skip to main content
survey

Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey

Published:16 January 2023Publication History
Skip Abstract Section

Abstract

The Internet of Things (IoT) ecosystem connects physical devices to the internet, offering significant advantages in agility, responsiveness, and potential environmental benefits. The number and variety of IoT devices are sharply increasing, and as they do, they generate significant data sources. Deep learning (DL) algorithms are increasingly integrated into IoT applications to learn and infer patterns and make intelligent decisions. However, current IoT paradigms rely on centralized storage and computing to operate the DL algorithms. This key central component can potentially cause issues in scalability, security threats, and privacy breaches. Federated learning (FL) has emerged as a new paradigm for DL algorithms to preserve data privacy. Although FL helps reduce privacy leakage by avoiding transferring client data, it still has many challenges related to models’ vulnerabilities and attacks. With the emergence of blockchain and smart contracts, the utilization of these technologies has the potential to safeguard FL across IoT ecosystems. This study aims to review blockchain-based FL methods for securing IoT systems holistically. It presents the current state of research in blockchain, how it can be applied to FL approaches, current IoT security issues, and responses to outline the need to use emerging approaches toward the security and privacy of IoT ecosystems. It also focuses on IoT data analytics from a security perspective and the open research questions. It also provides a thorough literature review of blockchain-based FL approaches for IoT applications. Finally, the challenges and risks associated with integrating blockchain and FL in IoT are discussed to be considered in future works.

