Covert Federated Learning Via Intelligent Reflecting Surfaces
Covert Federated Learning Via Intelligent Reflecting Surfaces
Covert Federated Learning Via Intelligent Reflecting Surfaces
Abstract— Over-the-air computation (OAC) is a promising preserving, is regarded as a significant way to realize
technology that can achieve rapid model aggregation by utilizing ubiquitous AI for 6th generation mobile networks (6G) [1],
the wireless waveform superposition feature to harness the [2]. FL is also an emerging technique for edge intelligence
interference of multiple-access channel for wireless federated
learning (FL). However, OAC-based aggregation for OAC faces in wireless access networks because it enables collaboratively
critical security challenges due to unfavorable and wireless training of an AI model for mobile edge computing [3].
broadcast properties, such as privacy leaks and eavesdropping However, since the mobile devices typically access the base
attacks. In this paper, we propose to utilize an intelligent station (BS) equipped with an edge server through an uncertain
reflecting surface (IRS) to support covert OAC-based FL. We first wireless environment, the model parameters aggregated by
derive the optimal condition for covertness in OAC with IRS and
formulate a joint optimization problem to select the maximum BS will be inevitably distorted by fading and additive noise
covert devices participating in the model aggregation while of wireless channel. The limited radio resources also restrict
satisfying the mean squared error (MSE) requirement. We then the number of mobile devices that can access the BS and
design a covert difference-of-convex-functions program (CDC) participate in FL. As the number of mobile devices increases,
to efficiently determine the transmission power of the device, it gives rise to unacceptable latency in the model aggregation
aggregation beamforming of base station (BS), phase shifts, and
reflection amplitudes at the IRS. Simulation results demonstrate process, which is a critical performance bottleneck of FL.
that our proposed approach can achieve significant performance To overcome these challenges, over-the-air computation
gain compared to the baseline algorithms by deploying IRS into (OAC) combines the concurrent data transmission from a
covert OAC-based FL. large number of devices and performs the model aggregation
Index Terms— Over-the-air computation, federated learning, by leveraging the air-wave superposition nature of wireless
covert communication, intelligent reflecting surfaces. broadcast channel [4], [5], [6]. This enables wireless federated
learning (WFL) to achieve the accurate learning performance
I. I NTRODUCTION while meeting lower latency requirements despite the limited
frequency bandwidth [7]. Furthermore, since the BS in
Authorized licensed use limited to: SASI INSTITUTE OF TECHNOLOGY & ENGINEERING. Downloaded on November 21,2023 at 09:37:11 UTC from IEEE Xplore. Restrictions apply.
4592 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 71, NO. 8, AUGUST 2023
transmission but also suppress signals to prevent an attacker better accuracy in simulations compared to other baseline
from detecting malicious signals [18]. The performance gain of algorithms.
IRS-aided covert communications had been examined in [19]. • We formulate an optimization problem to jointly optimize
For a single-user system, the authors in [20] jointly optimized the transmission power of devices, device selection,
the transmitting beamforming of Alice and passive phase shift aggregation beamforming of the BS, IRS reflection
of IRS for maximization of covert rate. Furthermore, in multi- amplitudes, and phase shifts. This is necessary because
user systems, the transmitter beamforming and phase shift at optimizing only the IRS phase shift is suboptimal for
the IRS were jointly designed to maximize the rate of covert covert communications, and setting the IRS amplitudes
communication [21]. to one for covert transmission is not always ideal. The
Meanwhile, the security challenges associated with OAC- formulated problem involves mixed integer programming,
based FL have garnered increasing attention [8], [22], which is hardly tractable due to the integer objective
[23]. One approach to address this issue is to deploy a function and the nonconvex constraints with coupled
friendly jammer to make the signal at the legitimate receiver integral variable and continuous variables that must
stronger than that at the eavesdropper, thereby protecting satisfy both the MSE requirement and covertness
the analog OAC from passive eavesdropping [8]. Another constraint simultaneously.
method involves using receiver noise as a disturbance injected • We design a covert difference-of-convex-functions (CDC)
into the global model aggregated process for OAC to scheme to solve the mixed integer programming problem.
