1. Introduction
Wireless federated learning (WFL), which allows the training of machine learning (ML) models on a large corpus of decentralized data stored on mobile devices [1], has attracted significant research interest. Currently, WFL primarily aims to enhance communication efficiency [2,3,4,5,6], improve privacy and security [7,8,9], investigate a balance between privacy and utility [10,11,12,13,14], manage power control for wireless devices [15,16], and design effective beamforming strategies [17]. To optimize the processing power of edge and cloud servers, a hierarchical federated learning (HFL) system involving clients, edge servers, and cloud servers has been proposed in [18]. Compared to FL systems relying on a single server, HFL reduces the computational load [19,20,21], lowers user-to-cloud server communication costs [18,19,20,21,22,23], decreases FL processing time [18], and improves privacy and security in FL [22,23]. Specifically, since the convergence performance of the HFL system is theoretically proved in [18], joint user scheduling and wireless resource allocation are established to improve both communication and energy efficiency [19,20,21]. To enhance privacy in wireless hierarchical federated learning (WHFL), ref. [22] introduced a method based on local differential privacy (LDP) that involves artificial noise into the shared model parameters at two stages. Additionally, ref. [24] considered the influence of device mobility on the learning performance of WHFL systems.
The broadcast nature of wireless communication renders WFL susceptible to eavesdropping. As a result, tackling the challenge of WFL in the presence of physical layer security (PLS) is a significant issue. Different from the privacy requirement of the FL that the information leakage between users and servers does not need to be arbitrarily small due to the accuracy of data analysis, the information leakage to the eavesdropper should vanish, which is also known as the PLS requirement [25]. The current research in WFL in the presence of PLS [26,27,28,29] primarily focuses on enhancing the security of data through resource allocation and artificial jamming techniques. Specifically, reference [26] focuses on optimizing the power control of drones to enhance the security rate of the WFL system, considering constraints such as WFL training time and battery capacity of the drone. In [27], a method for achieving secrecy in WFL was proposed via using cooperative jamming, which involves the cooperative provision of jamming signals by users to counteract eavesdropping attempts and enhance security. Ref. [28] proposed the method of using conventional wireless devices to form a non-orthogonal multiple access (NOMA) transmission group with an edge device for secrecy-enhanced mobile edge computing, and the devices provide cooperative jamming to an eavesdropper while transmitting data to a cellular base station. In [29], a power allocation algorithm is proposed for WFL, where the transmitting power is divided proportionally between the transmitted signal and artificial noise to maximize the secrecy rate while satisfying the model performance requirement. Apart from this, ref. [30] proposed a PLS measure while considering the privacy-utility constraints in WFL.
Very recently, ultra-reliable and low-latency communication (URLLC) has attracted significant attention, as it serves as a critical communication service in fifth-generation (5G) and sixth-generation (6G) cellular networks. One essential technology for URLLC is short-sized packet communication [31], which indicates that the coding block length should be finite, and finite block-length (FBL) coding [32] provides an effective way for this scenario. Currently, the study of WFL combined with URLLC includes the design of a multi-level architecture to satisfy URLLC requirements [33], and the application of WFL in vehicular networks while considering URLLC constraints [34]. To the best of the authors’ knowledge, the practical FBL scheme for the WFL remains unknown. Then it is natural to ask: is there any practical FBL scheme for the WHFL in the presence of PLS, if yes, what is the relationship between PLS, privacy, and utility in WHFL systems while considering URLLC requirements?
One possible solution to the aforementioned question is a channel feedback coding scheme. The study of channel feedback scheme started from [35], where an elegant feedback coding scheme called the Schalkwijk–Kailath (SK) scheme was proposed for additive white Gaussian noise (AWGN) channel with noiseless feedback. In this scheme, the transmitter sends the original message only in the initial transmission. In the subsequent round, the receiver sends an estimate of the original message to the transmitter via a noiseless feedback channel. The transmitter sends an amplified version of the estimation error back to the receiver, and the receiver obtains an estimate of the estimation error by using the minimum mean square error (MMSE). After a predetermined number of rounds, the receiver uses the minimum distance rule to decode the message. It was shown that the SK scheme [35] is not only capacity-achieving but also its decoding error probability doubly exponentially decays to zero as the coding block length increases, which indicates that the SK scheme requires an extremely short coding block length to achieve a desired decoding error probability. Furthermore, ref. [36] showed that the SK scheme achieves perfect weak secrecy by itself, i.e., the SK scheme satisfies PLS requirement by itself. Recently, ref. [37] showed that the SK scheme [35] is almost the optimal FBL scheme for the AWGN channel with feedback, which indicates that it may be a good choice for URLLC.
However, note that the application of the SK scheme to the wireless fading channel still has a long way to go since it is based on the assumption that the feedback channel is a noiseless channel. Apart from this, in wireless communication, the channel feedback is often utilized to transmit channel state information (CSI) back to the device for each uplink transmission [17], and this allows the device to adjust its transmission parameters based on the received feedback. Then it is natural to ask: Can we utilize the channel feedback not only for CSI transmission but also for designing an FBL approach for the multi-antenna URLLC-WHFL in the presence of PLS, i.e., is it possible to extend the classical SK scheme to the multi-antenna URLLC-WHFL in the presence of PLS?
In this paper, we answer the aforementioned questions by studying the WHFL in the presence of PLS. Figure 1 illustrates the collaborative training of a learning model by users, edge servers, and cloud servers. To preserve privacy, a local differential privacy (LDP) mechanism [38] is utilized by adding Gaussian noise to each user’s gradient before aggregating all gradients to the edge servers. Furthermore, communication between each edge server and the cloud server over a quasi-static fading duplex channel, which, due to the inherent broadcast characteristics of wireless communication, is eavesdropping by an external eavesdropper. Our primary objective is to ensure that the polluted gradient data retains a certain amount of utility while minimizing privacy leakage to the cloud server and protecting the gradient data transmitted from edge servers to the cloud server from eavesdropping. A straightforward way to achieve the above goal is for the edge servers to securely encode the polluted data gradients as codewords and transmit them into wireless duplex fading channels. The cloud server can successfully decode the polluted data gradients, while the eavesdropper obtains no information about them. In this way, the PLS and the privacy of the data can simultaneously be guaranteed since the real data gradients are protected by the LDP mechanism.
Our key contributions to this paper are summarized as follows:
We propose an FBL approach for multi-antenna WHFL in the presence of PLS. In this approach, the feedback link is not only utilized for CSI transmission but also used to send the cloud server’s MMSE about the transmitted polluted data gradient back to the edge server. The key idea of the proposed scheme is to apply the modulo-lattice operation (MLO) [39] to eliminate the impact of feedback channel noise on the performance of the SK scheme [35], and further extend the SK-type scheme to a two-dimensional situation, which performs well in the SISO fading channel. Then further applying pre-coding, beamforming, and singular value decomposition (SVD) techniques to the extended scheme for the SISO case, the FBL coding scheme for the multi-antenna WHFL is obtained.
