Dr Shahid Latif Shahid.Latif@uwe.ac.uk
Research Fellow Reminder Project
Dr Shahid Latif Shahid.Latif@uwe.ac.uk
Research Fellow Reminder Project
Dr Djamel Djenouri Djamel.Djenouri@uwe.ac.uk
Associate Professor in Computer Science
Andrew Adamatzky Andrew.Adamatzky@uwe.ac.uk
Professor
While Federated learning (FL) is considered privacy-preserving by nature, it remains vulnerable to many attacks, such as data and model poisoning, that compromise data integrity and model accuracy. Conventional privacy-preserving federated learning (PPFL) mechanisms, including homomorphic encryption (HE), secure aggregation, and secure multiparty computation (SMPC) demonstrate several limitations , such as high computational complexity, significant communication overhead, and scalability challenges. To overcome the aforementioned issues, we propose an end-to-end secure FL architecture that integrates differential privacy (DP), zero-knowledge proof (ZKP), and median aggregation. DP prevents data leakage during model updates by introducing Laplacian noise for privacy preservation. ZKP is implemented through Schnorr's protocol, which enables lightweight and efficient client authentication without revealing sensitive information. Finally, median aggregation is incorporated to mitigate the impact of outliers and adversarial updates, ensuring robust prediction aggregation. The experimental results indicate that the proposed approach outperforms other well-known PPFL methods including partially homomorphic encryption (PHE), fully homomorphic encryption (FHE) and SMPC. It delivers substantial improvements in global accuracy, especially for larger client counts, with gains of 10%-30% over the other methods. The client training time is significantly reduced by 70%-90%, ensuring faster processing. The approach also excels at reducing average round latency by 80%-95%, enhancing the overall efficiency of the system. Communication overhead is significantly reduced by 65%-85%, lowering data transfer costs per round. Furthermore, the size of the model is minimized by 60%-85%, making it more resource efficient and scalable for larger deployments.
Presentation Conference Type | Conference Paper (unpublished) |
---|---|
Conference Name | International Joint Conference on Neural Networks |
Start Date | Jun 30, 2025 |
End Date | Jul 5, 2025 |
Acceptance Date | Apr 1, 2025 |
Deposit Date | Apr 25, 2025 |
Peer Reviewed | Peer Reviewed |
Keywords | Index Terms-Cybersecurity; Differential Privacy; Federated Learning; Poisoning Attacks; Zero-knowledge Proof |
Public URL | https://uwe-repository.worktribe.com/output/14326974 |
This file is under embargo due to copyright reasons.
Contact Shahid.Latif@uwe.ac.uk to request a copy for personal use.
A gradual solution to detect selfish nodes in mobile ad hoc networks
(2010)
Journal Article
Towards immunizing MANET's source routing protocols against packet droppers
(2009)
Journal Article
On eliminating packet droppers in MANET: A modular solution
(2008)
Journal Article
Struggling against selfishness and black hole attacks in MANETs
(2007)
Journal Article
Distributed low-latency data aggregation scheduling in wireless sensor networks
(2015)
Journal Article
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
Apache License Version 2.0 (http://www.apache.org/licenses/)
Apache License Version 2.0 (http://www.apache.org/licenses/)
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search