protect model parameters from various privacy attacks [22]. The integer objective function is transformed into a
Additionally, anonymizing the transmitting mobile devices has sparse optimization problem by inducing sparsity in the
been proposed as a means of enhancing the privacy of the selected devices. To handle the covertness constraint and
OAC system in the WFL scenario [23]. Yet, research on IRS- MSE requirement using matrix lifting, we transform them
assisted secure OAC for FL systems is limited, particularly for into rank-one constraints belonging to the semidefinite
IRS-assisted covert OAC. This paper aims to address this gap program. Then, the semidefinite programming problem is
by exploring the benefits of using an IRS to boost covert OAC converted into CDC programming problems, which can
for FL. In an IRS-aided covert OAC for FL system, the IRS be effectively tackled with the alternating optimization
can reflect the desired signals in phase at the BS to enhance method. Simulation results illustrate that our proposed
the signals to boost the model aggregated accuracy, referred CDC approach can obtain significant performance gains
to as wireless model aggregation strengthens. Additionally, compared to other algorithms in an IRS-aided covert
unwanted signals received by attackers can be suppressed by OAC-based FL system.
reflecting them in the opposite phase, regarded as wireless The remainder of the article is organized as follows.
model aggregation leaks. However, it is vitally challenging Section II describes the system model. Section III presents
to achieve the trade-off between enhancing the signal of the problem formulation and optimal covertness OAC condition.
legitimate receiver and deteriorating the detection signal of Section IV outlines a two-step framework for transforming the
the attacker. It has been proved that the IRS’s amplitudes formulated problem. In section V, we design an alternating
should be designed optimally together with the phase shifts; covert DC algorithm to solve the transformed problem.
otherwise, it can result in performance loss for covert Section VI presents our analysis and simulation results.
communication [24]. Our work fills this gap and provides Finally, we conclude the article in Section VII.
new guides on IRS optimization for covert OAC-based FL Notations: Rk×n and Ck×n represent the k × n complex
systems. We jointly optimize the device’s transmission power, space. R[·] expresses the real component of a complex number.
the number of devices selected, the aggregation beamformer E[·] represents the statistical expectation. The operators (·)T ,
of BS, the phase shift, and the reflecting amplitude of IRS (·)H , T r(·), and diag(·) represent the transpose, Hermitian
to improve the performance of the covert OAC-based FL transpose, trace, and diagonal matrix, respectively. The
system. In the future, our work can be extended to NOMA operators | · |, ∥ · ∥, ∥ · ∥2 , and ∥ · ∥F express the absolute
network [25], imperfect channel state information (CSI) [26] value, Euclidean norm, spectral norm, and Frobenius norm,
and multi-antenna case for the user and Willie [27] in an IRS- respectively.
aided covert FL system. The main contributions of our work
II. S YSTEM M ODEL
are summarized as follows:
• We propose an IRS-aided covert OAC framework that With the IRS-assisted, we investigate a joint computation
can efficiently and securely aggregate models in WFL and communication design for a rapid and secure model
systems. We first derive the optimal covertness OAC aggregated in an OAC-based covert FL system. The system
condition for IRS-assisted WFL systems with available comprises a BS with M -antennas, I single-antenna users, and
CSI. By deploying an IRS, more users can participate an IRS with N passive reflection elements. A warden Willie,
in covert OAC-based FL under the MSE requirement equipped with a single antenna, continuously tries to detect
and covertness level, preventing model parameters from the existence of the aggregation, as illustrated in Figure 1.
leaking information in the aggregation process and
achieving higher accuracy and lower loss in the FL A. IRS-Assisted OAC-Based FL
system. Our proposed approach ensures OAC-based FL In this paper, we take into account IRS-aided OAC as the
secure aggregation resulting in faster convergence and model aggregating method to train a global model for FL.
Authorized licensed use limited to: SASI INSTITUTE OF TECHNOLOGY & ENGINEERING. Downloaded on November 21,2023 at 09:37:11 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: COVERT FEDERATED LEARNING VIA INTELLIGENT REFLECTING SURFACES 4593
i
β
σ 2 ∥a∥2
+ √ . (5)
β
Fig. 1. The IRS-assisted OAC-based covert FL system. Here, the transmitting symbols follow an independent and
normal distribution with unit variance, i.e., E(|xi |2 ) = 1.