We derive the achievable secrecy rate of our proposed scheme and characterize the relationship between PLS, privacy, and utility of our scheme. Moreover, given fixed decoding error probability and coding block length, we establish lower and upper bounds on the LDP noise variance that ensure certain privacy, utility, and secrecy levels of PLS.
To obtain a better understanding of the contribution of this paper and the related works studied in the literature, the following Table 1 summarizes the study of WFL in the presence of privacy, utility, PLS, and URLLC in the literature.
The remainder of this paper is organized as follows. In Section 2, the definitions, system model, and main results are given. The FBL approach for the MIMO case is shown in Section 3. FBL approaches for the SIMO/MISO cases are proposed in Section 4. Simulation results are shown in Section 5. Section 6 summarizes all results in this paper and discusses future work.
2. Definitions, System Model and Main Results
2.1. WHFL System
Figure 1 illustrates a system composed of users, L edge servers indexed by ℓ and a cloud server. The disjoint user sets are denoted as , and representing the number of users in edge server ℓ. The distributed datasets are represented by , where is the size of . Each dataset is defined as , where represents the j-th input sample and is the corresponding label. is the aggregated dataset of edge server ℓ, and the gradients from each user are aggregated by their corresponding edge server. The global loss function is defined as follows:
(1)
where model vector and . The local loss function is given by the following:(2)
where represents the sample-wise loss function. The goal of model training is to minimize the global loss function, as follows:(3)
To achieve this, we employ a distributed gradient descent iterative algorithm. Specifically, in the t-th () communication round, the cloud server broadcasts the current global model vector to all users, and every user has perfect knowledge of . Each user k then computes its local gradient using its dataset and the current model . Once the edge server ℓ receives all the noisy local gradients from its users, which have been perturbed by Gaussian noise for LDP, it computes an estimation of the partial gradient as follows:(4)
where denotes the size of . Then, the cloud server aggregates the partial gradient estimates from all edge servers to compute the estimation of the global gradient, as follows:(5)
and updates the global model by the following:(6)
where denotes the learning rate.2.2. Model Formulation
An information-theoretic model of WHFL system is shown in Figure 2. Without loss of generality, we adopt the following assumptions:
The communication of any individual edge server to the cloud server is not affected by other edge servers, and the downlink transmission from the cloud server to the edge servers is reliable [16]. Furthermore, we consider that an external eavesdropper targets the information transmitted during the uplink communication from the edge servers to the cloud server. Consequently, this paper primarily focuses on the PLS of the T rounds of uplink communication from one edge server to the cloud server.
The channels are quasi-static fading.
Following similar arguments in [3,9,16,17], we assume that the perfect CSI of the feedforward and feedback channels is known by both the cloud server and the edge server. Here note that this assumption is well-justified from a practical standpoint. For the feedforward channel, the channel training for estimating CSI at the cloud server can be achieved by transmitting pilot sequences from the edge servers, and the channel estimation is perfect when the length of the pilot sequences is sufficiently large [40]. On the other hand, when the cloud server transmits the perfectly estimated CSI to the edge server through the feedback channel, only a few feedback bits are required. By using a code with a low coding rate and high error-correcting capability, the probability of feedback error can be negligible [41] and, hence, the CSI of the feedforward channel is perfectly known by the transceiver. For the feedback channel, the perfect CSI sharing between transceivers can be realized in a similar way.
2.2.1. Privacy-Utility
In Figure 2, let represent the overall local gradient vector for user k () during the t-th () communication round, where and (). Following [42], assume that is independent and identically distributed (i.i.d.) and , which indicates that . The i.i.d. generated local Gaussian noise follows distribution and is independent of . The edge server aggregates the corrupted local gradient, and it is defined as follows:
(7)
where . The overall local gradients and noise for the t-th round are and , respectively, where , and . Consequently, from (7), the overall corrupted local gradients for the t-th round are , where and . Due to the fact that and are i.i.d. and independent, the overall corrupted gradients are i.i.d. and distributed as , where .(Mutual information privacy [43]). For every , if the mutual information during the t-th round is upper bounded by ϵ, namely, , the LDP mechanism is said to satisfy ϵ-mutual information privacy for .
(Utility [44]). The utility of is defined by the distortion between and , and in this paper, we consider the quadratic distortion . If , the utility of is determined by υ, where the utility and the distortion have an inverse relationship with each other, i.e., smaller υ corresponds to larger utility.
2.2.2. Gradient Compression
We employ lossy Gaussian source coding characterized by a quadratic distortion metric, defined as (the source encoder and decoder are respectively located at the edge server and cloud server), where is the output of the source decoder at the cloud server. Following [45] (Chapter 3.8, pp. 64–65), the edge server’s source encoder maps to and compresses into an index that is uniformly distributed over . The rate-distortion function is defined as follows:
(8)
where . For the cloud server’s source decoder, the decoding mapping transforms the indices into . Here note that when , no message is transmitted, and is set to 0.2.2.3. Communication Model
At the t-th round, the channel input-output relationships are expressed as follows:
(9)
(10)
(11)
where the input and output of the feedforward channel are denoted by and , respectively, the feedback channel’s input and output are and , respectively, and the eavesdropping channel’s output is . Note that , and . The average power constraint for the input of the edge server is , the input of the cloud server is constrained by . The matrices , , , and represent the CSI of the feedforward, feedback, and eavesdropping channels, respectively. The channel noises’ elements of , and are i.i.d. and distributed as , and , respectively. The input message of the edge server is uniformly drawn in the set , and it is encoded as a codeword of length . Furthermore, the input of the edge server is defined as , where is an encoding function and . The cloud server estimates the message using the decoding function . The input of the cloud server is defined as , where is an encoding function and . The average decoding error probability is given by the following:(12)
According to [46,47], the CSIs and of eavesdropping channels are defined as follows:
(13)
where are the estimated CSI of and , respectively. and represent the legal parties’ estimation errors about the perfect CSI of the eavesdropper’s channel, and these errors are respectively bounded by parameters and . Here note that corresponds to the situation that the legal parties obtain perfect CSI of the eavesdropper’s channel.The secrecy level of PLS [48] (the normalized uncertainty of the eavesdropper) is given by
(14)
A transmission rate R is said to be achievable, if for given decoding error probability τ, block length N (), secrecy level δ, , and , there exists a channel code described above such that we have the following:(15)
where , and represents the perfect secrecy. For the WHFL in SISO/SIMO/MISO/MIMO cases, the achievable secrecy transmission rates are respectively denoted by , the channel gains are respectively defined by , , , and the CSI estimation errors are defined by , , , , , , and .2.3. Main Results
For the MIMO WHFL with K users and T iterations, given that N, τ, υ, D, ϵ, δ, and applying the FBL approach in Section 3, the relationship between PLS, privacy, utility, and the noise variance of LDP is characterized by the following:
(16)
where , . In addition, an achievable transmission rate of our proposed FBL approach is given by the following:(17)
where(18)
(19)
and , , , , , and are defined in Section 3.Our FBL approach for the MIMO WHFL is an extension of the classical SK scheme for the AWGN channel with noiseless feedback. The key to this extension is composed of three parts:
The two-dimensional message mapping method, which maps the message to a complex codeword transmitted over the fading channels.