Skip Supplemental Material Section

Supplemental Material

REFERENCES

  1. [1] Abad Mehdi Salehi Heydar, Ozfatura Emre, Gunduz Deniz, and Ercetin Ozgur. 2020. Hierarchical federated learning across heterogeneous cellular networks. In Proceedings of the 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’20). IEEE, Los Alamitos, CA, 88668870.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Mallah Ranwa Al, Badu-Marfo Godwin, and Farooq Bilal. 2021. Cybersecurity threats in connected and automated vehicles based federated learning systems. In Proceedings of the 2021 IEEE Intelligent Vehicles Symposium Workshops (IV Workshops’21). IEEE, Los Alamitos, CA, 1318.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Sadawi Alia Al, Hassan Mohamed S., and Ndiaye Malick. 2021. A survey on the integration of blockchain with IoT to enhance performance and eliminate challenges. IEEE Access 9 (2021), 5447854497.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Alfandi Omar, Khanji Salam, Ahmad Liza, and Khattak Asad. 2021. A survey on boosting IoT security and privacy through blockchain. Cluster Computing 24, 1 (2021), 3755.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Ali Mansoor, Karimipour Hadis, and Tariq Muhammad. 2021. Integration of blockchain and federated learning for Internet of Things: Recent advances and future challenges. Computers & Security 108 (2021), 102355.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Alladi Tejasvi, Chamola Vinay, Parizi Reza M., and Choo Kim-Kwang Raymond. 2019. Blockchain applications for Industry 4.0 and Industrial IoT: A review. IEEE Access 7 (2019), 176935176951.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Alsunaidi Shikah J. and Alhaidari Fahd A.. 2019. A survey of consensus algorithms for blockchain technology. In Proceedings of the 2019 International Conference on Computer and Information Sciences (ICCIS’19). IEEE, Los Alamitos, CA, 16.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Ammar Mahmoud, Russello Giovanni, and Crispo Bruno. 2018. Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications 38 (2018), 827.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Andrey Averin and Petr Cheskidov. 2019. Review of existing consensus algorithms blockchain. In Proceedings of the 2019 International Conference on Quality Management, Transport and Information Security, and Information Technologies (IT&QM&IS’19). IEEE, Los Alamitos, CA, 124127.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Androulaki Elli, Barger Artem, Bortnikov Vita, Cachin Christian, Christidis Konstantinos, Caro Angelo De, Enyeart David, et al. 2018. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the 13th EuroSys Conference. 115.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Asad Muhammad, Moustafa Ahmed, and Yu Chao. 2020. A critical evaluation of privacy and security threats in federated learning. Sensors 20, 24 (2020), 7182.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Asharf Javed, Moustafa Nour, Khurshid Hasnat, Debie Essam, Haider Waqas, and Wahab Abdul. 2020. A review of intrusion detection systems using machine and deep learning in Internet of Things: Challenges, solutions and future directions. Electronics 9, 7 (2020), 1177.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Badruddoja Syed, Dantu Ram, He Yanyan, Upadhayay Kritagya, and Thompson Mark. 2021. Making smart contracts smarter. In Proceedings of the 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC’21). IEEE, Los Alamitos, CA, 13.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Bagdasaryan Eugene, Veit Andreas, Hua Yiqing, Estrin Deborah, and Shmatikov Vitaly. 2020. How to backdoor federated learning. In Proceedings of the International Conference on Artificial Intelligence and Statistics. 29382948.Google ScholarGoogle Scholar
  15. [15] Bandara Eranga, Tosh Deepak, Foytik Peter, Shetty Sachin, Ranasinghe Nalin, and Zoysa Kasun De. 2021. Tikiri—Towards a lightweight blockchain for IoT. Future Generation Computer Systems 119 (2021), 154165.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Banerjee Mandrita, Lee Junghee, and Choo Kim-Kwang Raymond. 2018. A blockchain future for Internet of Things security: A position paper. Digital Communications and Networks 4, 3 (2018), 149160.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Bhagoji Arjun Nitin, Chakraborty Supriyo, Mittal Prateek, and Calo Seraphin. 2019. Analyzing federated learning through an adversarial lens. In Proceedings of the International Conference on Machine Learning. 634643.Google ScholarGoogle Scholar
  18. [18] Blanco-Justicia Alberto, Domingo-Ferrer Josep, Martínez Sergio, Sánchez David, Flanagan Adrian, and Tan Kuan Eeik. 2021. Achieving security and privacy in federated learning systems: Survey, research challenges and future directions. Engineering Applications of Artificial Intelligence 106 (2021), 104468.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Bonawitz Keith, Eichner Hubert, Grieskamp Wolfgang, Huba Dzmitry, Ingerman Alex, Ivanov Vladimir, Kiddon Chloe, et al. 2019. Towards federated learning at scale: System design. Proceedings of Machine Learning and Systems 1 (2019), 374388.Google ScholarGoogle Scholar
  20. [20] Bonawitz Keith, Ivanov Vladimir, Kreuter Ben, Marcedone Antonio, McMahan H. Brendan, Patel Sarvar, Ramage Daniel, Segal Aaron, and Seth Karn. 2017. Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 11751191.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Bouacida Nader and Mohapatra Prasant. 2021. Vulnerabilities in federated learning. IEEE Access 9 (2021), 6322963249.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Bouras Mohammed Amine, Lu Qinghua, Dhelim Sahraoui, and Ning Huansheng. 2021. A lightweight blockchain-based IoT identity management approach. Future Internet 13, 2 (2021), 24.Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Vitalik Buterin. 2013. Ethereum white paper. GitHub Repository 1 (2013), 2223.Google ScholarGoogle Scholar
  24. [24] Cachin Christian et al. 2016. Architecture of the hyperledger blockchain fabric. In Proceedings of the Workshop on Distributed Cryptocurrencies and Consensus Ledgers, Vol. 310.Google ScholarGoogle Scholar
  25. [25] Cao Hui, Liu Shubo, Zhao Renfang, and Xiong Xingxing. 2020. IFed: A novel federated learning framework for local differential privacy in power Internet of Things. International Journal of Distributed Sensor Networks 16, 5 (2020), 1550147720919698.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Capota Catalin, Neun Moritz, Do Lyman, and Kopp Michael. 2019. Asynchronous federated learning for geospatial applications. In ECML PKDD 2018 Workshops. Communications in Computer and Information Science, Vol. 967. Springer, 21–28.Google ScholarGoogle Scholar