OAC [16], regarded as a function of uplink NOMA technology, Thus, we have the transmit power of device i being limited
is used to effectively promote the model aggregated from by E(|pi xi |2 ) = |pi |2 ≤ P0 .
distributed devices for the FL system. Suppose that the device i B. IRS-Assisted Covert OAC
pre-processes function ϕi (z) = z, and then the post-processes
1 For the covert OAC-based FL system, we consider a finite
function at the BS ψi (z) = |I| z. Afterward, the BS aggregates
number of channel L as delay-constrained covert, which means
the target function of the model, which is shown as
X that in some low delay applications the block length should
z = ψ( ϕi (z i )), (1) be limited with delay constraints. OAC can be regarded as
i∈I NOMA [16], and we assume that the CSI is available for
where I denotes the set of devices participating in FL. Before willie so that willie can identify one of the signals of all
the target function ϕi (·) is calculated at the BS, target-function users, which is considered due to the fact that the willie
variable s should be collected as can detect the existence of transmission of OAC. Specifically,
X the channel gain between i-th user-to-Willie is denoted as
x= xi and xi = ϕi (z i ), i ∈ I, (2) hiw , and the channel gain between IRS-to-Willie is denoted
i∈I as hH rw , where Willie has a single antenna. In our paper,
where xi ∈ C denotes the transmit symbol pre-processed by we assume that Willie is a legitimate user in considered
the device i. system so that the Willie can obtain the accuracy CSI, but
We use hib ∈ CM , hir ∈ CN , and hH rb ∈ C
M ×N Willie in the system is poisoned into malicious user as
to represent the channel gain for i-th device-to-BS, i- eavesdroppers. Thus, we can characterize the fundamental
th device-to-IRS, and the IRS-to-BS. We assume that performance gain that can be achieved by IRS in the context
the channel conditions are flat and slowly varying within of covert communications. The Willie detects an existence of
one transmission slot. Furthermore, since various channel the transmission by distinguishing the following hypotheses:
estimation schemes have been proposed for IRS-aided wireless (
nw [k], H0 ,
transmission [28], [29], we can assume that the perfect yw [k] = (6)
CSI can be available, as in [7], [13], and [16]. We use (hH
rw Θhir + hib )pi xi [k] + nw [k], H1 ,
Θ = diag(ρ1 ejθ1 , ρ2 ejθ2 , . . . , ρN ejθN ) to represent the IRS’s where yw [k] denotes the signal received by Willie for k-
diagonal reflecting matrix, where ρn ∈ [0, 1] denotes reflecting th channel use, H0 represents the null hypothesis that the
amplitude, and θn ∈ [0, 2π) denotes the phase shift by the n-th device cannot send information, H1 represents the alternative
element of IRS, n = 1, 2, . . . , N , respectively. hypothesis that the device sends information to aggregate at
With reflecting signals of the IRS, the signal received by the BS, pi denotes the i-th user transmission power and nw
the BS can be obtained from denotes the GWN with mean 0 and variance δw 2
. Thus, we can
obtain the false alarm rate P r{D1 |H0 } and the miss detection
X
y= (hHrb Θhir + hib )pi xi + n, (3)
i∈I
rate P r{D0 |H1 } at Willie, where D1 and D0 denote the events
whether the device is transmitting or not. So, the detection
where pi ∈ C denotes the i-th device’s transmit power and error probability at Willie is computed by
n denotes the Gaussian white noise (GWN), which is n ∼
CN (0, σ 2 I). ξ = P r{D1 |H0 } + P r{D0 |H1 }. (7)
With the aggregation beamforming a ∈ CM at the BS, the Willie aims to minimize the detected error probability ξ to
target function ahead of postprocessing is estimated by identify the existing transmission of OAC. The optimal ξ is
1 the test of likelihood-ratio, which can be represented by
x̂ = √ aH y
β L
Y
1 HX H 1 P1 = f (yw [k]|H1 ) ≥ 1, ∀k ∈ D1 ,
=√ a (hrb Θhir + hib )pi xi + √ aH n, (4)
β i∈I
β k=1
L
where β represents the parameter used for denoise. Thus, the
Y
P0 = f (yw [k]|H0 ) ≤ 1, ∀k ∈ D0 , (8)
global aggregation model at the BS can be obtained using the k=1
Authorized licensed use limited to: SASI INSTITUTE OF TECHNOLOGY & ENGINEERING. Downloaded on November 21,2023 at 09:37:11 UTC from IEEE Xplore. Restrictions apply.
