Academia.eduAcademia.edu

Outline

CoLearn

2020, Proceedings of the Third ACM International Workshop on Edge Systems, Analytics and Networking

https://doi.org/10.1145/3378679.3394528

Abstract

Edge computing and Federated Learning (FL) can work in tandem to address issues related to privacy and collaborative distributed learning in untrusted IoT environments. However, deployment of FL in resource-constrained IoT devices faces challenges including asynchronous participation of such devices in training, and the need to prevent malicious devices from participating. To address these challenges we present CoLearn, which build on the open-source Manufacturer Usage Description (MUD) implementation osMUD and the FL framework PySyft. We deploy CoLearn on resourceconstrained devices in a lab environment to demonstrate (i) an asynchronous participation mechanism for IoT devices in machine learning model training using a publish/subscribe architecture, (ii) a mechanism for reducing the attack surface in FL architecture by allowing only IoT MUD-compliant devices to participate in the training phases, and (iii) a trade-off between communication bandwidth usage, training time and device temperature (thermal fatigue). CCS CONCEPTS • Networks → Network algorithms; Network experimentation; Network privacy and anonymity; • Computer systems organization → Embedded and cyber-physical systems; • Computing methodologies → Neural networks; Machine learning.

References (28)

  1. Yehuda Afek, Anat Bremler-Barr, David Hay, Ran Goldschmidt, Lior Shafir, Gafnit Abraham, and Avraham Shalev. 2019. NFV-based IoT Security for Home Networks using MUD. (2019). arXiv:1911.00253
  2. Vafa Andalibi, DongInn Kim, and L. Jean Camp. 2019. Throwing MUD into the FOG: Defending IoT and Fog by expanding MUD to Fog network. In 2nd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 19). USENIX Association, Ren- ton, WA. https://www.usenix.org/conference/hotedge19/presentation/andalibi
  3. Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, and Vitaly Shmatikov. 2018. How to backdoor federated learning. arXiv:1807.00459 (2018).
  4. Colby R. Banbury, Vijay Janapa Reddi, Max Lam, William Fu, Amin Fazel, Jeremy Holleman, Xinyuan Huang, Robert Hurtado, David Kanter, Anton Lokhmotov, David Patterson, Danilo Pau, Jae sun Seo, Jeff Sieracki, Urmish Thakker, Marian Verhelst, and Poonam Yadav. 2020. Benchmarking TinyML Systems: Challenges and Direction. In Proceedings of the 3rd MLSys Conference (Austin, TX, USA) (MLSys'20). arXiv:2003.04821
  5. Keith Bonawitz, Hubert Eichner, Wolfgang Grieskamp, Dzmitry Huba, Alex Ingerman, Vladimir Ivanov, Chloe Kiddon, Jakub Konecny, Stefano Mazzocchi, H Brendan McMahan, et al. 2019. Towards federated learning at scale: System design. (2019). arXiv:1902.01046
  6. A consortium of network security companies. 2018. Open Source Manufacture Usage Specification. https://osmud.org.
  7. Ivan Damgård, Valerio Pastro, Nigel Smart, and Sarah Zakarias. 2012. Multiparty computation from somewhat homomorphic encryption. In Annual Cryptology Conference. Springer, 643-662.
  8. Community driven project. 2016. PyTorch. https://pytorch.org.
  9. Angelo Feraudo et al. 2020. CoLearn: Source code. https://github.com/aferaudo/ CoLearn_Federated_Learning.
  10. Angelo Feraudo, Poonam Yadav, Richard Mortier, Paolo Bellavista, and Jon Crowcroft. 2020. SoK: Beyond IoT MUD Deployments -Challenges and Fu- ture Directions. (2020). arXiv:2004.08003
  11. Ayyoob Hamza, Hassan Habibi Gharakheili, Theophilus A. Benson, and Vijay Sivaraman. 2019. Detecting Volumetric Attacks on loT Devices via SDN-Based Monitoring of MUD Activity. In Proceedings of the 2019 ACM Symposium on SDN Research (San Jose, CA, USA) (SOSR'19). ACM, New York, NY, USA, 36-48.