An SVD-based pre-coding strategy that divides the MIMO channel into several parallel SISO channels.
The two-dimensional modulo-lattice operation (MLO) that eliminates the impact of feedback channel noise on the performance of the SK scheme.
Details about the above tools and how to combine these tools to show our FBL approach for the MIMO WHFL are given in the next section, and the formal proof of Theorem 1 is in Appendix A. □
Here note that in the FBL approach for the MIMO WHFL, we apply an SVD-based pre-coding strategy to divide the MIMO channel into several parallel SISO channels, which indicates that the FBL approach for the SISO WHFL can be directly obtained since it is a special case of the approach for the MIMO WHFL. The following Corollary 1 proposes an FBL approach for the SISO WHFL and characterizes the relationship between PLS, privacy, utility, and the noise variance of LDP. Since Corollary 1 can be directly obtained from Theorem 1, we omit the detailed proof here.
For the SISO WHFL with K users and T iterations, given N, τ, υ, D, ϵ, δ, and using a similar FBL approach to that of Theorem 1, the relationship between PLS, privacy, utility, and the noise variance of LDP is characterized by the following:
(20)
where . Furthermore, an achievable transmission rate of our proposed FBL approach is given by the following:(21)
where , , , , , , and , , represent the modulus of , and , respectively.For the SIMO WHFL with K users and T iterations, given N, τ, υ, D, ϵ, δ, and using the FBL approach in Section 4, the relationship between PLS, privacy, utility, and the noise variance of LDP is characterized by the following:
(22)
where . In addition, an achievable transmission rate of our proposed FBL approach is given by the following:(23)
where , , SNR, , N, and are given in Corollary 1.The difference between the approaches in Theorems 1 and 2 is that for the SIMO case, we use a beamforming strategy together with a new pre-coding strategy instead of the SVD-based pre-coding strategy used for the MIMO case. Here the beamforming and new pre-coding strategies respectively transform the feedforward and feedback channels into SISO channels. Then, along the lines of the encoding-decoding procedure in Section 3.1.3, the FBL approach for the SIMO WHFL is obtained, and the detail about this approach is in Section 4. Finally, since the proof of Theorem 2 is included in that of Theorem 1, we omit the formal proof here. □
Here, note that in the SIMO WHFL, a beamforming strategy transforms the SIMO feedforward channel into the SISO feedforward channel, while a new pre-coding strategy transforms the MISO feedback channel into the SISO feedback channel. Analogously, for the MISO WHFL, first, we apply the pre-coding strategy of the SIMO WHFL to transform the MISO feedforward channel into the SISO feedforward channel, and the beamforming strategy of the SIMO WHFL to transform the SIMO feedback channel into the SISO feedback channel, then along the lines of the encoding-decoding procedure in Theorem 2, the following Corollary 2 for the MISO WHFL is obtained. As the proof follows a similar way to that of Theorem 2, the detailed proof is omitted here.
For the MISO WHFL with K users and T iterations, given N, τ, υ, D, ϵ and δ, and using a similar FBL approach to that of Theorem 2, the relationship between PLS, privacy, utility, and the noise variance of LDP is characterized by the following:
(24)
where . In addition, an achievable transmission rate of our proposed FBL approach is given by the following:(25)
where , , SNR, , N and are given in Corollary 1.3. An FBL Approach for the MIMO WHFL
For the WHFL in the MIMO case, (9)–(11) can be re-written as follows:
(26)
(27)
(28)
where , , , , , , the elements of , and are i.i.d. as , and , respectively. Here note that the feedforward channel (26) and the feedback channel (27) are both MIMO channels.In this section, for the MIMO WHFL system, an FBL approach is proposed, which combines the two-dimensional message mapping method, the two-dimensional MLO, and the SVD technique, see the following Figure 3. To facilitate a better understanding of Figure 3, we introduce the two-dimensional message mapping method and the two-dimensional MLO below.
The two-dimensional message mapping method: We first review the message mapping in the classical SK scheme [35] (see Figure 4a). Specifically, for given codeword length n, let the message and , where R is the transmission rate. Partition the interval into equal sub-intervals, with each sub-interval’s midpoint corresponding to a message in . Let denote the midpoint associated with message W, where the variance of is approximately 1. This one-dimensional mapping method is shown to be optimal for AWGN channels with real signals. To address the complexity of fading channels, we introduce a two-dimensional message mapping method, detailed as follows:
For given codeword length n, let message , where W, and are uniformly distributed in , and , respectively, and . Since the message W is composed of two parts, we place the points in a complex square grid with corners located at (see Figure 4b). Divide the entire square grid into equally spaced sub-grids, and the center point of each sub-grid is mapped to a pair of values in . Let be the center point of the sub-grid with respect to (w.r.t) the message , where and represent the real and imaginary components of , respectively, and the variance of approximately equals 2.
The two-dimensional MLO: The two-dimensional MLO is given by the following:
(29)
where the two-dimensional lattice is a complex plane with , , , , is the nearest neighbor quantization of x w.r.t. , and x is a complex-valued number. Some basic properties of the two-dimensional MLO [39] are listed below.(1). The distributive law .
(2). If , , otherwise, a modulo-aliasing error occurred.
(3). Let the dither signal ν be uniformly distributed on Λ, then is uniformly distributed on Λ, where .
The classical SK scheme does not work in the noisy feedback case, and this is because in such a case, the transmitter cannot accurately obtain the estimation error of the receiver. We show that by applying the two-dimensional MLO to both the feedforward and feedback encoders, the adverse effects of feedback channel noise on the SK scheme’s performance can be mitigated, which allows the SK-type scheme to remain effective even in the presence of noisy feedback. The following Figure 5a,b illustrate the differences between the classical SK scheme and the modified SK-type scheme utilizing two-dimensional MLO.