4594 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 71, NO. 8, AUGUST 2023
where P0 and P1 denote the likelihood detection at Willie Before we address the optimization problem of the passive
with L wireless channel usage with H0 and H1 , respectively. beamforming of IRS, we analyze the optimal covertness OAC,
2
We use f (yw [k]|H0 ) = CN (0, δw ) and f (yw [k]|H1 ) = which can be referred to D(P0 ∥P1 ) = 0 and the minimum
2 H 2 2
CN (0, pi |hrw Θhir + hiw | + δw ) to express the likelihood error of the aggregation signal min M SE, especially for non-
detection of yw with H0 and H1 , respectively. Under H0 , the zero transmit power of the device. However, achieving the
receive signal at Willie consists of AWGN only and then the perfect covertness OAC is impossible without an IRS with
likelihood function of y w can be obtained by finite blocklength, since the channel between each device and
L Willie without IRS is SISO, making zero forcing impossible.
Y
f (y w |H0 ) = f (yw [k]|H0 )
k=1 A. Optimal Covertness OAC With Perfect CSI
PL 2
1 k=1 |yw [k]| Proposition 1: If the transmission power of the device is
= 2 )L
exp(− 2
) (9)
(πδw δw non zero in the IRS-assisted OAC-based FLP system, if and only
N
Under H1 , the likelihood function of yw can be obtained if the channel condition should satisfy as n=1 |gn | ≥ |hiw |
by to obtain the optimal covert OAC by designing properly IRS
L
reflect elements, where gn denotes the n-th element of g =
diag(hH rw )hir . The optimal covert OAC can be guaranteed
Y
f (y w |H1 ) = f (yw [k]|H1 ) 2 2
Authorized licensed use limited to: SASI INSTITUTE OF TECHNOLOGY & ENGINEERING. Downloaded on November 21,2023 at 09:37:11 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: COVERT FEDERATED LEARNING VIA INTELLIGENT REFLECTING SURFACES 4595
Authorized licensed use limited to: SASI INSTITUTE OF TECHNOLOGY & ENGINEERING. Downloaded on November 21,2023 at 09:37:11 UTC from IEEE Xplore. Restrictions apply.
4596 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 71, NO. 8, AUGUST 2023
1) The covert priority of devices selected: In this Proof : The detailed proof is provided in Appendix B.
subproblem, we alternately optimize variables (s, a, pi ) and Θ With (22) and (23), we can divide problems P1 into
for problem P1 . Firstly, we fix the reflect beamforming matrix problems P1,1 and P1,2 by the convex rearranged and the
Θ, and then the problem P1 is represented as matrix lifting method [35]. By defining A = aaH , problem
min ∥s∥1 (17) can be recast P1,1 as follows:
s,a,pi
s.t. (14b), (14c), (14d), (14f ). (17) P1,1 min ∥s∥1 (24a)
s,A,p,U
We first note that the term |hH 2 s.t. T r(A) − γT r(AH i ) ≤ si , ∀i ∈ J , (24b)
rw Θhir + hiw | for
the nonconvex covertness constraint (14c) is equivalently T r(Qi U i ) T r(Qi U i )
(1 + 2
)ln(1 + 2
)
transformed to σw σw
v H gg H v + 2Re(v H gh∗iw t) + |hiw |2 |t|2 , ∀i ∈ J , (18) 2ϵ2 T r(Qi U i ) 2ϵ2
−(1 + ) 2
≤ , ∀i ∈ J , (24c)
L σw L
where g = diag(h)H
rw hir
and v = [v1 , v2 , . . . , vN ], vn = T r(A) ≥ 1, A ⪰ 0, rank(A) = 1, (24d)
ρn e−jθn . The auxiliary variable t satisfies |t|2 = 1. hiw 2
is scalar, which means that the device and Willie are both |pi | ≤ P0 , U n,n ≤ p2i , U N +1,N +1 = p2i ,
configured with one antenna. Furthermore, if we set di = hiw , U ⪰ 0, rank(U ) = 1, ∀i ∈ J , (24e)
then (18) is rewritten as a quadratic form eH Ge, where where H i = hi hH and hi = hH
i rb Θhir
+ hib .
gi gH H
e = [v, t]T , Qi = i g i di For variables s and a, problem P1 can be simplified into a
H . (19)
di g H
i di di feasible identified problem of reflect beamforming matrix Θ.