  27. [27] Chaudhry Natalia and Yousaf Muhammad Murtaza. 2018. Consensus algorithms in blockchain: Comparative analysis, challenges and opportunities. In Proceedings of the 2018 12th International Conference on Open Source Systems and Technologies (ICOSST’18). IEEE, Los Alamitos, CA, 5463.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Chen Jin-Hua, Chen Min-Rong, Zeng Guo-Qiang, and Weng Jia-Si. 2021. BDFL: A Byzantine-fault-tolerance decentralized federated learning method for autonomous vehicle. IEEE Transactions on Vehicular Technology 70, 9 (2021), 86398652.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Chen Ming, Mao Bingcheng, and Ma Tianyi. 2019. Efficient and robust asynchronous federated learning with stragglers. In Proceedings of the 2019 International Conference on Learning Representations (ICLR’19).Google ScholarGoogle Scholar
  30. [30] Chen Min, Mao Shiwen, Zhang Yin, and Victor C. M. Leung. 2014. Big Data: Related Technologies, Challenges and Future Prospects. Springer Briefs in Computer Science. Springer.Google ScholarGoogle Scholar
  31. [31] Chen Mingzhe, Poor H. Vincent, Saad Walid, and Cui Shuguang. 2020. Wireless communications for collaborative federated learning. IEEE Communications Magazine 58, 12 (2020), 4854.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Chen Zheyi, Liao Weixian, Hua Kun, Lu Chao, and Yu Wei. 2021. Towards asynchronous federated learning for heterogeneous edge-powered Internet of Things. Digital Communications and Networks 7, 3 (2021), 317326.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Choudhury Olivia, Gkoulalas-Divanis Aris, Salonidis Theodoros, Sylla Issa, Park Yoonyoung, Hsu Grace, and Das Amar. 2020. A syntactic approach for privacy-preserving federated learning. In Proceedings of the 24th European Conference on Artificial Intelligence (ECAI’20). 17621769.Google ScholarGoogle Scholar
  34. [34] Xu Li Da, Lu Yang, and Li Ling. 2021. Embedding blockchain technology into IoT for security: A survey. IEEE Internet of Things Journal 8, 13 (2021), 10452–10473.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Dai Hong-Ning, Zheng Zibin, and Zhang Yan. 2019. Blockchain for Internet of Things: A survey. IEEE Internet of Things Journal 6, 5 (2019), 80768094.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Danzi Pietro, Kalør Anders E., Stefanović Čedomir, and Popovski Petar. 2019. Delay and communication tradeoffs for blockchain systems with lightweight IoT clients. IEEE Internet of Things Journal 6, 2 (2019), 23542365.Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Deepa Natarajan, Pham Quoc-Viet, Nguyen Dinh C., Bhattacharya Sweta, Prabadevi B., Gadekallu Thippa Reddy, Maddikunta Praveen Kumar Reddy, Fang Fang, and Pathirana Pubudu N.. 2022. A survey on blockchain for big data: Approaches, opportunities, and future directions. Future Generation Computer Systems 131 (2022), 209–226.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Doku Ronald and Rawat Danda B.. 2020. IFLBC: On the edge intelligence using federated learning blockchain network. In Proceedings of the 2020 IEEE 6th International Conference on Big Data Security on Cloud (BigDataSecurity’20), the IEEE International Conference on High Performance and Smart Computing (HPSC’20), and the IEEE International Conference on Intelligent Data and Security (IDS’20). IEEE, Los Alamitos, CA, 221226.Google ScholarGoogle Scholar
  39. [39] Doku Ronald, Rawat Danda B., Garuba Moses, and Njilla Laurent. 2019. LightChain: On the lightweight blockchain for the Internet-of-Things. In Proceedings of the 2019 IEEE International Conference on Smart Computing (SMARTCOMP’19). IEEE, Los Alamitos, CA, 444448.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Domingo-Ferrer Josep, Sánchez David, and Blanco-Justicia Alberto. 2021. The limits of differential privacy (and its misuse in data release and machine learning). Communications of the ACM 64, 7 (2021), 3335.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. [41] Dwivedi Sanjeev Kumar, Roy Priyadarshini, Karda Chinky, Agrawal Shalini, and Amin Ruhul. 2021. Blockchain-based Internet of Things and Industrial IoT: A comprehensive survey. Security and Communication Networks 2021 (2021), 10958.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. [42] Feng Lei, Zhao Yiqi, Guo Shaoyong, Qiu Xuesong, Li Wenjing, and Yu Peng. 2021. BAFL: A blockchain-based asynchronous federated learning framework. IEEE Transactions on Computers71, 5 (2021), 10921103. https://ieeexplore.ieee.org/abstract/document/9399813?casa_token=cTtOPOQqSFwAAAAA:pz_-rVdCTcSKxwngJToyad-wCksJhYVYC6jm20ch_Q8IFIYtAnJdiKjCtx2xEuDQrp4XdBBpYd4.Google ScholarGoogle Scholar
  43. [43] Fraboni Yann, Vidal Richard, and Lorenzi Marco. 2021. Free-rider attacks on model aggregation in federated learning. In Proceedings of the International Conference on Artificial Intelligence and Statistics. 18461854.Google ScholarGoogle Scholar
  44. [44] Fredrikson Matt, Jha Somesh, and Ristenpart Thomas. 2015. Model inversion attacks that exploit confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 13221333.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45] Ganju Karan, Wang Qi, Yang Wei, Gunter Carl A., and Borisov Nikita. 2018. Property inference attacks on fully connected neural networks using permutation invariant representations. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 619633.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46] Gao Dashan, Liu Yang, Huang Anbu, Ju Ce, Yu Han, and Yang Qiang. 2019. Privacy-preserving heterogeneous federated transfer learning. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data’19). IEEE, Los Alamitos, CA, 25522559.Google ScholarGoogle ScholarCross RefCross Ref
  47. [47] Geiping Jonas, Bauermeister Hartmut, Dröge Hannah, and Moeller Michael. 2020. Inverting gradients—How easy is it to break privacy in federated learning? Advances in Neural Information Processing Systems 33 (2020), 1693716947.Google ScholarGoogle Scholar
  48. [48] Guo Hanxi, Wang Hao, Song Tao, Hua Yang, Lv Zhangcheng, Jin Xiulang, Xue Zhengui, Ma Ruhui, and Guan Haibing. 2021. Siren: Byzantine-robust federated learning via proactive alarming. In Proceedings of the ACM Symposium on Cloud Computing. 4760.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. [49] Hao Meng, Li Hongwei, Luo Xizhao, Xu Guowen, Yang Haomiao, and Liu Sen. 2019. Efficient and privacy-enhanced federated learning for industrial artificial intelligence. IEEE Transactions on Industrial Informatics 16, 10 (2019), 65326542.Google ScholarGoogle ScholarCross RefCross Ref
  50. [50] Hao Meng, Li Hongwei, Xu Guowen, Liu Sen, and Yang Haomiao. 2019. Towards efficient and privacy-preserving federated deep learning. In Proceedings of the 2019 IEEE International Conference on Communications (ICC’19). IEEE, Los Alamitos, CA, 16.Google ScholarGoogle ScholarCross RefCross Ref
  51. [51] Hei Xinhong, Yin Xinyue, Wang Yichuan, Ren Ju, and Zhu Lei. 2020. A trusted feature aggregator federated learning for distributed malicious attack detection. Computers & Security 99 (2020), 102033.Google ScholarGoogle ScholarCross RefCross Ref
  52. [52] Hewa Tharaka Mawanane, Hu Yining, Liyanage Madhusanka, Kanhare Salil, and Ylianttila Mika. 2021. Survey on blockchain based smart contracts: Technical aspects and future research. IEEE Access 9 (2021), 87643–87662.Google ScholarGoogle ScholarCross RefCross Ref