3.1. An FBL Approach for the MIMO WHFL
3.1.1. Channel Decomposition by SVD
Based on the SVD technique, matrices and can be expressed as follows:
(30)
where and are unitary matrices. The diagonal matrices and have non-negative real number diagonal elements (,…,) and (,…,) [49], respectively, and(31)
According to (26) and (30), we have the following:
(32)
where and . It is noted that and , ensuring that the power constraint of is equal to that of , and the distributions of and remain the same. As is a diagonal matrix, (32) can be decomposed as follows:(33)
where , and denote the j-th components of , and , respectively.Similarly, from (27) and (30), (27) can be decomposed as follows:
(34)
where , and denote the j-th components of , and , respectively, and and . As shown in (32)–(34), applying the SVD technique, the feedforward and feedback MIMO channels can be effectively transformed into J parallel SISO sub-channels.Power allocating: The edge server assigns power to the J parallel sub-channels for the feedforward channel, where . Similarly, the cloud server distributes power across the J parallel sub-channels for the feedback channel, where .
3.1.2. Message Splitting
For given , , , D and , we define the following:
(35)
Next, the message is divided into J independent components , where is uniformly distributed over the set and . Then, we divide each sub-message into , where and are uniformly distributed over the sets and , respectively. The rate for each parallel sub-channel is defined as . Consequently, the total rate for all J parallel sub-channels during the t-th communication round is as follows:(36)
3.1.3. An FBL Scheme of Each Parallel Sub-Channel
By using the two-dimensional message mapping method introduced in the last subsection, the message is mapped to the center point of its corresponding sub-grid.
Initialization: At time instant 1, the edge server maps the messages to , and sends the following:
(37)
Then, the cloud server computes the first estimation of by the following:(38)
where is the estimation error of the cloud server at time instant 1. Define , and .Iteration: First, we introduce a shared dither random i.i.d. sequence , which is perfectly known by both the edge server and the cloud server, and it is uniformly distributed on ( is a complex plane with , ), and . Here is independent of all signals transmitted over channels. At time instant i (), using the two-dimensional MLO shown in Section 3, the cloud server sends the following:
(39)
where is a modulation coefficient. From Property (3) of Proposition 1, we have (the dither signals guarantee that the codeword transmitted by the cloud server meets the power constraint). Then the edge server computes a noisy version of estimation error by the following:(40)
where (a) is due to the modulo distributive law in property (1) of Proposition 1. The modulo-aliasing errors do not occur in the edge server, if . Hence, the edge server obtains . Then, the edge server sends the following:(41)
where is chosen to satisfy the transmitter’s power constraint . Then, the cloud server updates by computing the following:(42)
where , and the MMSE estimation coefficient is given by the following:(43)
which ensures that is correctly estimated from . Define , (42) yields the following:(44)
Further define , , . Since is a CSCG distribution estimation error, we conclude that .Decoding: At time instant , the final estimation obtained by the cloud server is , where . The cloud server successfully decodes the message if is closest to the message point , i.e., and .
The formal proof of Theorem 1 is provided in Appendix A.
4. An FBL Approach for the SIMO WHFL
For the SIMO WHFL, (9)–(11) can be re-written as follows:
(45)
(46)
(47)
where , , , , , , the elements of and are i.i.d. as and , respectively, and . Here note that the feedforward channel (45) is a SIMO channel, while the feedback channel (46) is a MISO channel. Unlike the SVD technique used for the MIMO WHFL that decomposes the MIMO channel into several parallel SISO channels, we use a beamforming strategy to transform the feedforward SIMO channel into the SISO channel, and a new pre-coding strategy to transform the feedback MISO channel into the SISO channel, see the following Figure 6. Further applying the approach for each SISO channel (see Section 3.1.3), the FBL approach for the SIMO WHFL is obtained, and the details are given below.Beamforming strategy: The signal received by the cloud server in (45) can proceed as follows:
(48)
where and . Applying (4), the feedforward SIMO channel is transformed into the SISO channel.A new pre-coding strategy: For the feedback channel (46), allowing the following:
(49)
where and , which indicates that the power constraint of is equal to that of . Hence, substituting (49) into (46), we have the following:(50)
which indicates that the feedback MISO channel is transformed into the SISO channel. Hence along the lines of the encoding-decoding procedure in Section 3.1.3, the FBL approach for the SIMO WHFL is obtained.Since the proof of Theorem 2 is included in the proof of Theorem 1, we omit the detailed proof here.
5. Simulation Results
5.1. Experimental Settings
The simulation results are derived by averaging 2000 independent channel realizations (i.e., Monte-Carlo simulations). We consider a WHFL system consisting of 10 users, an edge server, and a cloud server, with each user having the same amount of training data. We assume that the channel matrix elements follow an i.i.d. distribution as [5,6,17]. Following [47], the maximum normalized estimation errors of the eavesdropper’s channel are defined as and , where and are defined in (13). The edge server employs Lempel–Ziv–Welch (LZW) source coding [50] to compress the quantized gradients, and the total transmitted data are M bits. The transmission latency for the edge server to upload data is [5], where represents the edge server’s transmission rate.
To evaluate the effectiveness of the proposed FBL scheme under real-world conditions, we train a neural network using the MNIST dataset (
Benchmark (Perfect HFL): The perfectly aggregated HFL system can be achieved through error-free transmission, which serves as the benchmark accuracy in ideal settings.
Baseline 1 (Random binning coding scheme (RBCS)-based WHFL [26,28]): The gradient data from the edge servers is uploaded using the RBCS, which is based on traditional low-density parity-check (LDPC) codes with a target bit error rate of .
Baseline 2 (Frequency division multiple access (FDMA)-based WHFL with artificial noise (AN) [29]): In the FDMA-based WHFL system with AN, FDMA is employed to transmit gradient data from edge servers to the cloud server, targeting a bit error ratio of . Additionally, AN is added to the transmitted signals to prevent eavesdroppers from obtaining the true gradient data.
5.2. Experimental Results
We show the results of test accuracy and the cross entropy versus the communication round for SISO/SIMO/MISO/MIMO cases in Figure 7 and Figure 8, respectively. From Figure 7 and Figure 8, we see that if perfect CSI of the eavesdropper’s channel is obtained by legal parties, both our proposed FBL scheme, Baseline 1 scheme, and Baseline 2 scheme almost do not affect the learning performance of HFL. This is because Baseline 1, Baseline 2, and our proposed schemes are all capable of transmitting gradient data with a sufficiently low decoding error probability. On the other hand, in our proposed FBL schemes, if imperfect CSI of the eavesdropper’s channel is obtained by legal parties, the test accuracy of HFL decreases, and the training loss of HFL increases as the maximum normalized estimation error of the eavesdropper’s channel increases. However, note that in such an imperfect CSI case, our proposed FBL schemes still provide the same level of secrecy as that of the perfect CSI case, which shows the robustness of our schemes against imperfect CSI of the eavesdropper’s channel. Furthermore, Figure 7 and Figure 8 demonstrate that the eavesdropper cannot obtain the real gradient data when applying our FBL scheme, which indicates that our FBL schemes effectively ensure the PLS of the data.