In fact, (14c) and (14e) can be further rewritten as follows: By defining v = [ρejθ1 , . . . , ρejθN ]T , bH H H
i = a hrb diag(hir )
H
and ci = a hib , the problem P1 is recast as
p2i eH Qi e p2i eH Qi e 2ϵ2
ln(1 + ) − ≤ , ∀i ∈ J , Solve v (25a)
2
σw p2i eH Qi e + σw2 L
2 H 2
|en | ≤ 1, ∀n = 1, 2, . . . , N, s.t. ∥a∥ − γ|b v + ci | ≤ si , ∀i ∈ J , (25b)
|eN +1 | = 1. (20) uH Q ui uH Q ui 2ϵ2
ln(1 + i 2 i ) − H i i 2
≤ , ∀i ∈ J ,
σw ui Q i ui + σw L
It is obvious that vt is also the optimal result for the original
P1 when e is the optimal result for P1 . However, it is still hard (25c)
to solve P1 because the power pi of the device is coupled with where solve v represent the feasible set of reflection
the reflect beamforming e of IRS in the covertness constraint amplitudes and phase shifts at the IRS as follows
(20). Especially, pi is a scalar variable with |pi |2 ≤ P0 in
(14f), which allows us to simplify (20) as |vn | ≤ 1, ∀n ∈ 1, . . . , N . (25d)
T
uH uH 2ϵ2 Since we have e = [v, t] in (19). The constraint (25b) is
i Qi ui i Qi ui
ln(1 + ) − ≤ , ∀i ∈ J , further recast as
2
σw uH 2
i Q i ui + σw L
|pi |2 ≤ P0 , ∀i ∈ J , ∥a∥2 − γ(eH S i e) ≤ si , ∀i ∈ J
|un | ≤ pi , ∀n = 1, 2, . . . N, (26)
|uN +1 | = pi .∀i ∈ J (21) where
bi bH
where ui = pi e. With the non-convex constraint (21), it is i b i ci
Si = H 2 . (27)
generally difficult to handle P1 directly [34]. Nevertheless, cH
i bi |ci |
we set U i = ui uH i , the constraint (21) is represented as To facilitate the development of the problem, we set V = eeH
2 by lifting e with rank(V ) = 1 by a positive semidefinite matrix
T r(Qi U i ) T r(Qi U i ) 2ϵ
ln(1 + 2
)− 2
≤ , lifting. Problem (25) is transformed into the optimization
σw T r(Qi U i ) + σw L
|pi |2 ≤ P0 , ∀i ∈ J , problem with a low rank matrix:
U n,n ≤ p2i , ∀n = 1, 2, . . . , N, P1,2 : Solve V (28a)
U N +1,N +1 = p2i , ∀i ∈ J 2
s.t.∥a∥ − γT r(S i V ) ≤ si , ∀i ∈ J (28b)
U ⪰ 0, 2 2
p T r(Qi V ) p T r(Qi V )
rank(U ) = 1. (22) (1 + i 2
)ln(1 + i 2
)
σw σw
Proposition 2: The covertness constraint in (22) is rearranged 2ϵ2 p2i T r(Qi V ) 2ϵ2
into a convex constraint with U , which is described as − (1 + ) 2
≤ , ∀i ∈ J (28c)
L σw L
T r(Qi U i ) T r(Qi U i ) V n,n ≤ 1, ∀n ∈ 1, . . . , N + 1; V ⪰ 0; rank(V ) = 1. (28d)
(1 + 2
)ln(1 + 2
)
σw σw
2) Maximum covert device set for minimized MSE: On
2ϵ2 T r(Qi U i ) 2ϵ2 the other hand, we can reformulated problem P2 with
− (1 + ) 2
≤ , ∀i ∈ J . (23)
L σw L Proposition 3.