  53. [53] Hitaj Briland, Ateniese Giuseppe, and Perez-Cruz Fernando. 2017. Deep models under the GAN: Information leakage from collaborative deep learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 603618.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. [54] Hou Dongkun, Zhang Jie, Man Ka Lok, Ma Jieming, and Peng Zitian. 2021. A systematic literature review of blockchain-based federated learning: Architectures, applications and issues. In Proceedings of the 2021 2nd Information Communication Technologies Conference (ICTC’21). IEEE, Los Alamitos, CA, 302307.Google ScholarGoogle ScholarCross RefCross Ref
  55. [55] Huo Ru, Zeng Shiqin, Wang Zhihao, Shang Jiajia, Chen Wei, Huang Tao, Wang Shuo, Yu F. Richard, and Liu Yunjie. 2022. A comprehensive survey on blockchain in Industrial Internet of Things: Motivations, research progresses, and future challenges. IEEE Communications Surveys & Tutorials 24, 1 (2022), 88–122.Google ScholarGoogle ScholarCross RefCross Ref
  56. [56] Iftikhar Zainab, Javed Yasir, Zaidi Syed Yawar Abbas, Shah Munam Ali, Khan Zafar Iqbal, Mussadiq Shafaq, and Abbasi Kamran. 2021. Privacy preservation in resource-constrained IoT devices using blockchain—A survey. Electronics 10, 14 (2021), 1732.Google ScholarGoogle ScholarCross RefCross Ref
  57. [57] Imteaj Ahmed, Thakker Urmish, Wang Shiqiang, Li Jian, and Amini M. Hadi. 2022. A survey on federated learning for resource-constrained IoT devices. IEEE Internet of Things Journal 9, 1 (2022), 1–24.Google ScholarGoogle ScholarCross RefCross Ref
  58. [58] IoTA. 2022. IoTA. Retrieved September 14, 2022 from https://www.iota.org/get-started/what-is-iota/.Google ScholarGoogle Scholar
  59. [59] Islam Rafiqul, Rahman Muhammad Mahbubur, Mahmud Md., Rahman Mohammed Ataur, Mohamad Muslim Har Sani, and Abd Halim Embong. 2021. A review on blockchain security issues and challenges. In Proceedings of the 2021 IEEE 12th Control and System Graduate Research Colloquium (ICSGRC’21). IEEE, Los Alamitos, CA, 227232.Google ScholarGoogle ScholarCross RefCross Ref
  60. [60] Jere Malhar S., Farnan Tyler, and Koushanfar Farinaz. 2020. A taxonomy of attacks on federated learning. IEEE Security & Privacy 19, 2 (2020), 2028.Google ScholarGoogle ScholarCross RefCross Ref
  61. [61] Jia Bin, Zhang Xiaosong, Liu Jiewen, Zhang Yang, Huang Ke, and Liang Yongquan. 2022. Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT. IEEE Transactions on Industrial Informatics 18, 6 (2022), 4049–4058.Google ScholarGoogle ScholarCross RefCross Ref
  62. [62] Jin Hai, Dai Xiaohai, Xiao Jiang, Li Baochun, Li Huichuwu, and Zhang Yan. 2021. Cross-cluster federated learning and blockchain for Internet of Medical Things. IEEE Internet of Things Journal 8, 21 (2021), 15776–15784.Google ScholarGoogle ScholarCross RefCross Ref
  63. [63] Kairouz Peter, McMahan H. Brendan, Avent Brendan, Bellet Aurélien, Bennis Mehdi, Bhagoji Arjun Nitin, Bonawitz Kallista, et al. 2021. Advances and open problems in federated learning. Foundations and Trends® in Machine Learning 14, 1–2 (2021), 1210.Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. [64] Kang Jiawen, Xiong Zehui, Niyato Dusit, Xie Shengli, and Zhang Junshan. 2019. Incentive mechanism for reliable federated learning: A joint optimization approach to combining reputation and contract theory. IEEE Internet of Things Journal 6, 6 (2019), 1070010714.Google ScholarGoogle ScholarCross RefCross Ref
  65. [65] Kargupta Hillol, Datta Souptik, Wang Qi, and Sivakumar Krishnamoorthy. 2003. On the privacy preserving properties of random data perturbation techniques. In Proceedings of the 3rd IEEE International Conference on Data Mining. IEEE, Los Alamitos, CA, 99106.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. [66] Karimireddy Sai Praneeth, Kale Satyen, Mohri Mehryar, Reddi Sashank, Stich Sebastian, and Suresh Ananda Theertha. 2020. SCAFFOLD: Stochastic controlled averaging for federated learning. In Proceedings of the 37th International Conference on Machine Learning, III Hal Daumé and Singh Aarti (Eds.). Proceedings of Machine Learning Research, Vol. 119. PMLR, 51325143. https://proceedings.mlr.press/v119/karimireddy20a.html.Google ScholarGoogle Scholar
  67. [67] Khan Latif U., Saad Walid, Han Zhu, and Hong Choong Seon. 2021. Dispersed federated learning: Vision, taxonomy, and future directions. IEEE Wireless Communications 28, 5 (2021), 192198.Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. [68] Khan Latif U., Saad Walid, Han Zhu, Hossain Ekram, and Hong Choong Seon. 2021. Federated learning for Internet of Things: Recent advances, taxonomy, and open challenges. IEEE Communications Surveys & Tutorials PP, 99 (2021), 1.Google ScholarGoogle ScholarCross RefCross Ref
  69. [69] Khan Minhaj Ahmad and Salah Khaled. 2018. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems 82 (2018), 395411.Google ScholarGoogle ScholarCross RefCross Ref
  70. [70] Khan Safiullah, Lee Wai-Kong, and Hwang Seong Oun. 2022. AEchain: A lightweight blockchain for IoT applications. IEEE Consumer Electronics Magazine 11, 2 (2022), 64–76.Google ScholarGoogle ScholarCross RefCross Ref
  71. [71] Kim Hyesung, Park Jihong, Bennis Mehdi, and Kim Seong-Lyun. 2019. Blockchained on-device federated learning. IEEE Communications Letters 24, 6 (2019), 12791283.Google ScholarGoogle ScholarCross RefCross Ref
  72. [72] Kumar Rajesh and Sharma Rewa. 2021. Leveraging blockchain for ensuring trust in IoT: A survey. Journal of King Saud University-Computer and Information Sciences. In press.Google ScholarGoogle Scholar
  73. [73] Kumari Aparna, Gupta Rajesh, and Tanwar Sudeep. 2021. Amalgamation of blockchain and IoT for smart cities underlying 6G communication: A comprehensive review. Computer Communications 172 (2021), 102–118.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. [74] Lao Laphou, Li Zecheng, Hou Songlin, Xiao Bin, Guo Songtao, and Yang Yuanyuan. 2020. A survey of IoT applications in blockchain systems: Architecture, consensus, and traffic modeling. ACM Computing Surveys 53, 1 (2020), 132.Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. [75] Latif Shahid, Idrees Zeba, Huma Zil e, and Ahmad Jawad. 2021. Blockchain technology for the Industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions. Transactions on Emerging Telecommunications Technologies 32, 11 (2021), e4337.Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. [76] Lee Haemin and Kim Joongheon. 2021. Trends in blockchain and federated learning for data sharing in distributed platforms. In Proceedings of the 2021 12th International Conference on Ubiquitous and Future Networks (ICUFN’21). IEEE, Los Alamitos, CA, 430433.Google ScholarGoogle ScholarCross RefCross Ref
  77. [77] Li Dun, Han Dezhi, Weng Tien-Hsiung, Zheng Zibin, Li Hongzhi, Liu Han, Castiglione Arcangelo, and Li Kuan-Ching. 2022. Blockchain for federated learning toward secure distributed machine learning systems: A systemic survey. Soft Computing 26, 9 (2022), 44234440.Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. [78] Li Jun, Shao Yumeng, Wei Kang, Ding Ming, Ma Chuan, Shi Long, Han Zhu, and Poor H. Vincent. 2022. Blockchain assisted decentralized federated learning (BLADE-FL): Performance analysis and resource allocation. IEEE Transactions on Parallel and Distributed Systems 33, 10 (2022), 24012415. Google ScholarGoogle ScholarCross RefCross Ref
