{"title":"Crisis analysis on blockchain-based decentralized learning in wireless networks","authors":"J. Lee, Gyungmin Kim, Yonggang Kim","doi":"10.1109/ICTC55196.2022.9952554","DOIUrl":null,"url":null,"abstract":"The nodes may perform data training and make decisions according to the learning results for better performance in wireless networks. However, to guarantee privacy-preserving service, learning model parameters are exchanged among the nodes instead of exchanging the original raw data obtained at each node. Although the information exchange could be performed in a distributed manner by exploiting blockchain for verification, there still exist problems of jamming attacks in wireless channels. The jammers may interrupt transactions requests toward the normal nodes works as miners or try to corrupt the information. In this paper, we provide analysis results that blocks originated from attackers with jamming capabilities becomes main stream. Through numerical results, we show that attacks to normal miners are highly likely to be succeed by the attackers with jamming abilities even though the computing power sum of attackers is less than 51% in wireless networks.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTC55196.2022.9952554","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The nodes may perform data training and make decisions according to the learning results for better performance in wireless networks. However, to guarantee privacy-preserving service, learning model parameters are exchanged among the nodes instead of exchanging the original raw data obtained at each node. Although the information exchange could be performed in a distributed manner by exploiting blockchain for verification, there still exist problems of jamming attacks in wireless channels. The jammers may interrupt transactions requests toward the normal nodes works as miners or try to corrupt the information. In this paper, we provide analysis results that blocks originated from attackers with jamming capabilities becomes main stream. Through numerical results, we show that attacks to normal miners are highly likely to be succeed by the attackers with jamming abilities even though the computing power sum of attackers is less than 51% in wireless networks.