Authorized licensed use limited to: SASI INSTITUTE OF TECHNOLOGY & ENGINEERING. Downloaded on November 21,2023 at 09:37:11 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: COVERT FEDERATED LEARNING VIA INTELLIGENT REFLECTING SURFACES 4597
s.t. |aH hi |2 ≥ 1, (30b) method. The solution obtained from SDR method fails to
satisfy the rank one constraint, so a suboptimal solution can be
|pi g i |2 |pi g i |2 2ϵ2 obtained by the Gaussian randomization. As the scale of the
ln(1 + 2
)− 2 2
≤ . (30c)
σw |pi g i | + σw L problem grows, especially for a large number of antennas and
|pi |2 ≤ P0 , ∀i ∈ J , (30d) number of reflection elements in our problem, the SDR with
Gaussian randomization fails to meet the rank one constraint
where hi = hH H
rb Θhir + hib , g i = diag(h)rw hir . in high probability. Therefore, we incorporate the covertness
H
With pi = pi g i and P i = pp , we transform (30) into the constraint into the DC programming and propose a novel
following problems P2,1 and P2,2 with low-rank matrix: covert DC scheme for handling the rank one constraint and
covertness constraint in the next section.
P2.1 : min T r(A) (31a)
A,P
V. S OLVING THE C ONVERTED O PTIMIZATION P ROBLEM
s.t. T r(AHi ) ≥ 1, ∀i ∈ I [j] , (31b)
In this section, we design a covert alternating DC scheme
T r(P i ) T r(P i ) that incorporates the rank one constraint and covertness
(1 + 2
)ln(1 + 2
)
σw σw constraint to solve P1,1 , P1,2 , P2,1 , and P2,2 and obtain the
2ϵ2 T r(P i ) 2ϵ2 solution of problem P for the IRS-aided covert OAC-based
− (1 + ) 2
≤ , ∀i ∈ I [j] (31c)
L σw L FL system.
A ⪰ 0, rank(A) = 1, (31d)
A. DC Forumulation and Scheme
P i ≤ P0 Gi , P ⪰ 0, rank(P ) = 1, ∀i ∈ I [j] . It is very important to detect the rank-one constraint in
(31e) nonconvex quadratic constraint for our covert OAC-based FL
On the other hand, given the transmission power of device framework with device selection. The rank one constraint
I
pi and the aggregation beamforming vector a, we have for matrix A ∈ Ca×a is rewritten as ||σi (A)i=1 ||0 = 1,
where σi (A) represents the largest singular value in matrix
Solve v (32a) A. In addition, if we
PAdenote the trace norm and the spectral
H 2
s.t.|b v + ci | ≥ 1, ∀i ∈ I , [j]
(32b) norm as T r(A) = i=1 σi (A) and ||A||2 = σ(A), then we
H 2 H 2 obtain rank(A) = 1 ⇔ T r(A)−||A||2 = 0 with T r(A) ≥ 0.
|g v + di | |g v + di |
(1 + )ln(1 + ) Thus, we handle rank one constraint with DC penalty. The
2
σw σw2 ′
DC expression of problem P1,1 can be described as
2ϵ2 |g H v + di |2 2ϵ2
− (1 + ) 2
≤ , ∀i ∈ I [j] (32c) ′
P1,1 : min ||s||1 + α(T r(A) − ||A||2 )
L σw L s,A,p,U
|vn | ≤ 1, ∀n ∈ 1, . . . , N . (32d) + β(T r(U ) − ||U ||2 ) (34a)
Furthermore, the low-rank matrix problem of (32) can be s.t. T r(A) − γT r(AH i ) ≤ si , ∀i ∈ I, (34b)
obtained by T r(U Gi ) T r(U Gi )
(1 + 2
)ln(1 + 2
)
σw σw
P2.2 : Solve V (33a) 2ϵ2 T r(U Gi ) 2ϵ2
[j] − (1 + ) ≤ , ∀i ∈ I (34c)
s.t.T r(S i V ) ≥ 1, ∀i ∈ I , (33b) L σw2 L
Authorized licensed use limited to: SASI INSTITUTE OF TECHNOLOGY & ENGINEERING. Downloaded on November 21,2023 at 09:37:11 UTC from IEEE Xplore. Restrictions apply.
4598 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 71, NO. 8, AUGUST 2023
Authorized licensed use limited to: SASI INSTITUTE OF TECHNOLOGY & ENGINEERING. Downloaded on November 21,2023 at 09:37:11 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: COVERT FEDERATED LEARNING VIA INTELLIGENT REFLECTING SURFACES 4599
Authorized licensed use limited to: SASI INSTITUTE OF TECHNOLOGY & ENGINEERING. Downloaded on November 21,2023 at 09:37:11 UTC from IEEE Xplore. Restrictions apply.
