Skip to main content
Log in

Federated learning incentivize with privacy-preserving for IoT in edge computing in the context of B5G

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Federated learning and edge computing have resulted in the broad adoption of internet of Things (IoT) due to their fast reaction times and low connection costs. In general, edge computing requires users to send raw data to a central server for further processing. However, this data frequently contains sensitive information that individuals may not want to disclose. As a result, transferring user data with sensitive information increases the risk of data leakage when various unauthorized devices access it. Integrating federated learning with edge computing improves privacy by creating a consistent deep learning model across devices, eliminating the need for real data transferring but the complexity and heterogeneity of computational resources in the IoT environment present challenges like privacy, low communication, incentives, and seamless data aggregation. In this work, we concentrate on improving privacy with communication stability and designing incentive mechanisms to motivate more clients to participate in the model training process to enhance the performance and accuracy of data aggregation in a highly trusted environment. As a result, the novelty point is the development of a framework that combined a blockchain with federated edge computing in the context of beyond 5G to address the aforementioned challenges and provide excellent communicative and trusted environment. The study's rigorous evaluation showed that the integration of blockchain and B5G technology significantly improved the overall process of federated edge computing including increased accuracy, prevented loss, and motivated more clients to participate in the training process.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from €37.37 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price includes VAT (Netherlands)

Instant access to the full article PDF.

Fig. 1
The alternative text for this image may have been generated using AI.
Fig. 2
The alternative text for this image may have been generated using AI.
Fig. 3
The alternative text for this image may have been generated using AI.
Fig. 4
The alternative text for this image may have been generated using AI.
Fig. 5
The alternative text for this image may have been generated using AI.
Algorithm 1
The alternative text for this image may have been generated using AI.
Fig. 6
The alternative text for this image may have been generated using AI.
Algorithm 2
The alternative text for this image may have been generated using AI.
Algorithm 3
The alternative text for this image may have been generated using AI.
Algorithm 4
The alternative text for this image may have been generated using AI.
Fig. 7
The alternative text for this image may have been generated using AI.
Fig. 8
The alternative text for this image may have been generated using AI.
Fig. 9
The alternative text for this image may have been generated using AI.
Fig. 10
The alternative text for this image may have been generated using AI.
Fig. 11
The alternative text for this image may have been generated using AI.
Fig. 12
The alternative text for this image may have been generated using AI.
Fig. 13
The alternative text for this image may have been generated using AI.
Fig. 14
The alternative text for this image may have been generated using AI.
Fig. 15
The alternative text for this image may have been generated using AI.
Fig. 16
The alternative text for this image may have been generated using AI.

Similar content being viewed by others

Data availability

No datasets were generated or analysed during the current study.

References

  1. Lakshmanna, K., Kaluri, R., Gundluru, N., et al.: A review on deep learning technologies for IoT data. Electronics 11, 1604 (2022)

    MATH  Google Scholar 

  2. Zahra, S.R., Chishti, M.A.: Assessing the services, security threats, challenges and solutions in the internet of things. Scalable Comput. 20(3), 457–484 (2019)

    MATH  Google Scholar 

  3. Wu, Q., He, K., Chen, X.: Personalized federated learning for intelligent IoT applications: a cloud-edge based framework. IEEE Open J. Comput. Soc. 1:35–45 (2020)

  4. Xia, Q., Tao, Z., Li, Q.: Privacy issues in edge computing. Fog/Edge Comput. Secur. Privacy Appl. 83, 147–169 (2021)

    MATH  Google Scholar 

  5. Brecko, A., Kajati, E., Koziorek, J., Zolotova, I.: Federated learning for edge computing: a survey. Appl. Sci. 12, 9124 (2022)

    MATH  Google Scholar 

  6. Li, Q., Wen, Z., Wu, Z., et al.: A survey on federated learning systme: vision, hype and reality for data privacy and protection. IEEE Trans. Knowl. Data Eng. 35(4), 3347–3367 (2023)

    MATH  Google Scholar 

  7. Yang, X., Tan, W., Peng, C., Xiang, S., Niu, K.: Federated learning incentive mechanism design via enhanced Shaply value method. Wirel. Commun. Mob. Comput. (2022). https://doi.org/10.1155/2022/9690657

