Privacy-preserving blockchain-based federated learning for traffic flow prediction

Abstract As accurate and timely traffic flow information is extremely important for traffic management, traffic flow prediction has become a vital component of intelligent transportation systems. However, existing traffic flow prediction methods based on centralized machine learning need to gather raw data for model training, which involves serious privacy exposure risks. To address these problems, federated learning has recently been introduced as an efficient solution for achieving privacy protection without the need to upload raw data from vehicles during model training. However, the existing federated learning frameworks are based on a centralized model coordinator that still suffers from severe security challenges, such as a single point of failure. Thereby, a consortium blockchain-based federated learning framework is proposed to enable decentralized, reliable, and secure federated learning without a centralized model coordinator. The model updates from distributed vehicles are verified by miners to prevent unreliable model updates and are then stored on the blockchain. In addition, to further protect model privacy on the blockchain, a differential privacy method with a noise-adding mechanism is applied for the blockchain-based federated learning framework. Numerical results illustrate that the proposed schemes can effectively prevent data poisoning attacks and improve the privacy protection of model updates for secure and privacy-preserving traffic flow prediction.

[1]  M. Shamim Hossain,et al.  Deep Federated Q-Learning-Based Network Slicing for Industrial IoT , 2021, IEEE Transactions on Industrial Informatics.

[2]  Shengli Xie,et al.  Incentive Mechanism for Reliable Federated Learning: A Joint Optimization Approach to Combining Reputation and Contract Theory , 2019, IEEE Internet of Things Journal.

[3]  M. Shamim Hossain,et al.  Towards context-sensitive collaborative media recommender system , 2014, Multimedia Tools and Applications.

[4]  Daniel Rueckert,et al.  A generic framework for privacy preserving deep learning , 2018, ArXiv.

[5]  Zhu Han,et al.  Byzantine Attack and Defense in Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[6]  Yang Hu,et al.  GACNet: A Generative Adversarial Capsule Network for Regional Epitaxial Traffic Flow Prediction , 2020, Computers Materials & Continua.

[7]  Jianhua Guo,et al.  Adaptive Kalman filter approach for stochastic short-term traffic flow rate prediction and uncertainty quantification , 2014 .

[8]  Huadong Ma,et al.  An AutoEncoder and LSTM-Based Traffic Flow Prediction Method , 2019, Sensors.

[9]  M. Shamim Hossain,et al.  Blockchain-Based Privacy-Aware Content Caching in Cognitive Internet of Vehicles , 2020, IEEE Network.

[10]  M. Shamim Hossain,et al.  Secure Enforcement in Cognitive Internet of Vehicles , 2018, IEEE Internet of Things Journal.

[11]  Percy Liang,et al.  Certified Defenses for Data Poisoning Attacks , 2017, NIPS.

[12]  Yunpeng Wang,et al.  Long short-term memory neural network for traffic speed prediction using remote microwave sensor data , 2015 .

[13]  Yong Xiang,et al.  Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing , 2020, IEEE Internet of Things Journal.

[14]  Lihui Zhang,et al.  Hybrid Methods for Short-Term Traffic Flow Prediction Based on ARIMA-GARCH Model and Wavelet Neural Network , 2020 .

[15]  Ahmed Ghoneim,et al.  Secure Quantum Steganography Protocol for Fog Cloud Internet of Things , 2018, IEEE Access.

[16]  M. Shamim Hossain,et al.  Deep Relative Attributes , 2016, IEEE Transactions on Multimedia.

[17]  Ivan Beschastnikh,et al.  Mitigating Sybils in Federated Learning Poisoning , 2018, ArXiv.

[18]  Nadjib Badache,et al.  Fast authentication in wireless sensor networks , 2016, Future Gener. Comput. Syst..

[19]  Mahdi Aiash,et al.  Machine Learning Based Botnet Identification Traffic , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[20]  Aaron Roth,et al.  The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..

[21]  Mohamed Mohandes,et al.  Support vector machines for wind speed prediction , 2004 .

[22]  M. Shamim Hossain,et al.  A Deep-Tree-Model-Based Radio Resource Distribution for 5G Networks , 2020, IEEE Wireless Communications.

[23]  Dongxi Liu,et al.  A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems , 2020, IEEE Transactions on Industrial Informatics.

[24]  Ankang Ju,et al.  Highly efficient federated learning with strong privacy preservation in cloud computing , 2020, Comput. Secur..

[25]  Pravin Varaiya,et al.  Freeway performance measurement system (pems) , 2002 .

