inflexible management and operation of today\u27s wireless access networks cannot meet the increasingly growing specific requirements, such as high mobility and throughput, service differentiation, and high-level programmability. In this paper, we put forward a novel multipath-transmission supported software-defined wireless network architecture (MP-SDWN), with the aim of achieving seamless handover, throughput enhancement, and flow-level wireless transmission control as well as programmable interfaces. In particular, this research addresses the following issues: 1) for high mobility and throughput, multi-connection virtual access point is proposed to enable multiple transmission paths simultaneously over a set of access points for users and 2) wireless flow transmission rules and programmable interfaces are implemented into mac80211 subsystem to enable service differentiation and flow-level wireless transmission control. Moreover, the efficiency and flexibility of MP-SDWN are demonstrated in the performance evaluations conducted on a 802.11 based-testbed, and the experimental results show that compared to regular WiFi, our proposed MP-SDWN architecture achieves seamless handover and multifold throughput improvement, and supports flow-level wireless transmission control for different applications
Learn to Unlearn: A Survey on Machine Unlearning
Machine Learning (ML) models have been shown to potentially leak sensitive
information, thus raising privacy concerns in ML-driven applications. This
inspired recent research on removing the influence of specific data samples
from a trained ML model. Such efficient removal would enable ML to comply with
the "right to be forgotten" in many legislation, and could also address
performance bottlenecks from low-quality or poisonous samples. In that context,
machine unlearning methods have been proposed to erase the contributions of
designated data samples on models, as an alternative to the often impracticable
approach of retraining models from scratch. This article presents a
comprehensive review of recent machine unlearning techniques, verification
mechanisms, and potential attacks. We further highlight emerging challenges and
prospective research directions (e.g. resilience and fairness concerns). We aim
for this paper to provide valuable resources for integrating privacy, equity,
andresilience into ML systems and help them "learn to unlearn".Comment: 10 pages, 5 figures, 1 tabl
An Efficient and Reliable Asynchronous Federated Learning Scheme for Smart Public Transportation
Since the traffic conditions change over time, machine learning models that
predict traffic flows must be updated continuously and efficiently in smart
public transportation. Federated learning (FL) is a distributed machine
learning scheme that allows buses to receive model updates without waiting for
model training on the cloud. However, FL is vulnerable to poisoning or DDoS
attacks since buses travel in public. Some work introduces blockchain to
improve reliability, but the additional latency from the consensus process
reduces the efficiency of FL. Asynchronous Federated Learning (AFL) is a scheme
that reduces the latency of aggregation to improve efficiency, but the learning
performance is unstable due to unreasonably weighted local models. To address
the above challenges, this paper offers a blockchain-based asynchronous
federated learning scheme with a dynamic scaling factor (DBAFL). Specifically,
the novel committee-based consensus algorithm for blockchain improves
reliability at the lowest possible cost of time. Meanwhile, the devised dynamic
scaling factor allows AFL to assign reasonable weights to stale local models.
Extensive experiments conducted on heterogeneous devices validate outperformed
learning performance, efficiency, and reliability of DBAFL
Security and privacy in smart cities: challenges and opportunities
Smart cities are expected to improve the quality of daily life, promote sustainable development, and improve the functionality of urban systems. Now that many smart systems have been implemented, security and privacy issues have become a major challenge that requires effective countermeasures. However, traditional cybersecurity protection strategies cannot be applied directly to these intelligent applications because of the heterogeneity, scalability, and dynamic characteristics of smart cities. Furthermore, it is necessary to be aware of security and privacy threats when designing and implementing new mechanisms or systems. Motivated by these factors, we survey the current situations of smart cities with respect to security and privacy to provide an overview of both the academic and industrial fields and to pave the way for further exploration. Specifically, this survey begins with an overview of smart cities to provide an integrated context for readers. Then, we discuss the privacy and security issues in current smart applications along with the corresponding requirements for building a stable and secure smart city. In the next step, we summarize the existing protection technologies. Finally, we present open research challenges and identify some future research directions
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes
The fast proliferation of edge devices for the Internet of Things (IoT) has led to massive volumes of data explosion. The generated data is collected and shared using edge-based IoT structures at a considerably high frequency. Thus, the data-sharing privacy exposure issue is increasingly intimidating when IoT devices make malicious requests for filching sensitive information from a cloud storage system through edge nodes. To address the identified issue, we present evolutionary privacy preservation learning strategies for an edge computing-based IoT data sharing scheme. In particular, we introduce evolutionary game theory and construct a payoff matrix to symbolize intercommunication between IoT devices and edge nodes, where IoT devices and edge nodes are two parties of the game. IoT devices may make malicious requests to achieve their goals of stealing privacy. Accordingly, edge nodes should deny malicious IoT device requests to prevent IoT data from being disclosed. They dynamically adjust their own strategies according to the opponent's strategy and finally maximize the payoffs. Built upon a developed application framework to illustrate the concrete data sharing architecture, a novel algorithm is proposed that can derive the optimal evolutionary learning strategy. Furthermore, we numerically simulate evolutionarily stable strategies, and the final results experimentally verify the correctness of the IoT data sharing privacy preservation scheme. Therefore, the proposed model can effectively defeat malicious invasion and protect sensitive information from leaking when IoT data is shared
Blockchain-driven privacy-preserving machine learning
With the integration of blockchain with current leading privacy-preserving machine learning mechanism, the performances of FL and GAN-DP can be further improved, especially the robustness against poisoning attacks. In addition, the deployment of blockchain as the underlying architecture enables decentralization while providing incentive mechanisms. Furthermore, the efficiency can be guaranteed, and the storage resources can be saved with an off-chain structure. Future directions in this field may include the optimization using game theory and reversible blockchain using chameleon hash. Chapter Contents: • 8.1 GAN-DP and blockchain • 8.1.1 Wasserstein generative adversarial net • 8.1.2 Generator and discriminator • 8.1.3 GAN-DP with a DP identifier • 8.1.4 Decentralized privacy • 8.1.5 Further discussion • 8.2 Federated learning and blockchain • 8.2.1 Existing issues • 8.2.2 How blockchain benefits FL • 8.2.3 Blockchain-enabled federated learning • 8.3 Conclusion remarks • References