As depicted in Figure 9, the transmission latency of our FBL scheme is approximately 2 to 5 times lower than that of Baseline 1 and Baseline 2, due to the gain from introducing feedback. Additionally, the transmission latency of our scheme decreases as the number of antennas increases. Furthermore, the transmission latency of Baseline 2 is lower than that of Baseline 1, owing to the gain from introducing AN to counter eavesdropping attacks in Baseline 2. Moreover, Figure 9 shows that the transmission latency of our FBL scheme increases as the maximum normalized estimation error of the eavesdropper’s channel increases, and this is because to support the same level of performance, the worse estimation of the CSI of the eavesdropper’s channel, the more bits need to be transmitted, which leads to an increase in transmission latency.
From Table 2, we show that the achievable secrecy transmission rates of our FBL schemes increase with the number of antennas, and the achievable secrecy transmission rates of our schemes are significantly higher than those of Baseline 1 and Baseline 2, due to the gain introduced by feedback in our scheme. Additionally, due to the gain from introducing AN in Baseline 2, its achievable secrecy transmission rate is higher than that of Baseline 1. Furthermore, Table 2 shows that the achievable secrecy transmission rates of our proposed FBL scheme decrease as the maximum normalized estimation errors of the eavesdropper’s channel increase, which can be viewed as the price for the worst estimation. From Table 3, we conclude that the achievable secrecy transmission rates of FBL schemes increase as the SNR of the feedback channel increases. Moreover, Figure 10 shows that the transmission latency of FBL schemes increases as the SNR of the feedback channel decreases. Therefore, in our schemes, poorer feedback channel conditions lead to lower achievable secrecy transmission rates and increased transmission latency. However, poorer feedback channel conditions do not directly affect learning performance, as it is primarily determined by the distortion D of lossy source coding, the average decoding error probability of channel coding, and the variance of noise introduced by LDP mechanisms.
Figure 11 shows the relationship between PLS (measured by the secrecy level), privacy, utility, and the LDP noise variance of proposed FBL schemes. From Figure 11, we conclude that the secrecy level increases as the LDP noise variance increases, and a higher secrecy level leads to a more stringent relationship between privacy and utility (with a smaller and a larger ). Apart from this, for a given secrecy level, increasing the maximum normalized estimation error in the eavesdropper’s channel results in an increase in the variance of LDP noise, which can be also viewed as the price for the worse estimation.
6. Conclusions and Future Work
In this paper, a practical FBL approach, which is an extension of the classical SK scheme, is proposed for the multi-antenna URLLC-WHFL systems in the presence of PLS. We characterize the relationship between PLS, privacy, and the utility of these WHFL systems, and derive achievable transmission rates of the proposed FBL approach. Simulation results demonstrate that when the edge server has perfect knowledge of the eavesdropper’s CSI, our proposed FBL approach not only almost achieves perfect secrecy but also does not affect learning performance. Additionally, simulation results demonstrate that the proposed schemes have robustness even when the edge server has an imperfect eavesdropper’s CSI. Apart from this, it has been demonstrated that the transmission latency of our proposed FBL approach is significantly lower compared to traditional RBCS.
Furthermore, this paper focuses on proposing and analyzing a theoretical scheme. The application of this approach in real-world systems still faces practical challenges, such as hardware constraints, power consumption, or synchronization issues. Future work should aim to optimize energy efficiency and address synchronization in more complex multi-antenna systems using the proposed FBL scheme. On the other hand, as the computational complexity of techniques like precoding, beamforming, and SVD increases with the number of devices and communication channels, particularly in multi-antenna systems, further research, and optimization are needed to extend our proposed approach to more complex and large-scale networks. For instance, distributed or hierarchical architectures can allocate the computational load across multiple servers or devices, reducing the burden on individual components. Additionally, low-complexity approximation methods for precoding and beamforming could help lower overall system complexity. Future work will extend our approach to more complex multi-edge scenarios, exploring the impact of interference among edge servers on the WHFL in the presence of PLS.
H.Z. did the theoretical work, performed the experiments, analyzed the data and drafted the work; B.D. designed the work, performed the theoretical work, interpreted the data for the work and revised the work; and P.X. interpreted the data for the work and revised the work. All authors have read and agreed to the published version of the manuscript.
Not applicable.
The raw data supporting the conclusions of this article will be made available by the authors on request.
The authors declare no conflicts of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 2. An information-theoretic model of the WHFL system, where the edge server, cloud server and eavesdroppers are equipped with A, B, and C antennas, respectively ([Forumla omitted. See PDF.]).
Figure 3. A schematic diagram of the FBL approach for the WHFL over the MIMO channel.
Figure 4. Comparison of the message mapping methods between the classical SK scheme and the scheme in this paper. (a) Message mapping of classical SK scheme. (b) Message mapping in this paper.
Figure 5. Comparing the mechanisms between the classical SK scheme and the two-dimensional MLO-based SK-type scheme, where [Forumla omitted. See PDF.] represents the estimation of the transmitted message [Forumla omitted. See PDF.] at time [Forumla omitted. See PDF.]. (a) The classical SK scheme in a certain round i. (b) The two-dimensional MLO-based SK-type scheme in a certain round i.
Figure 7. Performance comparison between the different schemes on the MNIST dataset ([Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.] dB, [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.]). (a) [Forumla omitted. See PDF.]. (b) [Forumla omitted. See PDF.]. (c) [Forumla omitted. See PDF.]. (d) [Forumla omitted. See PDF.].
Figure 8. Performance comparison between the different schemes on the MNIST dataset ([Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.] dB, [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.]). (a) [Forumla omitted. See PDF.]. (b) [Forumla omitted. See PDF.]. (c) [Forumla omitted. See PDF.]. (d) [Forumla omitted. See PDF.].
Figure 8. Performance comparison between the different schemes on the MNIST dataset ([Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.] dB, [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.]). (a) [Forumla omitted. See PDF.]. (b) [Forumla omitted. See PDF.]. (c) [Forumla omitted. See PDF.]. (d) [Forumla omitted. See PDF.].
Figure 9. Transmission latency (200 rounds) of the different schemes on the MNIST dataset ([Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.] dB, [Forumla omitted. See PDF.][Forumla omitted. See PDF.], [Forumla omitted. See PDF.]). (a) [Forumla omitted. See PDF.]. (b) [Forumla omitted. See PDF.]. (c) [Forumla omitted. See PDF.]. (d) [Forumla omitted. See PDF.].
Figure 10. Transmission latency (200 rounds) of our schemes under different feedback channel SNR and perfect CSI on the MNIST dataset ([Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.]).