  79. [79] Li Jun, Shao Yumeng, Wei Kang, Ding Ming, Ma Chuan, Shi Long, Han Zhu, and Poor Vincent. 2021. Blockchain assisted decentralized federated learning (BLADS-FL): Performance analysis and resource allocation. IEEE Transactions on Parallel and Distributed Systems 33, 10 (2021), 2401–2415.Google ScholarGoogle Scholar
  80. [80] Li Li, Fan Yuxi, Tse Mike, and Lin Kuo-Yi. 2020. A review of applications in federated learning. Computers & Industrial Engineering 149 (2020), 106854.Google ScholarGoogle ScholarCross RefCross Ref
  81. [81] Li Ninghui, Li Tiancheng, and Venkatasubramanian Suresh. 2007. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proceedings of the 2007 IEEE 23rd International Conference on Data Engineering. IEEE, Los Alamitos, CA, 106115.Google ScholarGoogle ScholarCross RefCross Ref
  82. [82] Li Shenghui, Ngai Edith, and Voigt Thiemo. 2021. Byzantine-robust aggregation in federated learning empowered Industrial IoT. IEEE Transactions on Industrial Informatics. Early access, November 15, 2021.Google ScholarGoogle Scholar
  83. [83] Li Tian, Sahu Anit Kumar, Zaheer Manzil, Sanjabi Maziar, Talwalkar Ameet, and Smith Virginia. 2020. Federated optimization in heterogeneous networks. Proceedings of Machine Learning and Systems 2 (2020), 429450.Google ScholarGoogle Scholar
  84. [84] Liu Pengrui, Xu Xiangrui, and Wang Wei. 2022. Threats, attacks and defenses to federated learning: Issues, taxonomy and perspectives. Cybersecurity 5, 1 (2022), 119.Google ScholarGoogle ScholarCross RefCross Ref
  85. [85] Liu Ruixuan, Cao Yang, Yoshikawa Masatoshi, and Chen Hong. 2020. FedSel: Federated SGD under local differential privacy with top-k dimension selection. In Proceedings of the International Conference on Database Systems for Advanced Applications. 485501.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. [86] Liu Xiaoyuan, Li Hongwei, Xu Guowen, Chen Zongqi, Huang Xiaoming, and Lu Rongxing. 2021. Privacy-enhanced federated learning against poisoning adversaries. IEEE Transactions on Information Forensics and Security 16 (2021), 45744588.Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. [87] Liu Yiming, Yu F. Richard, Li Xi, Ji Hong, and Leung Victor C. M.. 2020. Blockchain and machine learning for communications and networking systems. IEEE Communications Surveys & Tutorials 22, 2 (2020), 13921431.Google ScholarGoogle ScholarCross RefCross Ref
  88. [88] Lone Auqib Hamid and Naaz Roohie. 2021. Applicability of blockchain smart contracts in securing internet and IoT: A systematic literature review. Computer Science Review 39 (2021), 100360.Google ScholarGoogle ScholarCross RefCross Ref
  89. [89] Lu Yunlong, Huang Xiaohong, Zhang Ke, Maharjan Sabita, and Zhang Yan. 2020. Blockchain empowered asynchronous federated learning for secure data sharing in Internet of Vehicles. IEEE Transactions on Vehicular Technology 69, 4 (2020), 42984311.Google ScholarGoogle ScholarCross RefCross Ref
  90. [90] Lu Yunlong, Huang Xiaohong, Zhang Ke, Maharjan Sabita, and Zhang Yan. 2020. Communication-efficient federated learning and permissioned blockchain for digital twin edge networks. IEEE Internet of Things Journal 8, 4 (2020), 22762288.Google ScholarGoogle ScholarCross RefCross Ref
  91. [91] Lyu Lingjuan, Yu Han, Zhao Jun, and Yang Qiang. 2020. Threats to federated learning. In Federated Learning. Springer, 316.Google ScholarGoogle ScholarCross RefCross Ref
  92. [92] Mahdavinejad Mohammad Saeid, Rezvan Mohammadreza, Barekatain Mohammadamin, Adibi Peyman, Barnaghi Payam, and Sheth Amit P.. 2018. Machine learning for Internet of Things data analysis: A survey. Digital Communications and Networks 4, 3 (2018), 161175.Google ScholarGoogle ScholarCross RefCross Ref
  93. [93] Majeed Umer, Khan Latif U., Yaqoob Ibrar, Kazmi S. M. Ahsan, Salah Khaled, and Hong Choong Seon. 2021. Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges. Journal of Network and Computer Applications 181 (2021), 103007.Google ScholarGoogle ScholarCross RefCross Ref
  94. [94] Marjani Mohsen, Nasaruddin Fariza, Gani Abdullah, Karim Ahmad, Hashem Ibrahim Abaker Targio, Siddiqa Aisha, and Yaqoob Ibrar. 2017. Big IoT data analytics: Architecture, opportunities, and open research challenges. IEEE Access 5 (2017), 52475261.Google ScholarGoogle ScholarCross RefCross Ref
  95. [95] McMahan Brendan, Moore Eider, Ramage Daniel, Hampson Seth, and Arcas Blaise Aguera y. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics. PMLR, 12731282.Google ScholarGoogle Scholar
  96. [96] Melis Luca, Song Congzheng, Cristofaro Emiliano De, and Shmatikov Vitaly. 2019. Exploiting unintended feature leakage in collaborative learning. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP’19). IEEE, Los Alamitos, CA, 691706.Google ScholarGoogle ScholarCross RefCross Ref
  97. [97] Mingxiao Du, Xiaofeng Ma, Zhe Zhang, Xiangwei Wang, and Qijun Chen. 2017. A review on consensus algorithm of blockchain. In Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC’17). IEEE, Los Alamitos, CA, 25672572.Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. [98] Mo Dandan. 2012. A Survey on Deep Learning: One Small Step Toward AI. Department of Computer Science, University of New Mexico.Google ScholarGoogle Scholar
  99. [99] Mohammadi Mehdi, Al-Fuqaha Ala, Sorour Sameh, and Guizani Mohsen. 2018. Deep learning for IoT big data and streaming analytics: A survey. IEEE Communications Surveys & Tutorials 20, 4 (2018), 29232960.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. [100] Mohanty Sachi Nandan, Ramya K. C., Rani S. Sheeba, Gupta Deepak, Shankar K., Lakshmanaprabu S. K., and Khanna Ashish. 2020. An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy. Future Generation Computer Systems 102 (2020), 10271037.Google ScholarGoogle ScholarDigital LibraryDigital Library
  101. [101] Monrat Ahmed Afif, Schelén Olov, and Andersson Karl. 2019. A survey of blockchain from the perspectives of applications, challenges, and opportunities. IEEE Access 7 (2019), 117134117151.Google ScholarGoogle ScholarCross RefCross Ref
  102. [102] Mothukuri Viraaji, Parizi Reza M., Pouriyeh Seyedamin, Huang Yan, Dehghantanha Ali, and Srivastava Gautam. 2021. A survey on security and privacy of federated learning. Future Generation Computer Systems 115 (2021), 619640.Google ScholarGoogle ScholarCross RefCross Ref
  103. [103] Satoshi Nakamoto. 2008. A Peer-to-Peer Electronic Cash System. Retrieved September 14, 2022 from https://bitcoin.org/en/bitcoin-paper.Google ScholarGoogle Scholar
  104. [104] Nanayakkara Samudaya, Rodrigo M. N. N., Perera Srinath, Weerasuriya G. T., and Hijazi Amer A.. 2021. A methodology for selection of a blockchain platform to develop an enterprise system. Journal of Industrial Information Integration 23 (2021), 100215.Google ScholarGoogle ScholarCross RefCross Ref
  105. [105] Nasir Qassim, Qasse Ilham A., Talib Manar Abu, and Nassif Ali Bou. 2018. Performance analysis of hyperledger fabric platforms. Security and Communication Networks 2018 (2018), Article 3976093.Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. [106] Nasr Milad, Shokri Reza, and Houmansadr Amir. 2019. Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP’19). IEEE, Los Alamitos, CA, 739753.Google ScholarGoogle ScholarCross RefCross Ref
