Wireless Communications and Mobile Computing

Federated Learning for Internet of Things and Big Data


Publishing date
01 Dec 2021
Status
Closed
Submission deadline
06 Aug 2021

Lead Editor

1Fujian Normal University, Fuzhou, China

2Georgia Southern University, Statesboro, USA

3Sam Houston State University, Houston, USA

4Nanyang Technological University, Singapore

This issue is now closed for submissions.

Federated Learning for Internet of Things and Big Data

This issue is now closed for submissions.

Description

Federated learning (FL) is a feasible solution to solve the problems of data islands, break data barriers, and protect data security and privacy, especially in the context of the Internet of Things (IoT), and big data. Distributed IoT and big data users need to collaboratively train a classification or regression model to implement perfect data prediction results without compromising privacy. Unlike privacy-preserving outsourced training, rather than submitting data to the centralized cloud server, users train data locally in FL. The federated center is only responsible for aggregating the gradient information (or model parameters) uploaded by users and distributing the global training model.

Although FL can create collaborative training over heterogeneous sourced data, there are still many technical problems and privacy challenges, such as communication efficiency, system heterogeneity, data heterogeneity, computational efficiency and accuracy, data privacy, and malicious attacks. Malicious adversaries in the FL scenario of IoT and big data, or an untrusted federated center, can reversely deduce the original data and tags based on gradient information. Therefore, before data uploading, the gradient needs to be encrypted or disinfected. Moreover, communication efficiency is the information bottleneck of federated learning in IoT and big data. To alleviate the communication quality problem in IoT and big data, reducing the number of communication rounds or the message size of each round will be considered. Additionally, system heterogeneity and statistical heterogeneity are also important aspects. The development of FL should enhance the robustness against unreliable and dropout users and develop feasible strategies such as heterogeneous data alignment and fusion based on meta-learning. Attack methods in machine learning are also applicable to FL; how to detect and avoid model updating attacks. Moreover, data poison attack is also an important research area.

The aim of this Special Issue is to solicit original research articles, highlighting the developments, and security challenges for federated learning in IoT, and big data. Review articles discussing the state of the art are also welcome.

Potential topics include but are not limited to the following:

  • FL training framework in IoT, big data, and multimedia communications
  • High effectiveness and efficiency FL framework in IoT, and big data
  • Asynchronous and heterogenetic FL training models in IoT, and big data
  • Privacy-preserving FL training framework in IoT, and big data
  • Meta-learning method for FL framework in IoT, and big data
  • Homomorphic encryption for FL training in IoT, and big data
  • Secure multiparty computing for FL training in IoT, and big data
  • Differential privacy for FL training in IoT, and big data
  • Lightweight, secure and producible FL framework in IoT, and big data
  • Applicable conditions for privacy-preserving federated transfer learning
  • FL encryption, alignment, and fusion of heterogeneous big data
  • Termination conditions for FL training over heterogeneous data, and big data
  • Attacks and defenses for FL framework in IoT, and big data
  • Actual federated composite application framework in IoT, and big data
  • Incentive mechanism design, comprehensive evaluation service system, and blockchain for FL framework in IoT, and big data

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 9690657
  • - Research Article

Federated Learning Incentive Mechanism Design via Enhanced Shapley Value Method

Xun Yang | Weijie Tan | ... | Kun Niu
  • Special Issue
  • - Volume 2022
  • - Article ID 6887040
  • - Research Article

Local Epochs Inefficiency Caused by Device Heterogeneity in Federated Learning

Yan Zeng | Xin Wang | ... | Jian Wan
  • Special Issue
  • - Volume 2021
  • - Article ID 8005769
  • - Research Article

An IoT Crossdomain Access Decision-Making Method Based on Federated Learning

Chao Li | Fan Li | ... | Chonghua Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 8492223
  • - Research Article

Multidomain Fusion Data Privacy Security Framework

Jing Yang | Lianwei Qu | Yong Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 1974822
  • - Research Article

VarDefense: Variance-Based Defense against Poison Attack

Mingyuan Fan | Xue Du | ... | Wenzhong Guo
  • Special Issue
  • - Volume 2021
  • - Article ID 2993019
  • - Research Article

Enhancing Packet-Level Wi-Fi Device Authentication Protocol Leveraging Channel State Information

Yubo Song | Bing Chen | ... | Junbo Wang
  • Special Issue
  • - Volume 2021
  • - Article ID 2537546
  • - Research Article

Signal Modulation Recognition Method Based on Differential Privacy Federated Learning

Jibo Shi | Lin Qi | ... | Yun Lin
  • Special Issue
  • - Volume 2021
  • - Article ID 2668761
  • - Research Article

LstFcFedLear: A LSTM-FC with Vertical Federated Learning Network for Fault Prediction

Xiangquan Zhang | Zhili Ma | ... | Junjun Hang
  • Special Issue
  • - Volume 2021
  • - Article ID 7367107
  • - Research Article

A Novel Way to Generate Adversarial Network Traffic Samples against Network Traffic Classification

Yongjin Hu | Jin Tian | Jun Ma
  • Special Issue
  • - Volume 2021
  • - Article ID 8785413
  • - Research Article

Sentiment Classification Algorithm Based on the Cascade of BERT Model and Adaptive Sentiment Dictionary

Ruixue Duan | Zhuofan Huang | ... | Yue Dang
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.