  8. Singh, P., Kaur, A., Aujla, G.S., et al.: DaaS: dew computing as a services for intelligent intrusion detection in edge-of-things ecosystem. IEEE Internet Things J. 8(16), 12569–12577 (2021)

    MATH  Google Scholar 

  9. Kaur, G., Batth, R.S.: Edge comptuing: classification, application and challenges. In: 2nd International Conference on Intelligent Engineering and Management (ICIEM) (2021)

  10. Zhang, Z.Z., Wu, L., He, D., et al.: Communication-efficient and byzantine-robust federated learning for mobile edge comptuing. IEEE Netw. 37(4), 112–119 (2023)

    MATH  Google Scholar 

  11. Wen, J., Lan, Y., et al.: A survey on federated learning: challenges and applications. Int. J. Mach. Learn. Cybern. 14:513–535 (2022)

  12. Asad, M., Shaukat, S., Hu, D., et al.: Limitations and future aspects of communication costs in federated learning: a survey. Sensors 23(7358), 1–31 (2023)

    MATH  Google Scholar 

  13. Zhou, H., Yang, G., Dai, H., Liu, G.: PFLF: privacy-preserving federated learning framework for edge computing. IEEE Trans. Inf. Forensics Secur. 17, 1905–1918 (2022)

    MATH  Google Scholar 

  14. Qu, G., Wu, H., Cui, N.: Joint blockchain and federated learning-based offloading in harsh edge computing environemnts. In: Big Data in Emergent Distributed Environments (BiDEDE'21), New York (2021)

  15. Wu, H., Sun, Y., Wolter, K.: Energy-efficient decision making for mobile cloud offloading. IEEE Trans. Cloud Comput. 8(2), 570–584 (2019)

    MATH  Google Scholar 

  16. Shi, Y., Zhang, Y., Xiao, Y., Niu, L.: Optimization strategies for client drift in federated learning: a review. In: 6th International Conference on Information Technology and Quantitative Management (2022)

  17. Mo, F., Haddadi, H., Katevas, K., et al.: PPFL: privacy-preserving federated learning with trusted execution environments. In: The 19th Annual International Conference on Mobile System, Applications, and Services (MobiSys '21), New York, USA (2021)

  18. Gong, X., Sharma, A., Karanam, S., et al.: Ensemble attention distillation for privacy-preserving federated learning. In: 2021 IEEE/CVF International Conference on Computer Vision (ICCV), Montreal, QC, Canada (2022)

  19. Song, T., Tong, Y., Wei, S.: Profit allocation for federated learning. In: 2019 IEEE International Conference on Big Data (Big Data). IEEE (2019)

  20. Jiao, Y., Wang, P., Niyato, D., Lin, B., Kim, D.I.: Toward an automated auction framework for wireless federated learning services market. IEEE Trans. Mob. Comput. 20(10), 3034–3048 (2021)

    Google Scholar 

  21. Sun, P., Che, H., Wang, Z., et al.: Pain-FL: personalized privacy-preserving incentive for federated learning. IEEE J. Sel. Areas Commun. 39(12), 3805–3820 (2021)

    MATH  Google Scholar 

  22. Maray, M., Shuja, J.: Computation offloading in mobile cloud computing and mobile edge computing: survey, texonomy, and open issues. Hindawi Mob. Inf. Syst. (2022). https://doi.org/10.1155/2022/1121822

  23. Mogilevskaia, I.: Security and Privacy Challenges in Edge Computing. University of South-Eastern Norway, Notodden (2022)

    Google Scholar 

  24. Wang, T., Liu, Y., Zheng, X., et al.: Edge-based communication optimization for distributed federated learning. IEEE Trans. Netw. Sci. Eng. 9(4), 2015–2024 (2021)

    MATH  Google Scholar 

  25. Rehman, M.H., Salah, K., Damiani, E., Svetinovic, D.: Towards blockchain-based reputation-aware federated learning. In: Conjuction with IEEE Infocom, EdgeBlock 2020: International Symposium on Edge Computing Security and Blcokchain (2020)

  26. Song, T., Yongxin, S.W.: Profit allocation for federated learning. In: 2019 IEEE International Conference on Big Data, Los Angeles, USA (2019)

