基于区块链的无线网络去中心化学习的危机分析

J. Lee, Gyungmin Kim, Yonggang Kim
{"title":"基于区块链的无线网络去中心化学习的危机分析","authors":"J. Lee, Gyungmin Kim, Yonggang Kim","doi":"10.1109/ICTC55196.2022.9952554","DOIUrl":null,"url":null,"abstract":"The nodes may perform data training and make decisions according to the learning results for better performance in wireless networks. However, to guarantee privacy-preserving service, learning model parameters are exchanged among the nodes instead of exchanging the original raw data obtained at each node. Although the information exchange could be performed in a distributed manner by exploiting blockchain for verification, there still exist problems of jamming attacks in wireless channels. The jammers may interrupt transactions requests toward the normal nodes works as miners or try to corrupt the information. In this paper, we provide analysis results that blocks originated from attackers with jamming capabilities becomes main stream. Through numerical results, we show that attacks to normal miners are highly likely to be succeed by the attackers with jamming abilities even though the computing power sum of attackers is less than 51% in wireless networks.","PeriodicalId":441404,"journal":{"name":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Crisis analysis on blockchain-based decentralized learning in wireless networks\",\"authors\":\"J. Lee, Gyungmin Kim, Yonggang Kim\",\"doi\":\"10.1109/ICTC55196.2022.9952554\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The nodes may perform data training and make decisions according to the learning results for better performance in wireless networks. However, to guarantee privacy-preserving service, learning model parameters are exchanged among the nodes instead of exchanging the original raw data obtained at each node. Although the information exchange could be performed in a distributed manner by exploiting blockchain for verification, there still exist problems of jamming attacks in wireless channels. The jammers may interrupt transactions requests toward the normal nodes works as miners or try to corrupt the information. In this paper, we provide analysis results that blocks originated from attackers with jamming capabilities becomes main stream. Through numerical results, we show that attacks to normal miners are highly likely to be succeed by the attackers with jamming abilities even though the computing power sum of attackers is less than 51% in wireless networks.\",\"PeriodicalId\":441404,\"journal\":{\"name\":\"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-10-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTC55196.2022.9952554\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 13th International Conference on Information and Communication Technology Convergence (ICTC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTC55196.2022.9952554","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

为了在无线网络中获得更好的性能,节点可以根据学习结果进行数据训练并做出决策。但是,为了保证隐私保护服务,学习模型参数在节点之间交换,而不是在每个节点上交换原始的原始数据。虽然利用区块链进行验证可以实现分布式的信息交换,但是在无线信道中仍然存在干扰攻击的问题。干扰者可能会中断作为矿工的正常节点的交易请求或试图破坏信息。本文的分析结果表明,由具有干扰能力的攻击者发起的阻塞将成为主流。通过数值结果表明,在无线网络中,即使攻击者的算力总和小于51%,具有干扰能力的攻击者对正常矿工的攻击也极有可能成功。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Crisis analysis on blockchain-based decentralized learning in wireless networks
The nodes may perform data training and make decisions according to the learning results for better performance in wireless networks. However, to guarantee privacy-preserving service, learning model parameters are exchanged among the nodes instead of exchanging the original raw data obtained at each node. Although the information exchange could be performed in a distributed manner by exploiting blockchain for verification, there still exist problems of jamming attacks in wireless channels. The jammers may interrupt transactions requests toward the normal nodes works as miners or try to corrupt the information. In this paper, we provide analysis results that blocks originated from attackers with jamming capabilities becomes main stream. Through numerical results, we show that attacks to normal miners are highly likely to be succeed by the attackers with jamming abilities even though the computing power sum of attackers is less than 51% in wireless networks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
6G Integrated Sensing and Communication: Recent Results and Future Directions Analysis of Use Cases Enabling AI/ML to IOT Service Platforms A Study on ECG Monitoring Embedded Systems Development of Touch Interface Using LIDAR for Multi-user Interactions in Projection-based VR Self-Conditional Crowd Activity Detection Network with Multi-label Classification Head
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1