  107. [107] Ngo Quoc-Dung, Nguyen Huy-Trung, Le Van-Hoang, and Nguyen Doan-Hieu. 2020. A survey of IoT malware and detection methods based on static features. ICT Express 6, 4 (2020), 280286.Google ScholarGoogle ScholarCross RefCross Ref
  108. [108] Nguyen Dinh C., Ding Ming, Pathirana Pubudu N., Seneviratne Aruna, Li Jun, and Poor H. Vincent. 2021. Federated learning for Internet of Things: A comprehensive survey. IEEE Communications Surveys & Tutorials 23, 3 (2021), 1622–1658.Google ScholarGoogle ScholarCross RefCross Ref
  109. [109] Nguyen Dinh C., Ding Ming, Pham Quoc-Viet, Pathirana Pubudu N., Le Long Bao, Seneviratne Aruna, Li Jun, Niyato Dusit, and Poor H. Vincent. 2021. Federated learning meets blockchain in edge computing: Opportunities and challenges. IEEE Internet of Things Journal 8, 16 (2021), 12806–12825.Google ScholarGoogle ScholarCross RefCross Ref
  110. [110] Nguyen Dinh C., Pham Quoc-Viet, Pathirana Pubudu N., Ding Ming, Seneviratne Aruna, Lin Zihuai, Dobre Octavia, and Hwang Won-Joo. 2022. Federated learning for smart healthcare: A survey. ACM Computing Surveys 55, 3 (2022), 137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. [111] Nguyen Giang-Truong and Kim Kyungbaek. 2018. A survey about consensus algorithms used in blockchain. Journal of Information Processing Systems 14, 1 (2018), 101128.Google ScholarGoogle Scholar
  112. [112] Nielsen Michael. 2006. Deep Learning. Retrieved September 14, 2022 from http://neuralnetworksanddeeplearning.com/chap6.html/.Google ScholarGoogle Scholar
  113. [113] Noble Maxence, Bellet Aurélien, and Dieuleveut Aymeric. 2022. Differentially private federated learning on heterogeneous data. In Proceedings of the 25th International Conference on Artificial Intelligence and Statistics, Camps-Valls Gustau, Ruiz Francisco J. R., and Valera Isabel (Eds.). Proceedings of Machine Learning Research, Vol. 151. PMLR, 1011010145. https://proceedings.mlr.press/v151/noble22a.html.Google ScholarGoogle Scholar
  114. [114] Noby Diaa A. and Khattab Ahmed. 2019. A survey of blockchain applications in IoT systems. In Proceedings of the 2019 14th International Conference on Computer Engineering and Systems (ICCES’19). IEEE, Los Alamitos, CA, 8387.Google ScholarGoogle ScholarCross RefCross Ref
  115. [115] Otoum Safa, Ridhawi Ismaeel Al, and Mouftah Hussein. 2021. Securing critical IoT infrastructures with blockchain-supported federated learning. IEEE Internet of Things Journal (2021).Google ScholarGoogle Scholar
  116. [116] Otoum Safa, Ridhawi Ismaeel Al, and Mouftah Hussein T.. 2020. Blockchain-supported federated learning for trustworthy vehicular networks. In Proceedings of the 2020 IEEE Global Communications Conference(GLOBECOM’20). IEEE, Los Alamitos, CA, 16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. [117] Pahlajani Sunny, Kshirsagar Avinash, and Pachghare Vinod. 2019. Survey on private blockchain consensus algorithms. In Proceedings of the 2019 1st International Conference on Innovations in Information and Communication Technology (ICIICT). IEEE, Los Alamitos, CA, 16.Google ScholarGoogle ScholarCross RefCross Ref
  118. [118] Panarello Alfonso, Tapas Nachiket, Merlino Giovanni, Longo Francesco, and Puliafito Antonio. 2018. Blockchain and IoT integration: A systematic survey. Sensors 18, 8 (2018), 2575.Google ScholarGoogle ScholarCross RefCross Ref
  119. [119] Picone Marco, Cirani Simone, and Veltri Luca. 2021. Blockchain security and privacy for the Internet of Things. Sensors (Basel) 21, 3 (2021), 892.Google ScholarGoogle Scholar
  120. [120] Qi Yuanhang, Hossain M. Shamim, Nie Jiangtian, and Li Xuandi. 2021. Privacy-preserving blockchain-based federated learning for traffic flow prediction. Future Generation Computer Systems 117 (2021), 328337.Google ScholarGoogle ScholarCross RefCross Ref
  121. [121] Qin Zhenquan, Ye Jin, Meng Jie, Lu Bingxian, and Wang Lei. 2022. Privacy-preserving blockchain-based federated learning for marine Internet of Things. IEEE Transactions on Computational Social Systems 9, 1 (2022), 159–173.Google ScholarGoogle ScholarCross RefCross Ref
  122. [122] Qu Youyang, Gao Longxiang, Luan Tom H., Xiang Yong, Yu Shui, Li Bai, and Zheng Gavin. 2020. Decentralized privacy using blockchain-enabled federated learning in fog computing. IEEE Internet of Things Journal 7, 6 (2020), 51715183.Google ScholarGoogle ScholarCross RefCross Ref
  123. [123] R3. 2022. Corda. Retrieved May 21, 2022 from https://www.corda.net/why-corda/.Google ScholarGoogle Scholar
  124. [124] Rey Valerian, Sánchez Pedro Miguel Sánchez, Celdrán Alberto Huertas, and Bovet Gérôme. 2022. Federated learning for malware detection in IoT devices. Computer Networks 204 (2022), 108693.Google ScholarGoogle ScholarDigital LibraryDigital Library
  125. [125] Reyna Ana, Martín Cristian, Chen Jaime, Soler Enrique, and Díaz Manuel. 2018. On blockchain and its integration with IoT: Challenges and opportunities. Future Generation Computer Systems 88 (2018), 173190.Google ScholarGoogle ScholarCross RefCross Ref
  126. [126] Salim Sara, Turnbull Benjamin, and Moustafa Nour. 2021. A blockchain-enabled explainable federated learning for securing Internet-of-Things-based Social Media 3.0 networks. IEEE Transactions on Computational Social Systems. Early access, December 28, 2021.Google ScholarGoogle ScholarCross RefCross Ref
  127. [127] Salimitari Mehrdad, Chatterjee Mainak, and Fallah Yaser P.. 2020. A survey on consensus methods in blockchain for resource-constrained IoT networks. Internet of Things 11 (2020), 100212.Google ScholarGoogle ScholarCross RefCross Ref
  128. [128] Sattler Felix, Müller Klaus-Robert, Wiegand Thomas, and Samek Wojciech. 2020. On the Byzantine robustness of clustered federated learning. In Proceedings of the 2020 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’20). IEEE, Los Alamitos, CA, 88618865.Google ScholarGoogle ScholarCross RefCross Ref
  129. [129] Saxena Shivam, Bhushan Bharat, and Ahad Mohd Abdul. 2021. Blockchain based solutions to secure IoT: Background, integration trends and a way forward. Journal of Network and Computer Applications 181 (2021), 103050.Google ScholarGoogle ScholarCross RefCross Ref
  130. [130] Shamir Adi. 1979. How to share a secret. Communications of the ACM 22, 11 (1979), 612613.Google ScholarGoogle ScholarDigital LibraryDigital Library
  131. [131] Sharma Parjanay, Jain Siddhant, Gupta Shashank, and Chamola Vinay. 2021. Role of machine learning and deep learning in securing 5G-driven Industrial IoT applications. Ad Hoc Networks 123 (2021), 102685.Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. [132] Sharma Pradip Kumar, Park Jong Hyuk, and Cho Kyungeun. 2020. Blockchain and federated learning-based distributed computing defence framework for sustainable society. Sustainable Cities and Society 59 (2020), 102220.Google ScholarGoogle ScholarCross RefCross Ref
