Federated learning for 6G-enabled secure communication systems: a comprehensive survey.

Deepika Sirohi, Neeraj Kumar, Prashant Singh Rana, Sudeep Tanwar, Rahat Iqbal, Mohammad Hijjii
Author Information
  1. Deepika Sirohi: Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab India.
  2. Neeraj Kumar: Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab India. ORCID
  3. Prashant Singh Rana: Department of Computer Science and Engineering, Thapar Institute of Engineering and Technology, Patiala, Punjab India.
  4. Sudeep Tanwar: Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, Gujarat India.
  5. Rahat Iqbal: University of Dubai, Dubai, UAE.
  6. Mohammad Hijjii: Computer Science Department, Faculty of Computers & Information Technology, University of Tabuk, Tabuk, Saudi Arabia.

Abstract

Machine learning (ML) and Deep learning (DL) models are popular in many areas, from business, medicine, industries, healthcare, transportation, smart cities, and many more. However, the conventional centralized training techniques may not apply to upcoming distributed applications, which require high accuracy and quick response time. It is mainly due to limited storage and performance bottleneck problems on the centralized servers during the execution of various ML and DL-based models. However, federated learning (FL) is a developing approach to training ML models in a collaborative and distributed manner. It allows the full potential exploitation of these models with unlimited data and distributed computing power. In FL, edge computing devices collaborate to train a global model on their private data and computational power without sharing their private data on the network, thereby offering privacy preservation by default. But the distributed nature of FL faces various challenges related to data heterogeneity, client mobility, scalability, and seamless data aggregation. Moreover, the communication channels, clients, and central servers are also vulnerable to attacks which may give various security threats. Thus, a structured vulnerability and risk assessment are needed to deploy FL successfully in real-life scenarios. Furthermore, the scope of FL is expanding in terms of its application areas, with each area facing different threats. In this paper, we analyze various vulnerabilities present in the FL environment and design a literature survey of possible threats from the perspective of different application areas. Also, we review the most recent defensive algorithms and strategies used to guard against security and privacy threats in those areas. For a systematic coverage of the topic, we considered various applications under four main categories: space, air, ground, and underwater communications. We also compared the proposed methodologies regarding the underlying approach, base model, datasets, evaluation matrices, and achievements. Lastly, various approaches' future directions and existing drawbacks are discussed in detail.

Keywords

References

  1. Sensors (Basel). 2021 Feb 20;21(4): [PMID: 33672454]
  2. IEEE Trans Neural Netw Learn Syst. 2023 Dec;34(12):9587-9603 [PMID: 35344498]
  3. IEEE Trans Neural Netw Learn Syst. 2023 Dec;34(12):10374-10386 [PMID: 35468066]
  4. IEEE Trans Neural Netw Learn Syst. 2022 Nov;33(11):6103-6115 [PMID: 34161243]
  5. IEEE Trans Neural Netw Learn Syst. 2024 Jul;35(7):8726-8746 [PMID: 36355741]
  6. NPJ Digit Med. 2020 Sep 14;3:119 [PMID: 33015372]
  7. Sensors (Basel). 2024 Jan 18;24(2): [PMID: 38257712]
  8. IEEE Trans Neural Netw Learn Syst. 2021 Aug;32(8):3710-3722 [PMID: 32833654]
  9. IEEE Trans Med Imaging. 2023 Jul;42(7):2057-2067 [PMID: 36215346]
  10. Annu Int Conf IEEE Eng Med Biol Soc. 2020 Jul;2020:3040-3045 [PMID: 33018646]
  11. Front Pharmacol. 2019 Nov 05;10:1303 [PMID: 31749705]
  12. IEEE Access. 2020 Nov 11;8:205071-205087 [PMID: 34192116]
  13. Sensors (Basel). 2020 Oct 31;20(21): [PMID: 33142863]

Word Cloud

Created with Highcharts 10.0.0learningvariousFLdatamodelsareasdistributedthreatsMLcomputingMachinemanyHowevercentralizedtrainingmayapplicationsserversapproachpowermodelprivateprivacycommunicationalsosecurityapplicationdifferentsurveyFederatedDeepDLpopularbusinessmedicineindustrieshealthcaretransportationsmartcitiesconventionaltechniquesapplyupcomingrequirehighaccuracyquickresponsetimemainlyduelimitedstorageperformancebottleneckproblemsexecutionDL-basedfederateddevelopingcollaborativemannerallowsfullpotentialexploitationunlimitededgedevicescollaboratetrainglobalcomputationalwithoutsharingnetworktherebyofferingpreservationdefaultnaturefaceschallengesrelatedheterogeneityclientmobilityscalabilityseamlessaggregationMoreoverchannelsclientscentralvulnerableattacksgiveThusstructuredvulnerabilityriskassessmentneededdeploysuccessfullyreal-lifescenariosFurthermorescopeexpandingtermsareafacingpaperanalyzevulnerabilitiespresentenvironmentdesignliteraturepossibleperspectiveAlsoreviewrecentdefensivealgorithmsstrategiesusedguardsystematiccoveragetopicconsideredfourmaincategories:spaceairgroundunderwatercommunicationscomparedproposedmethodologiesregardingunderlyingbasedatasetsevaluationmatricesachievementsLastlyapproaches'futuredirectionsexistingdrawbacksdiscusseddetail6G-enabledsecuresystems:comprehensiveBlockchainsDistributedEncryptionPrivacySecurity

Similar Articles

Cited By