  12. Jakub Konečnỳ, H Brendan McMahan, Felix X Yu, Peter Richtárik, Ananda Theertha Suresh, and Dave Bacon. 2016. Federated learning: Strategies for improving communication efficiency. (2016). arXiv:1610.05492
  13. Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, and Benjamin Turnbull. 2019. Towards the development of realistic botnet dataset in the internet of things for network forensic analytics: Bot-iot dataset. Future Generation Computer Systems 100 (2019), 779-796.
  14. E. Lear, R. Droms, and D. Romascanu. 2019. Manufacturer Usage Description Specification. RFC 8520. https://rfc-editor.org/rfc/rfc8520.txt
  15. L. Lhotka, Ralph Droms, and Dan Romascanu. 2016. JSON Encoding of Data Modeled with YANG. RFC 7951. https://doi.org/10.17487/RFC7951
  16. Tian Li, Anit Kumar Sahu, Ameet Talwalkar, and Virginia Smith. 2019. Federated Learning: Challenges, Methods, and Future Directions. (2019). arXiv:1908.07873
  17. Xiang Li, Kai xuan Huang, Wenhao Yang, Shusen Wang, and Zhihua Zhang. 2019. On the Convergence of FedAvg on Non-IID Data. (2019). arXiv:1907.02189
  18. Xiang Li, Wenhao Yang, Shusen Wang, and Zhihua Zhang. 2019. Communication- Efficient Local Decentralized SGD Methods. arXiv:1910.09126
  19. Sara N. Matheu, Alberto Robles Enciso, Alejandro Molina Zarca, Dan Garcia- Carrillo, Jose Luis Hernandez-Ramos, Jorge Bernal Bernabe, and Antonio F. Skarmeta. 2020. Security Architecture for Defining and Enforcing Security Profiles in DLT/SDN-Based IoT Systems. Sensors 20, 7 (March 2020).
  20. H. Brendan McMahan, Eider Moore, Daniel Ramage, and Blaise Agüera y Arcas. 2016. Federated Learning of Deep Networks using Model Averaging. (2016). arXiv:1602.05629
  21. MQTT. 1999. Message Queue Telemetry Transport. http://mqtt.org.
  22. Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Hossein Fereidooni, N Asokan, and Ahmad-Reza Sadeghi. 2019. DÏoT: A federated self-learning anomaly detection system for IoT. In 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). IEEE, 756-767.
  23. Amirhossein Reisizadeh, Aryan Mokhtari, Hamed Hassani, Ali Jadbabaie, and Ramtin Pedarsani. 2019. FedPAQ: A Communication-Efficient Federated Learning Method with Periodic Averaging and Quantization. (2019). arXiv:1909.13014
  24. Theo Ryffel, Andrew Trask, Morten Dahl, Bobby Wagner, Jason Mancuso, Daniel Rueckert, and Jonathan Passerat-Palmbach. 2018. A generic framework for privacy preserving deep learning. (2018). arXiv:1811.04017
  25. Sameer Wagh, Divya Gupta, and Nishanth Chandran. 2019. Securenn: 3-party secure computation for neural network training. Proceedings on Privacy Enhancing Technologies 2019, 3 (2019), 26-49.
  26. Shiqiang Wang, Tiffany Tuor, Theodoros Salonidis, Kin K Leung, Christian Makaya, Ting He, and Kevin Chan. 2019. Adaptive federated learning in re- source constrained edge computing systems. IEEE Journal on Selected Areas in Communications 37, 6 (2019), 1205-1221.
  27. Poonam Yadav, Qi Li, Richard Mortier, and Anthony Brown. 2019. Network Service Dependencies in Commodity Internet-of-things Devices. In Proceedings of the International Conference on Internet of Things Design and Implementation (Montreal, Quebec, Canada) (IoTDI '19). ACM, New York, NY, USA, 202-212.
  28. Poonam Yadav, Vadim Safronov, and Richard Mortier. 2019. Poster Abstract: Enforcing accountability in Smart built-in IoT environment using MUD. In The 6th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation (BuildSys 2019). ACM, New York.