  133. [133] Short Andrew Ronald, Leligou Helen C., Papoutsidakis Michael, and Theocharis Efstathios. 2020. Using blockchain technologies to improve security in federated learning systems. In Proceedings of the 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, Los Alamitos, CA, 11831188.Google ScholarGoogle ScholarCross RefCross Ref
  134. [134] Short Andrew R., Leligou Helen C., and Theocharis Efstathios. 2021. Execution of a federated learning process within a smart contract. In Proceedings of the 2021 IEEE International Conference on Consumer Electronics (ICCE). IEEE, Los Alamitos, CA, 14.Google ScholarGoogle ScholarCross RefCross Ref
  135. [135] Singh Arshdeep, Kumar Gulshan, Saha Rahul, Conti Mauro, Alazab Mamoun, and Thomas Reji. 2022. A survey and taxonomy of consensus protocols for blockchains. Journal of Systems Architecture 127 (2022), 102503.Google ScholarGoogle ScholarDigital LibraryDigital Library
  136. [136] Singh Shivani, Sulthana Razia, Shewale Tanvi, Chamola Vinay, Benslimane Abderrahim, and Sikdar Biplab. 2021. Machine-learning-assisted security and privacy provisioning for edge computing: A survey. IEEE Internet of Things Journal 9, 1 (2021), 236260.Google ScholarGoogle ScholarCross RefCross Ref
  137. [137] So Jinhyun, Güler Başak, and Avestimehr A. Salman. 2021. Byzantine-resilient secure federated learning. IEEE Journal on Selected Areas in Communications 39, 7 (2021), 2168–2181.Google ScholarGoogle ScholarCross RefCross Ref
  138. [138] Song Mengkai, Wang Zhibo, Zhang Zhifei, Song Yang, Wang Qian, Ren Ju, and Qi Hairong. 2020. Analyzing user-level privacy attack against federated learning. IEEE Journal on Selected Areas in Communications 38, 10 (2020), 24302444.Google ScholarGoogle ScholarCross RefCross Ref
  139. [139] Steward Jack. 2021. The Ultimate List of Internet of Things Statistics for 2021. Retrieved September 25, 2021 from https://findstack.com/internet-of-things-statistics/.Google ScholarGoogle Scholar
  140. [140] Stripelis Dimitris, Thompson Paul M., and Ambite José Luis. 2022. Semi-synchronous federated learning for energy-efficient training and accelerated convergence in cross-silo settings. ACM Transactions on Intelligent Systems and Technology 13, 5 (2022), Article 78, 29 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  141. [141] Sun Jin, Wu Ying, Wang Shangping, Fu Yixue, and Chang Xiao. 2022. A permissioned blockchain frame for secure federated learning. IEEE Communications Letters 26, 1 (2022), 13–17.Google ScholarGoogle Scholar
  142. [142] Tan Alysa Ziying, Yu Han, Cui Lizhen, and Yang Qiang. 2022. Towards personalized federated learning. IEEE Transactions on Neural Networks and Learning Systems. Accepted.Google ScholarGoogle ScholarCross RefCross Ref
  143. [143] Tanwar Sudeep, Bhatia Qasim, Patel Pruthvi, Kumari Aparna, Singh Pradeep Kumar, and Hong Wei-Chiang. 2019. Machine learning adoption in blockchain-based smart applications: The challenges, and a way forward. IEEE Access 8 (2019), 474488.Google ScholarGoogle ScholarCross RefCross Ref
  144. [144] Truex Stacey, Baracaldo Nathalie, Anwar Ali, Steinke Thomas, Ludwig Heiko, Zhang Rui, and Zhou Yi. 2019. A hybrid approach to privacy-preserving federated learning. In Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security. 111.Google ScholarGoogle ScholarDigital LibraryDigital Library
  145. [145] Unal Devrim, Hammoudeh Mohammad, Khan Muhammad Asif, Abuarqoub Abdelrahman, Epiphaniou Gregory, and Hamila Ridha. 2021. Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things. Computers & Security 109 (2021), 102393.Google ScholarGoogle ScholarDigital LibraryDigital Library
  146. [146] Berlo Bram van, Saeed Aaqib, and Ozcelebi Tanir. 2020. Towards federated unsupervised representation learning. In Proceedings of the 3rd ACM International Workshop on Edge Systems, Analytics, and Networking. 3136.Google ScholarGoogle ScholarDigital LibraryDigital Library
  147. [147] Velliangiri S. and Karthikeyan P.. 2020. Blockchain technology: Challenges and security issues in consensus algorithm. In Proceedings of the 2020 International Conference on Computer Communication and Informatics (ICCCI’20). IEEE, Los Alamitos, CA, 18.Google ScholarGoogle ScholarCross RefCross Ref
  148. [148] Waheed Nazar, He Xiangjian, Ikram Muhammad, Usman Muhammad, Hashmi Saad Sajid, and Usman Muhammad. 2020. Security and privacy in IoT using machine learning and blockchain: Threats and countermeasures. ACM Computing Surveys 53, 6 (2020), 137.Google ScholarGoogle ScholarDigital LibraryDigital Library
  149. [149] Wang Shuai, Ouyang Liwei, Yuan Yong, Ni Xiaochun, Han Xuan, and Wang Fei-Yue. 2019. Blockchain-enabled smart contracts: Architecture, applications, and future trends. IEEE Transactions on Systems, Man, and Cybernetics: Systems 49, 11 (2019), 22662277.Google ScholarGoogle ScholarCross RefCross Ref
  150. [150] Wang Shuai, Yuan Yong, Wang Xiao, Li Juanjuan, Qin Rui, and Wang Fei-Yue. 2018. An overview of smart contract: Architecture, applications, and future trends. In Proceedings of the 2018 IEEE Intelligent Vehicles Symposium (IV’18). IEEE, Los Alamitos, CA, 108113.Google ScholarGoogle ScholarDigital LibraryDigital Library
  151. [151] Wang Xu, Zha Xuan, Ni Wei, Liu Ren Ping, Guo Y. Jay, Niu Xinxin, and Zheng Kangfeng. 2019. Survey on blockchain for Internet of Things. Computer Communications 136 (2019), 1029.Google ScholarGoogle ScholarDigital LibraryDigital Library
  152. [152] Wang Yuhao, Cai Shaobin, Lin Changlong, Chen Zuxi, Wang Tian, Gao Zhenguo, and Zhou Changli. 2019. Study of blockchains’s consensus mechanism based on credit. IEEE Access 7 (2019), 1022410231.Google ScholarGoogle ScholarCross RefCross Ref
  153. [153] Wang Zhibo, Song Mengkai, Zhang Zhifei, Song Yang, Wang Qian, and Qi Hairong. 2019. Beyond inferring class representatives: User-level privacy leakage from federated learning. In Proceedings of the IEEE Conference on Computer Communications (IEEE INFOCOM’19). IEEE, Los Alamitos, CA, 25122520.Google ScholarGoogle ScholarDigital LibraryDigital Library
  154. [154] Wei Kang, Li Jun, Ding Ming, Ma Chuan, Yang Howard H., Farokhi Farhad, Jin Shi, Quek Tony Q. S., and Poor H. Vincent. 2020. Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Information Forensics and Security 15 (2020), 34543469.Google ScholarGoogle ScholarDigital LibraryDigital Library
  155. [155] Wei Zhaohui, Pei Qingqi, Zhang Ning, Liu Xuefeng, Wu Celimuge, and Taherkordi Amirhosein. 2021. Lightweight federated learning for large-scale IoT devices with privacy guarantee. IEEE Internet of Things Journal. Early access, November 15, 2021.Google ScholarGoogle ScholarCross RefCross Ref
  156. [156] Weng Jiasi, Weng Jian, Zhang Jilian, Li Ming, Zhang Yue, and Luo Weiqi. 2019. DeepChain: Auditable and privacy-preserving deep learning with blockchain-based incentive. IEEE Transactions on Dependable and Secure Computing 18, 5 (2019), 2438–2455.Google ScholarGoogle ScholarDigital LibraryDigital Library
  157. [157] Wu Mingli, Wang Kun, Cai Xiaoqin, Guo Song, Guo Minyi, and Rong Chunming. 2019. A comprehensive survey of blockchain: From theory to IoT applications and beyond. IEEE Internet of Things Journal 6, 5 (2019), 81148154.Google ScholarGoogle ScholarCross RefCross Ref
