4.7 Article

BDFL: A Byzantine-Fault-Tolerance Decentralized Federated Learning Method for Autonomous Vehicle

Journal

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Volume 70, Issue 9, Pages 8639-8652

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2021.3102121

Keywords

Peer-to-peer computing; Fault tolerant systems; Peer-to-Peer Federated Learning; decentralization; privacy-preservation; Byzantine-Fault-Tolerance

Funding

  1. Guangzhou Key Laboratory of Data Security and Privacy Preserving
  2. Guangdong Key Laboratoryof Data Security and Privacy Preserving
  3. National Joint Engineering Research Center of Network Security Detection, and Protection Technology
  4. National Natural Science Foundation of China [61872153, 61972288]
  5. Science and Technology Program of Guangzhou, China [202007040004]
  6. Key Area Research and Development Program of Guangdong Province [2020B0101090004]

Ask authors/readers for more resources

The study introduces a novel Byzantine-Fault-Tolerant decentralized FL method called BDFL for privacy-preservartion in Autonomous Vehicles (AVs). The feasibility of introducing decentralized FL into AV areas is demonstrated through experiments on the MNIST dataset, where BDFL outperforms other FL methods. Additionally, practicality of BDFL in improving multi-object recognition in AV areas is shown through experiments on the KITTI dataset.
Autonomous Vehicles (AV s) take advantage of Machine Learning (ML) for yielding improved experiences of selfdriving. However, large-scale collection of AV s' data for training will inevitably result in a privacy leakage problem. Federated Learning (FL) is proposed to solve privacy leakage problems, but it is exposed to security threats such as model inversion, membership inference. Therefore, the vulnerability of the FL should be brought to the forefront when applying to AV s. We propose a novel Byzantine-Fault-Tolerant (BFT) decentralized FL method with privacy-preservation for AV s called BDFL. In this paper, a Peer-to-Peer (P2P) FL with BFT is built by extending the HydRand protocol. In order to protect theirmodel, eachAV uses the Publicly Verifiable Secret Sharing(PVSS) scheme, which allows anyone to verify the correctness of encrypted shares. The evaluation results on the MNIST dataset have shown that introducing decentralized FL into AV area is feasible, and the proposed BDFL is superior to other BFT-based FL method. Furthermore, the experimental results on KITTI dataset indicate the practicality of BDFL on improving performances of multi-object recognition in AV areas. Finally, the proposed PVSS-based data privacy preservation scheme is also justified its characteristic of no side-effect on models' parameters by the experiments on the MNIST and KITTI datasets.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available