Figure 11. The relationship between the PLS (secrecy level), the privacy-utility, and LDP noise variance of proposed FBL schemes on the MNIST dataset ([Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.] dB, [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.][Forumla omitted. See PDF.]). (a) [Forumla omitted. See PDF.]. (b) [Forumla omitted. See PDF.]. (c) [Forumla omitted. See PDF.]. (d) [Forumla omitted. See PDF.]. (e) [Forumla omitted. See PDF.]. (f) [Forumla omitted. See PDF.]. (g) [Forumla omitted. See PDF.]. (h) [Forumla omitted. See PDF.]. (i) [Forumla omitted. See PDF.]. (j) [Forumla omitted. See PDF.]. (k) [Forumla omitted. See PDF.]. (l) [Forumla omitted. See PDF.].
Figure 11. The relationship between the PLS (secrecy level), the privacy-utility, and LDP noise variance of proposed FBL schemes on the MNIST dataset ([Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.] dB, [Forumla omitted. See PDF.], [Forumla omitted. See PDF.], [Forumla omitted. See PDF.][Forumla omitted. See PDF.]). (a) [Forumla omitted. See PDF.]. (b) [Forumla omitted. See PDF.]. (c) [Forumla omitted. See PDF.]. (d) [Forumla omitted. See PDF.]. (e) [Forumla omitted. See PDF.]. (f) [Forumla omitted. See PDF.]. (g) [Forumla omitted. See PDF.]. (h) [Forumla omitted. See PDF.]. (i) [Forumla omitted. See PDF.]. (j) [Forumla omitted. See PDF.]. (k) [Forumla omitted. See PDF.]. (l) [Forumla omitted. See PDF.].
Summarizing all results in WFL in the presence of privacy, utility, PLS and URLLC.
Related Work | Privacy | Utility | PLS | Relationship between PLS, Privacy, and Utility | URLLC |
---|---|---|---|---|---|
[ | ✓ | − | − | − | − |
[ | ✓ | ✓ | − | Relationship between Privacy and Utility | − |
[ | − | − | ✓ | − | − |
[ | − | ✓ | ✓ | Relationship between PLS and Utility | − |
[ | ✓ | ✓ | ✓ | Relationship between PLS-Privacy-Utility | − |
[ | − | − | − | − | ✓ |
This Work | ✓ | ✓ | ✓ | Relationship between PLS-Privacy-Utility | ✓ |
Achievable secrecy rates of the different schemes on the MNIST dataset (
Number of Antennas | ||||
---|---|---|---|---|
Our scheme | 2.6718 (bits/symbol) | |||
Our scheme | 2.6708 (bits/symbol) | |||
Our scheme | 2.6689 (bits/symbol) | |||
Baseline 1 [ | ||||
Baseline 2 [ |
Achievable secrecy rates of our schemes under different feedback channel SNR on the MNIST dataset (
Number of Antennas | ||||
---|---|---|---|---|
| | | ||
| | | ||
| | |
Appendix A. The Formal Proof of Theorem 1
Appendix A.1. Utility and Privacy Analysis
First, note that since
Appendix A.2. Decoding Error Probability and Convergence Analysis
First, we bound the decoding error probability
A modulo-aliasing error occurs in the edge server at time instant
, and it is defined as follows: where and are the real and imaginary parts of , respectively, and are the real and imaginary parts of , respectively. A decoding error occurs in the cloud server at time instant
, and it is defined as follows: where and are the real and imaginary parts of , respectively.
Thus, the error probability
Convergence analysis: Following the convergence proof in [
Appendix A.3. Security Analysis
First, note that the eavesdropper’s equivocation rate,
(e) follows from the fact that conditioning reduces entropy, as shown in (28),
(f) follows from
(g) follows from the fact that
(h) is due to the fact that (
(i) follows from the following:
The proof of Theorem 1 is completed.
References
1. Zhu, G.; Liu, D.; Du, Y.; You, C.; Zhang, J.; Huang, K. Toward an Intelligent Edge: Wireless Communication Meets Machine Learning. IEEE Commun. Mag.; 2020; 58, pp. 19-25. [DOI: https://dx.doi.org/10.1109/MCOM.001.1900103]
2. Yang, Z.; Chen, M.; Saad, W.; Hong, C.S.; Shikh-Bahaei, M. Energy Efficient Federated Learning Over Wireless Communication Networks. IEEE Trans. Wireless Commun.; 2021; 20, pp. 1935-1949. [DOI: https://dx.doi.org/10.1109/TWC.2020.3037554]
3. Amiri, M.M.; Gündüz, D. Federated Learning Over Wireless Fading Channels. IEEE Trans. Wireless Commun.; 2020; 19, pp. 3546-3557. [DOI: https://dx.doi.org/10.1109/TWC.2020.2974748]
4. Jin, R.; He, X.; Dai, H. Communication Efficient Federated Learning with Energy Awareness Over Wireless Networks. IEEE Trans. Wireless Commun.; 2022; 21, pp. 5204-5219. [DOI: https://dx.doi.org/10.1109/TWC.2021.3138394]
5. Zhu, G.; Wang, Y.; Huang, K. Broadband Analog Aggregation for Low-Latency Federated Edge Learning. IEEE Trans. Wireless Commun.; 2020; 19, pp. 491-506. [DOI: https://dx.doi.org/10.1109/TWC.2019.2946245]
6. Zhu, G.; Du, Y.; Gündüz, D.; Huang, K. One-Bit Over-the-Air Aggregation for Communication-Efficient Federated Edge Learning: Design and Convergence Analysis. IEEE Trans. Wireless Commun.; 2021; 20, pp. 2120-2135. [DOI: https://dx.doi.org/10.1109/TWC.2020.3039309]
7. Elgabli, A.; Park, J.; Issaid, C.B.; Bennis, M. Harnessing Wireless Channels for Scalable and Privacy-Preserving Federated Learning. IEEE Trans. Commun.; 2021; 69, pp. 5194-5208. [DOI: https://dx.doi.org/10.1109/TCOMM.2021.3078783]
8. Wen, H.; Wu, Y.; Yang, C.; Duan, H.; Yu, S. A Unified Federated Learning Framework for Wireless Communications: Towards Privacy, Efficiency, and Security. Proceedings of the 2020 IEEE INFOCOM Computer Communications Workshops (INFOCOM WKSHPS); Toronto, ON, Canada, 6–9 July 2020; pp. 653-658.
9. Seif, M.; Tandon, R.; Li, M. Wireless Federated Learning with Local Differential Privacy. Proceedings of the 2020 IEEE International Symposium on Information Theory (ISIT); Los Angeles, CA, USA, 21–26 June 2020; pp. 2604-2609.
