Our manuscript introduces sophisticated algorithms within the Defense and Communications Modules to ensure the security, integrity, and efficiency of federated learning conducted by a fleet of aerial vehicles. These algorithms address the challenges posed by adversarial behavior and communication latency in a dynamic environment. This document outlines the methodologies and mathematical formulations used.
The Defense Module mitigates the risk posed by malicious nodes attempting to introduce poisoned models or engage in adversarial behaviors. This module ensures the integrity and security of model updates through a multi-step process.
The module continuously monitors the similarity of model updates, comparing them to the aggregated model from previous rounds and other participants' updates. Any significant deviation from the expected learning trajectory can indicate a potential poisoning attack.
One of the methods used to measure the similarity between model updates is cosine similarity. The cosine similarity between two model update vectors
where:
-
$\mathbf{u} \cdot \mathbf{v}$ is the dot product of the vectors -
$|\mathbf{u}|$ and$|\mathbf{v}|$ are the magnitudes (Euclidean norms) of the vectors
By calculating the cosine similarity, the module can detect deviations in the direction of model updates, which may indicate potential adversarial behavior.
The module evaluates the operational integrity of each aerial vehicle using the following situational awareness metrics:
- Flight Formation: Ensures vehicles maintain their designated positions within the formation, monitoring deviations from the standardized scheme.
- Geopositioning: Real-time geographical location data is analyzed using the Euclidean distance between a vehicle's position and its planned trajectory.
- Interconnection: Communication latency is monitored to detect network disruptions, such as dropped or delayed connections.
- Resource Usage: Tracks computational resources to identify anomalies, such as unusual CPU or memory usage.
The Defense Score
The dynamic weights
The regularization term
where:
-
$\sigma_k^2$ : Variance of the$k$ -th metric -
$\mathcal{M}_{i,k}(t)$ : Observed value of the$k$ -th metric -
$\mathbb{E}[\mathcal{M}_k(t)]$ : Expected value across all vehicles
The Defense Score is compared to a time-evolving threshold
Vehicles are classified as benign or malicious based on:
The Communications Module ensures efficient and reliable communication between aerial vehicles, accounting for dynamic mobility and network conditions.
Communication latency
where:
-
$D_{ij}(t)$ : Distance between vehicles$i$ and$j$ at time$t$ -
$c$ : Propagation speed of the communication signal -
$\Delta_{\text{processing}}$ : Processing delays at the sender and receiver -
$\Delta_{\text{queuing}}$ : Queuing delays due to network congestion
The distance
where
To address mobility-induced communication challenges, we link the decay rate
where:
-
$\gamma_0$ : Base decay rate -
$\kappa$ : Proportionality constant reflecting latency sensitivity -
$L_i(t)$ : Average communication latency for vehicle$i$ :
The weight
This adjustment reduces the influence of the Geopositioning metric when communication conditions deteriorate.
Communication link reliability
where:
-
$\lambda$ : Decay constant for reliability decrease with latency -
$P_{\text{link}}(t)$ : Probability of link stability, influenced by signal-to-noise ratio and environmental factors