[26]  Lei Shu,et al.  Securing parked vehicle assisted fog computing with blockchain and optimal smart contract design , 2020, IEEE/CAA Journal of Automatica Sinica.

[27]  Feixiang Zhao,et al.  EnLSTM-WPEO: Short-Term Traffic Flow Prediction by Ensemble LSTM, NNCT Weight Integration, and Population Extremal Optimization , 2020, IEEE Transactions on Vehicular Technology.

[28]  Shuanfeng Zhao,et al.  A Traffic Flow Prediction Method Based on Road Crossing Vector Coding and a Bidirectional Recursive Neural Network , 2019, Electronics.

[29]  Li Chen,et al.  Accelerating Federated Learning via Momentum Gradient Descent , 2019, IEEE Transactions on Parallel and Distributed Systems.

[30]  Peter Richtárik,et al.  Federated Learning: Strategies for Improving Communication Efficiency , 2016, ArXiv.

[31]  Jiawen Kang,et al.  Privacy-Preserving Traffic Flow Prediction: A Federated Learning Approach , 2020, IEEE Internet of Things Journal.

[32]  Jiyue Huang,et al.  Groupchain: Towards a Scalable Public Blockchain in Fog Computing of IoT Services Computing , 2020, IEEE Transactions on Services Computing.

[33]  Liang Liang,et al.  Self-Balancing Federated Learning With Global Imbalanced Data in Mobile Systems , 2021, IEEE Transactions on Parallel and Distributed Systems.

[34]  Yoshua Bengio,et al.  Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.

[35]  Haomiao Yang,et al.  Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence , 2020, IEEE Transactions on Industrial Informatics.

[36]  Dusit Niyato,et al.  A Secure Federated Learning Framework for 5G Networks , 2020, IEEE Wireless Communications.

[37]  Chunxiao Jiang,et al.  Scalable and Communication-efficient Decentralized Federated Edge Learning with Multi-blockchain Framework , 2020, BlockSys.

[38]  M. Shamim Hossain,et al.  Deep Anomaly Detection for Time-Series Data in Industrial IoT: A Communication-Efficient On-Device Federated Learning Approach , 2020, IEEE Internet of Things Journal.

[39]  Jiong Jin,et al.  Towards Fair and Privacy-Preserving Federated Deep Models , 2019, IEEE Transactions on Parallel and Distributed Systems.

[40]  Fei-Yue Wang,et al.  Traffic Flow Prediction With Big Data: A Deep Learning Approach , 2015, IEEE Transactions on Intelligent Transportation Systems.

[41]  Sitalakshmi Venkatraman,et al.  Detecting malicious behaviour using supervised learning algorithms of the function calls , 2013, Int. J. Electron. Secur. Digit. Forensics.

[42]  M. Shamim Hossain,et al.  Green Video Transmission in the Mobile Cloud Networks , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[43]  M. Shamim Hossain,et al.  Edge Intelligence in the Cognitive Internet of Things: Improving Sensitivity and Interactivity , 2019, IEEE Network.

[44]  Liu Jian,et al.  CrowdSFL: A Secure Crowd Computing Framework Based on Blockchain and Federated Learning , 2020, Electronics.

[45]  Mamoun Alazab,et al.  A Visualized Botnet Detection System Based Deep Learning for the Internet of Things Networks of Smart Cities , 2020, IEEE Transactions on Industry Applications.

[46]  Ghulam Muhammad,et al.  Automatic Fruit Classification Using Deep Learning for Industrial Applications , 2019, IEEE Transactions on Industrial Informatics.

[47]  Mamoun Alazab,et al.  Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies , 2019, IEEE Transactions on Big Data.

[48]  M. Shamim Hossain,et al.  Cloud-assisted secure video transmission and sharing framework for smart cities , 2017, Future Gener. Comput. Syst..

[49]  Yi Liu,et al.  PPGAN: Privacy-Preserving Generative Adversarial Network , 2019, 2019 IEEE 25th International Conference on Parallel and Distributed Systems (ICPADS).

[50]  Hongliang Guo,et al.  A Unified Framework for Vehicle Rerouting and Traffic Light Control to Reduce Traffic Congestion , 2017, IEEE Transactions on Intelligent Transportation Systems.

[51]  Jie Zhang,et al.  Finding the Shortest Path in Stochastic Vehicle Routing: A Cardinality Minimization Approach , 2016, IEEE Transactions on Intelligent Transportation Systems.