  27. Zhang, J., Liu, Y., Wu, D., et al.: VPFL: a verifiable privacy-preserving federated learning scheme for edge computing system. Digit. Commun. Netw. 9, 981–989 (2023)

    MATH  Google Scholar 

  28. Yo, A., Li, G., Li, X., et al.: Differential privacy in edge computing-based smart city application: security issues, solutions and future direction. Array 19, 100293 (2023)

    MATH  Google Scholar 

  29. Mishra, K.N., Bhattacharjee, V., Saket, S., Mishra, S.P.: Security provisions in smart edge computing device using blockchain and machine learning algorithms: a novel approach. Clust. Comput. 27, 27–55 (2022)

    MATH  Google Scholar 

  30. Sun, Y., Li, B., Yang, K., Bi, X., Zhao, X.: TiFLCS-MARP: client selection and model pricing for federated learning in data markets. Expert Syst. Appl. 245, 123071 (2024)

    Google Scholar 

  31. Jalali, N.A., Chen, H.: Security issues and solutions in federate learning under IoT critical Infrastructure. Wirel. Personal Commun. 129, 475–500 (2022)

    MATH  Google Scholar 

  32. Li, D., Luo, Z., Cao, B.: Blockchain-based federated learning methodologies in smart evnironments. Clust. Comput. 25, 2585–2599 (2022)

    MATH  Google Scholar 

  33. Omoniwa, B., Hussian, R., Javed, M.A., Bouk, S.H.: Fog/edge comptuing-based IoT (FECIoT): architecture, applications, and research issues. IEEE Internet Things 6(3), 4118 (2019)

  34. Li, B., Fei, Z., Zhang, Y.: UAV communications for 6G and beyond: recent advances and future trends. IEEE Internet Things 6(2), 2241–2263 (2019)

    MATH  Google Scholar 

  35. Navarro-Ortiz, J., Romero-Diaz, P., Sendra, S., et al.: A survey on 5G usage scenarios and traffic models. IEEE Commun. Surv. Tutor. 22(2), 905–929 (2020)

    MATH  Google Scholar 

  36. Siddiqi, M.A., Yu, H., Joung, J.: 5G ultra-reliable low-latency communication implementation challenges and operational issues with IoT devices. MDPI (Electronics) 8, 981 (2019)

  37. Majid, A.: Challengs facing the implementation of 5G. J. Ambient. Intell. Humaniz. Comput. 14(5), 6213–6226 (2021)

    MATH  Google Scholar 

  38. Niknam, S., Dhillon, H.S., Reed, J.H.: Federated learning for wireless communications: motivation, opportunities, and challenges. IEEE Commun. Mag. 58(6), 46–51 (2020)

    MATH  Google Scholar 

  39. Ma, C., Li, J., Ding, M., et al.: On safeguarding privacy and security in the framework of federated learning. IEEE Netw. 34(4), 242–248 (2020)

    MATH  Google Scholar 

  40. Lu, Y., Xu, L.D.: Internet of things (IoT) cybersecurity research: a review of current research topics. IEEE Internet Things J. 6(2), 2103–2115 (2019)

    MATH  Google Scholar 

  41. Fazeldehkordi, E., Grønli, T.M.: A survey of security architectures for edge computing-based IoT. Internet Things (IoT) 3, 332–365 (2022)

    MATH  Google Scholar 

  42. Xia, Q., Tao, Z., Hao, Z., Li, Q.: FABA: an algorithms for fast aggregation against byzantine attacks in distributed neural network. In: Proceedings of the Twenty-Eighth International Joint Conference on Artificail Intelligence (IJCAI-19) (2019)

  43. Xiao, Y., Jia, Y., Liu, C., et al.: Edge computing security: state-of-the-art and challenges. In: Proccedings of the IEEE (2019)

  44. Khan, S., Gomes, J., Jr., Rehman, M.H., Svetinovic, D.: Dynamic behavior assessment protocol for secure decentralized federated learning. Internet Thing 24, 100956 (2023)

    Google Scholar 

  45. Putra, M.A.P., Putri, A.R., Zainudin, A., Kim, D.-S., Lee, J.-M.: ACS: accuracy-based client selection mechanism for federated industrial IoT. Internet Things 21, 100657 (2023)

