BCS-FL:基于区块链的工业物联网隐私保护联邦学习框架
BSC-FL: Blockchain-Based Privacy Protection Federated Learning Framework for Industrial Internet of Things
DOI: 10.12677/mos.2025.145407, PDF,   
作者: 王新中:上海理工大学光电信息与计算机工程学院,上海
关键词: 联邦学习工业物联网余弦相似度区块链Federated Learning Industrial Internet of Things Cosine Similarity Blockchain
摘要: 随着工业物联网的快速发展,在分布式环境下高效训练机器学习模型,同时保障数据隐私与系统安全,已成为亟待解决的关键问题。传统联邦学习虽然在一定程度上缓解了数据泄露风险,但仍面临中心化服务器易受攻击、投毒威胁以及模型更新透明度不足等挑战。为此,文章提出了一种基于区块链的去中心化联邦学习框架(BCS-FL)。该框架结合区块链技术与权益证明(PoS)共识机制,实现联邦学习的去中心化训练、筛选及存储,从而提升系统的安全性、透明度和可靠性。具体而言,在本地设备层,各智能工厂(客户端)基于自身数据训练局部模型,并经过裁剪和差分隐私保护后,生成局部模型包上传至验证层;在去中心化验证层,由PoS选出的验证节点计算局部模型间的余弦相似度以及损失函数差值,以筛选可信、高质量的客户端模型;在区块链存储层,矿工节点验证候选全局模型的哈希值、时间戳以及客户端签名,以确保模型版本的一致性,并通过PBFT共识将其存储至区块链,供所有客户端下载与同步,确保模型更新的可追溯性和抗篡改能力。
Abstract: With the rapid development of the Industrial Internet of Things, efficiently training machine learning models in distributed environments while ensuring data privacy and system security has become a critical challenge. Although traditional federated learning mitigates the risk of data leakage to some extent, it still faces challenges such as the vulnerability of centralized servers to attacks, poisoning threats, and insufficient transparency in model updates. To address these issues, this paper proposes a blockchain-based, decentralized, federated learning framework (BCS-FL). By integrating blockchain technology with the Proof-of-Stake (PoS) consensus mechanism, BCS-FL enables decentralized training, selection, and storage of federated learning models, thereby enhancing system security, transparency, and reliability. Specifically, at the local device layer, intelligent factories (clients) train local models based on their own data and generate local model packages after pruning and differential privacy protection before uploading them to the coordination layer. At the decentralized coordination layer, coordination nodes selected through PoS compute the cosine similarity and loss function differences between local models to filter out reliable and high-quality client models. At the blockchain storage layer, miner nodes verify the hash values, timestamps, and client signatures of candidate global models to ensure model version consistency. The final global model is stored on the blockchain through PBFT consensus, allowing all clients to download and synchronize it, ensuring model update traceability and tamper resistance.
文章引用:王新中. BCS-FL:基于区块链的工业物联网隐私保护联邦学习框架[J]. 建模与仿真, 2025, 14(5): 458-471. https://doi.org/10.12677/mos.2025.145407

参考文献

[1] Wan, J., Li, J., Imran, M., Li, D. and Fazal-e-Amin (2019) A Blockchain-Based Solution for Enhancing Security and Privacy in Smart Factory. IEEE Transactions on Industrial Informatics, 15, 3652-3660. [Google Scholar] [CrossRef
[2] Tange, K., De Donno, M., Fafoutis, X. and Dragoni, N. (2020) A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities. IEEE Communications Surveys & Tutorials, 22, 2489-2520. [Google Scholar] [CrossRef
[3] Mcmahan, B., Moore, E., Ramage, D., et al. (2017) Communication-Efficient Learning of Deep Networks from Decentralized Data. In: The 20th International Conference on Artificial Intelligence and Statistics, PMLR, 1273-1282.
[4] Sweeney, L. (2002) k-Anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10, 557-570. [Google Scholar] [CrossRef
[5] Machanavajjhala, A., Gehrke, J., Kifer, D. and Venkitasubramaniam, M. (2006) L-Diversity: Privacy Beyond K-Anonymity. 22nd International Conference on Data Engineering (ICDE’06), Atlanta, 3-7 April 2006, 24-35. [Google Scholar] [CrossRef
[6] Li, N., Li, T. and Venkatasubramanian, S. (2007) T-Closeness: Privacy Beyond K-Anonymity and L-Diversity. 2007 IEEE 23rd International Conference on Data Engineering, Istanbul, 15-20 April 2007, 106-115. [Google Scholar] [CrossRef
[7] Dwork, C. (2006) Differential Privacy. In: Bugliesi, M., et al., Eds., Automata, Languages and Programming, Springer, 1-12. [Google Scholar] [CrossRef
[8] 宋成, 程道晨, 彭维平. 一种高效的联邦学习隐私保护方案[J]. 西安电子科技大学学报, 2023, 50(5): 178-187.
[9] Basu, D., Ghosh, U. and Datta, R. (2022). 6G for Industry 5.0 and Smart CPS: A Journey from Challenging Hindrance to Opportunistic Future. 2022 IEEE Silchar Subsection Conference (SILCON), Sircar, 4-6 November 2022, 1-6.[CrossRef
[10] Boobalan, P., Ramu, S.P., Pham, Q., Dev, K., Pandya, S., Maddikunta, P.K.R., et al. (2022) Fusion of Federated Learning and Industrial Internet of Things: A Survey. Computer Networks, 212, Article ID: 109048. [Google Scholar] [CrossRef
[11] Hao, M., Li, H., Luo, X., Xu, G., Yang, H. and Liu, S. (2020) Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence. IEEE Transactions on Industrial Informatics, 16, 6532-6542. [Google Scholar] [CrossRef
[12] Xiao, X., Wu, T., Chen, Y. and Fan, X. (2019) Privacy-Preserved Approximate Classification Based on Homomorphic Encryption. Mathematical and Computational Applications, 24, Article No. 92. [Google Scholar] [CrossRef
[13] Castor, M. and Liskov, B. (1999) Practical Byzantine Fault Tolerance. Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (OSDI), New Orleans, 22-25 February 1999, 173-186.