Wireless Communications and Mobile Computing

Federated Learning Techniques for the Industrial Internet of Things


Publishing date
01 Dec 2021
Status
Closed
Submission deadline
13 Aug 2021

Lead Editor

1Fuzhou University, Singapore

2Xidian University, Xi'an, China

3Georgia Southern University, Statesboro, USA

4Lulea University of Technology, Lulea, Sweden

This issue is now closed for submissions.

Federated Learning Techniques for the Industrial Internet of Things

This issue is now closed for submissions.

Description

The Industrial Internet of Things (IIoT) refers to the billions of physical devices (such as interconnected sensors, instruments, and other devices) around the world that are now connected to the internet without requiring human-to-human or human-to-computer interaction. It is advantageous in low deployment cost and extensive geographic coverage and has found numerous applications in diverse domains, including transportation, environment monitoring, smart city, pervasive healthcare, etc. Through low-cost computing, cloud, big data, analytics, and mobile technologies, IIoT devices can share and collect data with minimal human intervention. The data collected by IIoT devices can be transmitted to the central cloud server for storage. The security and privacy issues can be easily solved by data encryption; however, IIoT-based systems often face security and privacy issues, especially during data processing and analytic. Federated learning (FL) is considered a new computing paradigm that aims to train a machine learning algorithm on multiple local datasets in local mobile nodes without explicitly exchanging data samples. The general principle consists of training local models on local data samples and exchanging parameters (e.g., the weights and biases of a deep neural network) between these local nodes at some frequency to generate a global model shared by all mobile nodes.

However, federated learning solutions still face many new security and privacy challenges when it needs to meet the mobile IIoT paradigm. In the traditional FL model, the centric server aggregate submodel is locally trained by the distributed mobile node. The centric trained FL model will distribute to all mobile nodes in the system for usage. Moreover, the FL framework participators can start a membership inference attack to judge whether some specific participator is involved in the system for model training. In addition, the participator can launch an attack to exact the other participator's historical training data from the centric model. Furthermore, some malicious participators can upload a fake sub-model to damage the centric model, making the FL model fail.

The aim of this Special Issue is to solicit original research articles and review articles highlighting recent advanced security and privacy techniques relevant to the convergence of federated learning in IIoT-based systems. We hope that this Special Issue also gathers submissions discussing arising new challenges and opportunities from traditional federated learning architectures.

Potential topics include but are not limited to the following:

  • Formal security model design in IIoT of data collection
  • Lightweight secure data processing scheme for smart federated learning
  • Software/hardware security for mobile IIoT devices
  • Secure data validation techniques for distributing federated learning
  • Trust IIoT device issues for federated learning
  • Secure communication for IIoT-based federated learning
  • Future and smart FL-based vulnerability assessment interfaces
  • Secure programming and toolkits for federated learning
  • Virtualisation and management for IIoT-based federated learning
  • New secure computation framework for federated learning
  • Secure distributed data storage for IIoT-based system
  • Blockchain and smart contracts for IIoT-based federated learning
  • New privacy challenges in IIoT-based federated learning

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 3447827
  • - Research Article

A Structure-Aware Adversarial Framework with the Keypoint Biorientation Field for Multiperson Pose Estimation

Xianjia Meng | Yong Yang | ... | Zuobin Ying
  • Special Issue
  • - Volume 2021
  • - Article ID 3381998
  • - Research Article

WCL: Client Selection in Federated Learning with a Combination of Model Weight Divergence and Client Training Loss for Internet Traffic Classification

Yingya Guo | Kai Huang | Jianshan Chen
  • Special Issue
  • - Volume 2021
  • - Article ID 2979214
  • - Research Article

An Intestinal Centerline Extraction Algorithm Based on Federated Framework

Xiaodong Wang | Zhen’an He | ... | Cheng Zhang
  • Special Issue
  • - Volume 2021
  • - Article ID 8241773
  • - Research Article

Accessorial Locating for Internet of Vehicles Based on DOA Estimation in Industrial Transportation

Yingnan Lv | Jiaqi Zhen | Baoyu Guo
  • Special Issue
  • - Volume 2021
  • - Article ID 9322368
  • - Research Article

An Improved -Means Clustering Intrusion Detection Algorithm for Wireless Networks Based on Federated Learning

Bin Xie | Xinyu Dong | Changguang Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 3758782
  • - Research Article

PrivCrowd: A Secure Blockchain-Based Crowdsourcing Framework with Fine-Grained Worker Selection

Qiliang Yang | Tao Wang | ... | Zirui Qiao
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.