    Google Scholar 

  46. Gao, L., Li, L., Chen, Y., et al.: FIFL: a fair incentive mechanism for federated learning. In: 50th International Conference on Parallel Processing (ICPP '21), New York, USA (2021)

  47. Yu, H., Liu, Z., Liu, Y., et al.: A fairness-aware incentive scheme for federated learning. In: Proceedings of the 2020 AAAI/ACM Conference on AI, Ethics, and Society (AIES'20), New York, USA (2020)

  48. Zhan, Y., Zhang, J., Hong, Z., et al.: A survey of incentive mechanism design for federated learning. IEEE Trans. Emerg. Top. Comput. 10, 1035–1044 (2022)

    MATH  Google Scholar 

  49. Abreha, H.G., Hayajneh, M., Serhani, M.A.: Federated learning in edge computing: a systematic survey. Sensors 22(450), 1–45 (2022)

    MATH  Google Scholar 

  50. Poposka, M., Pejoski, S., Rakovic, V., et al.: Delay minimization of federated learning over wireless powered communication networks. IEEE Commun. Lett. 28(1), 108–112 (2024)

    Google Scholar 

  51. Bao, G., Guo, P.: Federated learning in cloud-edge collaborative architecture: key techologies, applications and challenges. J. Cloud Comput. 11, 94 (2022)

    MATH  Google Scholar 

  52. Li, Z., Ohtsuki, T., Gui, G.: Communication efficient heterogeneous federated learning based on model similarity. In: 2023 IEEE Wireless Communications and Networking Conference (WCNC), Glasgow, United Kindom (2023)

  53. Liu, Y., Peng, J., Kang, J., Lliyasu, A.M., et al.: A secure federated learning framework for 5G network. IEEE Wirel. Commun. 27(4), 24–31 (2020)

    Google Scholar 

  54. Ye, Y., Li, S., Liu, F., et al.: EdgeFed: optimized federated learning based on edge computing. IEEE Access 8, 209191–209198 (2020)

    Google Scholar 

  55. Gottipati, A., Stewart, A., Song, J., Chen, Q.: FedRAN: federated mobile edge computing with differential privacy. In: Workshop on Flexible Networks Artificial Intelligence Supported Netwrok Flexibility and Agility (SIGCOMM '21), New York, USA (2021)

  56. Du, H., Chen, Y., Feng, X., et al.: An efficient federated learning framework for multi-channeled mobile edge network with layered gradient compression. Int. J. Comput. Telecommun. Netw. 221, 109517 (2023)

    Google Scholar 

  57. Auza, J.M.N., de Marca, J.R.B., Siqueira, G.L.: Design of a local information incentive mechanism for mobile crowdsensing. Sensors 19, 2532 (2019)

    MATH  Google Scholar 

  58. Tang, C., Yang, B., Xie, X., et al.: An incentive mechanism for federated learning: a continous zero-determinant strategy approach. IEEE/CAA J. Autom. Sin. 11(1), 88–103 (2024)

    MATH  Google Scholar 

  59. Chen, M., Yang, Z., Saad, V., et al.: Performance optimization of federated learning over wireless network. In: IEEE Global Communications Confernece (GLOBECOM 2019) (2019)

  60. Yao, A., Li, G., Li, X., et al.: Differential privacy in edge computing-based smart city applications: security issues, solutions and future directions. Array 19, 100293 (2023)

    MATH  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Key Research and Development Program of China (No. 2023YFC3303800)

Funding

Funding was provided by the National Key Research and Development Program of China (2023YFC3303800).

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed equally to the conceptualization and design of the solution for mentioned challenges. Data collection and analysis performed by Nasir Ahmad Jalali and Professor Chen Hong song provide supervision as well as reviewed the paper for quality improvement.

Corresponding author

Correspondence to Chen Hongsong.

Ethics declarations

Conflict of interest

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jalali, N.A., Hongsong, C. Federated learning incentivize with privacy-preserving for IoT in edge computing in the context of B5G. Cluster Comput 28, 112 (2025). https://doi.org/10.1007/s10586-024-04788-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Version of record:

  • DOI: https://doi.org/10.1007/s10586-024-04788-7

Keywords

Profiles

  1. Chen Hongsong