GAN-Based Privacy Abuse Attack on Federated Learning in IoT Networks

Runzhe Hao, Rasheed Hussain, Juan Marcelo Parra-Ullauri, Xenofon Vasilakos, Reza Nejabati, Dimitra Simeonidou

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Abstract

Federated Learning (FL) is vulnerable to various attacks including poisoning and inference. However, the existing offensive security evaluation of FL assumes that the attackers know data distribution. In this paper, we present a novel attack where FL participants carry out inference and privacy abuse attacks against the FL by leveraging Generating Adversarial Networks (GANs). The attacker (impersonating a benign participant) uses GAN to generate a similar dataset to other participants, and then covertly poisons the data. We demonstrated the attack successfully and tested it on two datasets, the IoT network traffic dataset and MNIST. The results reveal that for FL to be successfully used in IoT applications, protection against such attacks is critically essential.
Original languageEnglish
Title of host publicationIEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
ISBN (Electronic)9798350384475
ISBN (Print)9798350384482
DOIs
Publication statusPublished - 13 Aug 2024
Event2024 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024 - Vancouver, Canada
Duration: 20 May 202420 May 2024

Publication series

NameIEEE Conference on Computer Communications Workshops
PublisherIEEE
ISSN (Print)2159-4228
ISSN (Electronic)2833-0587

Conference

Conference2024 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024
Country/TerritoryCanada
CityVancouver
Period20/05/2420/05/24

Bibliographical note

Publisher Copyright:
© 2024 IEEE.

Keywords

  • Federated Learning
  • GAN
  • IoT Security

Fingerprint

Dive into the research topics of 'GAN-Based Privacy Abuse Attack on Federated Learning in IoT Networks'. Together they form a unique fingerprint.

Cite this