10. Yuan, X.; Ni, W.; Ding, M.; Wei, K.; Li, J.; Poor, H.V. Amplitude-Varying Perturbation for Balancing Privacy and Utility in Federated Learning. IEEE Trans. Inf. Forensics Secur.; 2023; 18, pp. 1884-1897. [DOI: https://dx.doi.org/10.1109/TIFS.2023.3258255]
11. Kim, M.; Günlü, O.; Schaefer, R.F. Federated Learning with Local Differential Privacy: Trade-Offs Between Privacy, Utility, and Communication. Proceedings of the 2021 IEEE International Conference on Acoustics, Speech and Signal Process (ICASSP); Toronto, ON, Canada, 6–11 June 2021; pp. 2650-2654.
12. Zhou, J.; Su, Z.; Ni, J.; Wang, Y.; Pan, Y.; Xing, R. Personalized Privacy-Preserving Federated Learning: Optimized Trade-off Between Utility and Privacy. Proceedings of the 2022 IEEE Global Communications Conference (GLOBECOM); Rio de Janeiro, Brazil, 4–8 December 2022; pp. 4872-4877.
13. Guo, S.; Su, Z.; Tian, Z.; Yu, S. Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck. Proceedings of the 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom); Wuhan, China, 9–11 December 2022; pp. 680-686.
14. Wang, B.; Chen, Y.; Jiang, H.; Zhao, Z. PPeFL: Privacy-Preserving Edge Federated Learning with Local Differential Privacy. IEEE Internet Things J.; 2023; 10, pp. 15488-15500. [DOI: https://dx.doi.org/10.1109/JIOT.2023.3264259]
15. Zhang, N.; Tao, M. Gradient Statistics Aware Power Control for Over-the-Air Federated Learning. IEEE Trans. Wireless Commun.; 2021; 20, pp. 5115-5128. [DOI: https://dx.doi.org/10.1109/TWC.2021.3065748]
16. Liu, D.; Simeone, O. Privacy for Free: Wireless Federated Learning via Uncoded Transmission with Adaptive Power Control. IEEE J. Sel. Areas Commun.; 2021; 39, pp. 170-185. [DOI: https://dx.doi.org/10.1109/JSAC.2020.3036948]
17. Yang, K.; Jiang, T.; Shi, Y.; Ding, Z. Federated Learning via Over-the-Air Computation. IEEE Trans. Wireless Commun.; 2020; 19, pp. 2022-2035. [DOI: https://dx.doi.org/10.1109/TWC.2019.2961673]
18. Liu, L.; Zhang, J.; Song, S.H.; Letaief, K.B. Client-Edge-Cloud Hierarchical Federated Learning. Proceedings of the 2020 IEEE International Conference on Communications (ICC); Dublin, Ireland, 7–11 June 2020; pp. 1-6.
19. Luo, S.; Chen, X.; Wu, Q.; Zhou, Z.; Yu, S. HFEL: Joint Edge Association and Resource Allocation for Cost-Efficient Hierarchical Federated Edge Learning. IEEE Trans. Wireless Commun.; 2020; 19, pp. 6535-6548. [DOI: https://dx.doi.org/10.1109/TWC.2020.3003744]
20. Liu, S.; Yu, G.; Chen, X.; Bennis, M. Joint User Association and Resource Allocation for Wireless Hierarchical Federated Learning with IID and Non-IID Data. IEEE Trans. Wireless Commun.; 2022; 21, pp. 7852-7866. [DOI: https://dx.doi.org/10.1109/TWC.2022.3162595]
21. Wen, W.; Chen, Z.; Yang, H.H.; Xia, W.; Quek, T.Q.S. Joint Scheduling and Resource Allocation for Hierarchical Federated Edge Learning. IEEE Trans. Wireless Commun.; 2022; 21, pp. 5857-5872. [DOI: https://dx.doi.org/10.1109/TWC.2022.3144140]
22. Shi, L.; Shu, J.; Zhang, W.; Liu, Y. HFL-DP: Hierarchical Federated Learning with Differential Privacy. Proceedings of the 2021 IEEE Global Communications Conference (GLOBECOM); Madrid, Spain, 7–11 December 2021; pp. 1-7.
23. Wainakh, A.; Guinea, A.S.; Grube, T.; Mühlhäuser, M. Enhancing Privacy via Hierarchical Federated Learning. Proceedings of the 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW); Genoa, Italy, 7–11 September 2020; pp. 344-347.
24. Feng, C.; Yang, H.H.; Hu, D.; Zhao, Z.; Quek, T.Q.S.; Min, G. Mobility-Aware Cluster Federated Learning in Hierarchical Wireless Networks. IEEE Trans. Wireless Commun.; 2022; 21, pp. 8441-8458. [DOI: https://dx.doi.org/10.1109/TWC.2022.3166386]
25. Wyner, A.D. The Wire-Tap Channel. Bell Syst. Tech. J.; 1975; 54, pp. 1355-1387. [DOI: https://dx.doi.org/10.1002/j.1538-7305.1975.tb02040.x]
26. Yao, J.; Ansari, N. Secure Federated Learning by Power Control for Internet of Drones. IEEE Trans. Cognitive Commun. Netw.; 2021; 7, pp. 1021-1031. [DOI: https://dx.doi.org/10.1109/TCCN.2021.3076167]
27. Wang, T.; Li, Y.; Wu, Y.; Quek, T.Q.S. Secrecy driven Federated Learning via Cooperative Jamming: An Approach of Latency Minimization. IEEE Trans. Emerg. Topics Comput.; 2021; 10, pp. 1687-1703. [DOI: https://dx.doi.org/10.1109/TETC.2022.3159282]
28. Qian, L.; Wu, W.; Lu, W.; Wu, Y.; Lin, B.; Quek, T.Q.S. Secrecy-Based Energy-Efficient Mobile Edge Computing via Cooperative Non-Orthogonal Multiple Access Transmission. IEEE Trans. Commun.; 2021; 69, pp. 4659-4677. [DOI: https://dx.doi.org/10.1109/TCOMM.2021.3070620]
29. Yan, Z.; Li, D.; Zhang, Z.; He, J. Accuracy-Security Tradeoff with Balanced Aggregation and Artificial Noise for Wireless Federated Learning. IEEE Internet Things J.; 2023; 10, pp. 18154-18167. [DOI: https://dx.doi.org/10.1109/JIOT.2023.3277632]
30. Zhang, H.; Yang, C.; Dai, B. When Wireless Federated Learning Meets Physical Layer Security: The Fundamental Limits. Proceedings of the IEEE INFOCOM Computer Communications Workshops (INFOCOM WKSHPS); New York, NY, USA, 2–5 May 2022; pp. 1-6.