  158. [158] Wu Wentai, He Ligang, Lin Weiwei, Mao Rui, Maple Carsten, and Jarvis Stephen. 2020. SAFA: A semi-asynchronous protocol for fast federated learning with low overhead. IEEE Transactions on Computers 70, 5 (2020), 655668.Google ScholarGoogle ScholarDigital LibraryDigital Library
  159. [159] Xie Chulin, Huang Keli, Chen Pin-Yu, and Li Bo. 2020. DBA: Distributed backdoor attacks against federated learning. In Proceedings of the International Conference on Learning Representations. https://openreview.net/forum?id=rkgyS0VFvr.Google ScholarGoogle Scholar
  160. [160] Xie Junfeng, Tang Helen, Huang Tao, Yu F. Richard, Xie Renchao, Liu Jiang, and Liu Yunjie. 2019. A survey of blockchain technology applied to smart cities: Research issues and challenges. IEEE Communications Surveys & Tutorials 21, 3 (2019), 27942830.Google ScholarGoogle ScholarCross RefCross Ref
  161. [161] Yan Xu, Tao Mo, Qiwei Feng, Peilin Zhong, Maode Lai, and Eric I.-Chao Chang. 2014. Deep learning of feature representation with multiple instance learning for medical image analysis. In Proceedings of the 2014 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’14). IEEE, Los Alamitos, CA, 16261630.Google ScholarGoogle Scholar
  162. [162] Xu Chenhao, Qu Youyang, Xiang Yong, and Gao Longxiang. 2021. Asynchronous federated learning on heterogeneous devices: A survey. arXiv:2109.04269.Google ScholarGoogle Scholar
  163. [163] Xu Guowen, Li Hongwei, Liu Sen, Yang Kan, and Lin Xiaodong. 2019. VerifyNet: Secure and verifiable federated learning. IEEE Transactions on Information Forensics and Security 15 (2019), 911926.Google ScholarGoogle ScholarDigital LibraryDigital Library
  164. [164] Xu Runhua, Baracaldo Nathalie, Zhou Yi, Anwar Ali, and Ludwig Heiko. 2019. Hybridalpha: An efficient approach for privacy-preserving federated learning. In Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security. 1323.Google ScholarGoogle ScholarDigital LibraryDigital Library
  165. [165] Yadav Krishna, Gupta Brij B., Hsu Ching-Hsein, and Chui Kwok Tai. 2021. Unsupervised federated learning based IoT intrusion detection. In Proceedings of the 2021 IEEE 10th Global Conference on Consumer Electronics (GCCE’21). IEEE, Los Alamitos, CA, 298301.Google ScholarGoogle ScholarCross RefCross Ref
  166. [166] Yang Qiang, Liu Yang, Chen Tianjian, and Tong Yongxin. 2019. Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology 10, 2 (2019), 119.Google ScholarGoogle ScholarDigital LibraryDigital Library
  167. [167] Yin Xuefei, Zhu Yanming, and Hu Jiankun. 2021. A comprehensive survey of privacy-preserving federated learning: A taxonomy, review, and future directions. ACM Computing Surveys 54, 6 (2021), 136.Google ScholarGoogle ScholarDigital LibraryDigital Library
  168. [168] Yuan Yong and Wang Fei-Yue. 2018. Blockchain and cryptocurrencies: Model, techniques, and applications. IEEE Transactions on Systems, Man, and Cybernetics: Systems 48, 9 (2018), 14211428.Google ScholarGoogle ScholarCross RefCross Ref
  169. [169] Zhang Chen, Xie Yu, Bai Hang, Yu Bin, Li Weihong, and Gao Yuan. 2021. A survey on federated learning. Knowledge-Based Systems 216 (2021), 106775.Google ScholarGoogle ScholarCross RefCross Ref
  170. [170] Zhang Haichao and Wang Jianyu. 2019. Defense against adversarial attacks using feature scattering-based adversarial training. In Proceedings of the 33rd International Conference on Neural Information Processing Systems (NIPS’19). 1831–1841.Google ScholarGoogle Scholar
  171. [171] Zhang Jiale, Chen Bing, Cheng Xiang, Binh Huynh Thi Thanh, and Yu Shui. 2020. PoisonGAN: Generative poisoning attacks against federated learning in edge computing systems. IEEE Internet of Things Journal 8, 5 (2020), 33103322.Google ScholarGoogle ScholarCross RefCross Ref
  172. [172] Zhang Jiale, Chen Bing, Yu Shui, and Deng Hai. 2019. PEFL: A privacy-enhanced federated learning scheme for big data analytics. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM’19). IEEE, Los Alamitos, CA, 16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  173. [173] Zhang Jiale, Wu Di, Liu Chengyong, and Chen Bing. 2020. Defending poisoning attacks in federated learning via adversarial training method. In Proceedings of the International Conference on Frontiers in Cyber Security. 8394.Google ScholarGoogle ScholarCross RefCross Ref
  174. [174] Zhang Jingwen, Zhang Jiale, Chen Junjun, and Yu Shui. 2020. GAN enhanced membership inference: A passive local attack in federated learning. In Proceedings of the 2020 IEEE International Conference on Communications (ICC’20). IEEE, Los Alamitos, CA, 16.Google ScholarGoogle ScholarCross RefCross Ref
  175. [175] Zhang Peiying, Sun Hao, Situ Jingyi, Jiang Chunxiao, and Xie Dongliang. 2021. Federated transfer learning for IIoT devices with low computing power based on blockchain and edge computing. IEEE Access 9 (2021), 9863098638.Google ScholarGoogle ScholarCross RefCross Ref
  176. [176] Zhang Weishan, Lu Qinghua, Yu Qiuyu, Li Zhaotong, Liu Yue, Lo Sin Kit, Chen Shiping, Xu Xiwei, and Zhu Liming. 2020. Blockchain-based federated learning for device failure detection in Industrial IoT. IEEE Internet of Things Journal 8, 7 (2020), 59265937.Google ScholarGoogle ScholarCross RefCross Ref
  177. [177] Zhao Yang, Zhao Jun, Jiang Linshan, Tan Rui, Niyato Dusit, Li Zengxiang, Lyu Lingjuan, and Liu Yingbo. 2020. Privacy-preserving blockchain-based federated learning for IoT devices. IEEE Internet of Things Journal 8, 3 (2020), 18171829.Google ScholarGoogle ScholarCross RefCross Ref
  178. [178] Zheng Zibin, Xie Shaoan, Dai Hong-Ning, Chen Weili, Chen Xiangping, Weng Jian, and Imran Muhammad. 2020. An overview on smart contracts: Challenges, advances and platforms. Future Generation Computer Systems 105 (2020), 475491.Google ScholarGoogle ScholarDigital LibraryDigital Library
  179. [179] Zhu Hangyu, Xu Jinjin, Liu Shiqing, and Jin Yaochu. 2021. Federated learning on non-IID data: A survey. Neurocomputing 465 (2021), 371390.Google ScholarGoogle ScholarDigital LibraryDigital Library
  180. [180] Zhu Ligeng and Han Song. 2020. Deep leakage from gradients. In Federated Learning. Springer, 1731.Google ScholarGoogle ScholarCross RefCross Ref
  181. [181] Zhu Ligeng, Liu Zhijian, and Han Song. 2019. Deep leakage from gradients. In Advances in Neural Information Processing Systems 32 (NeurIPS’19).Google ScholarGoogle Scholar

Index Terms

  1. Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Computing Surveys
          ACM Computing Surveys  Volume 55, Issue 9
          September 2023
          835 pages
          ISSN:0360-0300
          EISSN:1557-7341
          DOI:10.1145/3567474
          Issue’s Table of Contents

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 16 January 2023
          • Online AM: 6 September 2022
          • Accepted: 8 August 2022
          • Revised: 23 June 2022
          • Received: 14 March 2022
          Published in csur Volume 55, Issue 9

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • survey
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text

        HTML Format

        View this article in HTML Format .

        View HTML Format