31. Durisi, G.; Koch, T.; Popovski, P. Toward Massive, Ultrareliable, and Low-Latency Wireless Communication with Short Packets. Proc. IEEE; 2016; 104, pp. 1711-1726. [DOI: https://dx.doi.org/10.1109/JPROC.2016.2537298]
32. Polyanskiy, Y.; Poor, H.V.; Verdu, S. Channel Coding Rate in the Finite Blocklength Regime. IEEE Trans. Inf. Theory; 2010; 56, pp. 2307-2359. [DOI: https://dx.doi.org/10.1109/TIT.2010.2043769]
33. She, C.; Dong, R.; Gu, Z.; Hou, Z.; Li, Y.; Hardjawana, W.; Vucetic, B.; Song, L.; Yang, C. Deep Learning for Ultra-Reliable and Low-Latency Communications in 6G Networks. IEEE Netw.; 2020; 34, pp. 219-225. [DOI: https://dx.doi.org/10.1109/MNET.011.1900630]
34. Samarakoon, S.; Bennis, M.; Saad, W.; Debbah, M. Distributed Federated Learning for Ultra-Reliable Low-Latency Vehicular Communications. IEEE Trans. Commun.; 2020; 68, pp. 1146-1159. [DOI: https://dx.doi.org/10.1109/TCOMM.2019.2956472]
35. Schalkwijk, J.; Kailath, T. A coding scheme for additive noise channels with feedback–I: No bandwidth constraint. IEEE Trans. Inf. Theory; 1966; 12, pp. 172-182. [DOI: https://dx.doi.org/10.1109/TIT.1966.1053879]
36. Gunduz, D.; Brown, D.R.; Poor, H.V. Secret communication with feedback. Proceedings of the 2008 International Symposium on Information Theory and Its Applications (ISITA); Auckland, New Zealand, 7–10 December 2008; pp. 1-6.
37. Truong, L.V.; Fong, S.L.; Tan, V.Y.F. On Gaussian Channels with Feedback Under Expected Power Constraints and with Non-Vanishing Error Probabilities. IEEE Trans. Inf. Theory; 2017; 63, pp. 1746-1765. [DOI: https://dx.doi.org/10.1109/TIT.2017.2648822]
38. Abadi, M.; Chu, A.; Goodfellow, I.; McMahan, H.B.; Mironov, I.; Talwar, K.; Zhang, L. Deep Learning with Differential Privacy. Proceedings of the ACM SIGSAC Conference on Computer and Communications Security; Vienna, Austria, 24–28 October 2016; pp. 303-318.
39. Zamir, R. Lattice Coding for Signals and Network; Cambridge University Press: Cambridge, UK, 2014.
40. Zhi, K.; Pan, C.; Ren, H.; Wang, K.; Elkashlan, M.; Di Renzo, M.; Hanzo, L.; Schober, R.; Wang, J. Two-Timescale Design for Reconfigurable Intelligent Surface-Aided Massive MIMO Systems with Imperfect CSI. IEEE Trans. Inf. Theory; 2022; 69, pp. 3001-3033. [DOI: https://dx.doi.org/10.1109/TIT.2022.3227538]
41. Schiessl, S.; Al-Zubaidy, H.; Skoglund, M.; Gross, J. Delay Performance of Wireless Communications with Imperfect CSI and Finite-Length Coding. IEEE Trans. Commun.; 2018; 66, pp. 6527-6541. [DOI: https://dx.doi.org/10.1109/TCOMM.2018.2860000]
42. Chen, Z.J.; Hernandez, E.E.; Huang, Y.C.; Rini, S. DNN gradient lossless compression: Can GenNorm be the answer?. Proceedings of the 2022 IEEE International Conference on Communications (ICC); Seoul, Republic of Korea, 16–20 May 2022; pp. 407-412.
43. Wang, W.; Ying, L.; Zhang, J. On the Relation Between Identifiability, Differential Privacy, and Mutual-Information Privacy. IEEE Trans. Inf. Theory; 2016; 62, pp. 5018-5029. [DOI: https://dx.doi.org/10.1109/TIT.2016.2584610]
44. Sankar, L.; Rajagopalan, S.R.; Poor, H.V. Utility-Privacy Tradeoffs in Databases: An Information-Theoretic Approach. IEEE Trans. Inf. Forensics Secur.; 2013; 8, pp. 838-852. [DOI: https://dx.doi.org/10.1109/TIFS.2013.2253320]
45. Gamal, A.A.E.; Kim, Y.-H. Network Information Theory; Cambridge University Press: Cambridge, UK, 2011.
46. Han, S.; Xu, X.; Fang, S.; Sun, Y.; Cao, Y.; Tao, X.; Zhang, P. Energy Efficient Secure Computation Offloading in NOMA-Based mMTC Networks for IoT. IEEE Internet Things J.; 2019; 6, pp. 5674-5690. [DOI: https://dx.doi.org/10.1109/JIOT.2019.2904741]
47. Ng, D.W.K.; Lo, E.S.; Schober, R. Robust Beamforming for Secure Communication in Systems with Wireless Information and Power Transfer. IEEE Trans. Wireless Commun.; 2014; 13, pp. 4599-4615. [DOI: https://dx.doi.org/10.1109/TWC.2014.2314654]
48. Tekin, E.; Yener, A. The Gaussian Multiple Access Wire-Tap Channel. IEEE Trans. Inf. Theory; 2008; 54, pp. 5747-5755. [DOI: https://dx.doi.org/10.1109/TIT.2008.2006422]
49. Tse, D.; Viswanath, P. Fundamentals of Wireless Communication; Cambridge University Press: Cambridge, UK, 2005.
50. Welch, T.A. A technique of high-performance data compression. IEEE Comput.; 1984; 17, pp. 8-19. [DOI: https://dx.doi.org/10.1109/MC.1984.1659158]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
Wireless hierarchical federated learning (WHFL) is an implementation of wireless federated Learning (WFL) on a cloud–edge–client hierarchical architecture that accelerates model training and achieves more favorable trade-offs between communication and computation. However, due to the broadcast nature of wireless communication, the WHFL is susceptible to eavesdropping during the training process. Apart from this, recently ultra-reliable and low-latency communication (URLLC) has received much attention since it serves as a critical communication service in current 5G and upcoming 6G, and this motivates us to study the URLLC-WHFL in the presence of physical layer security (PLS) issue. In this paper, we propose a secure finite block-length (FBL) approach for the multi-antenna URLLC-WHFL, and characterize the relationship between privacy, utility, and PLS of the proposed scheme. Simulation results show that when the eavesdropper’s CSI is perfectly known by the edge server, our proposed FBL approach not only almost achieves perfect secrecy but also does not affect learning performance, and further shows the robustness of our schemes against imperfect CSI of the eavesdropper’s channel. This paper provides a new method for the URLLC-WHFL in the presence of PLS.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details


1 School of Information Science and Technology, Southwest JiaoTong University, Chengdu 611756, China;
2 Chongqing Key Laboratory of Mobile Communications Technology, Chongqing 400065, China;