4600 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 71, NO. 8, AUGUST 2023
Fig. 5. The average selected devices varying with MSE requirment under
the two covertness levels (a) ϵ = 0.1 and (b) ϵ = 0.01.
Authorized licensed use limited to: SASI INSTITUTE OF TECHNOLOGY & ENGINEERING. Downloaded on November 21,2023 at 09:37:11 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: COVERT FEDERATED LEARNING VIA INTELLIGENT REFLECTING SURFACES 4601
Fig. 8. (a) The channel power received by Willie varying with the number of
Fig. 6. The average selected devices varying with the number of BS’s reflection elements of IRS with ϵ = 0.1 and (b) Average number of selected
antennas under two covertness levels (a) ϵ = 0.1 and (b) ϵ = 0.01. devices varying with IRS horizontal locations with ϵ = 0.01.
Authorized licensed use limited to: SASI INSTITUTE OF TECHNOLOGY & ENGINEERING. Downloaded on November 21,2023 at 09:37:11 UTC from IEEE Xplore. Restrictions apply.
4602 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 71, NO. 8, AUGUST 2023
and Figure 6-8 shows the secrecy rate OAC is more sensitivity and β = P0 mini∈I |aH (hH 2
rb Θhir + hib )| , we have the
σ 2 ∥a∥2
than the covert OAC scheme with respect to the location of minimum M SE(x̂, x) = β , which can be written as
IRS. σ2 ∥a∥2
M SE(x̂, x) = P0 maxi∈I |aH (hH 2. Since the p∗i is
rb Θhir +hib )|
D. Federated Learning Performance of Our Proposed not equal to zero, we only focus on the equation |hH rw Θhir +
Approach hiw |2 = 0, which is rewritten as |v H g + hiw |2 = 0, where
v = [v1 , v2 , . . . , vN ]T and vn P
= ρn ejθn , ∀n. Furthermore,
In order to illustrate the effectiveness of our proposed covert N
H 2
it follows that |v g + hiw | = | n=1 ρn |gn |ej(arg(gn +θn )) +
DC scheme with devices selection in distributed OAC-based
|hiw |ejarg(hiw ) |2 = 0. The sum of real and imaginary parts
FL, the CIFAR-10 dataset is employed to train a classifier
for the first term and second termPshould be equal to zero.
using support vector machine (SVM) [37]. In this simulation, N
θ can ensure the opposite of the n=1 ρn |gn |ej(arg(gn +θn ))
the size of training sets is 50000 and the size of the test sets is N
and |hiw |ejarg(hiw ) , and when
P
10000. Furthermore, the local data sets of devices are followed PN n=1 |gn | ≥ |hiw | and
uniform and non-independent and identically distributed (non- ρn ∈ [0, 1], we can obtain n=1 ρn |gn | = |haw |. Thus the
IID). After running 20 times realization, the average results reflecting amplitude ρ and phase shift θn always exist to enable
of training loss and test accuracy for different schemes are D(P0 ∥P1 ) = 0.
demonstrated in Figure 9. The training loss obtained from loss
function with the input-output data pair shows the convergence A PPENDIX B
of various user selection schemes. The prediction accuracy P ROOF OF P ROPOSITION 2
is given by the ratio of the number of correct predictions The first term of (23) is reexpressed with
to the size of test set. We observe that the proposed covert
T r(QU ) T r(QU )
DC scheme can achieve the lowest loss and highest accuracy f (U ) = (1 + )ln(1 + ). (46)
2
σw 2
σw
compared to the other methods since it selects much more
devices, enabling larger data sets to be used in FL while The affine transformation xln(x) can be a convex function
keeping the covert OAC in fewer communication rounds. of x when x ≥ 0 [32], so f (U ) is convex for U with
VII. C ONCLUSION Q ⪰ 0 and U ⪰ 0. In addition, the second term of (23)
is a linear function of U .
In this paper, we have presented a novel IRS-aided covert
OAC framework for achieving fast and highly secure model
A PPENDIX C
aggregation in FL systems. Our approach relies on the
P ROOF OF P ROPOSITION 3
condition that the channel gain of the reflected wireless
link should be greater than that of the direct wireless link, We assume that θ = min |aH (hH 2
rb Θhir + hib )| , then
i
which we have proven. To enable a larger number of devices the problem P2 can represent equivalently the following
Authorized licensed use limited to: SASI INSTITUTE OF TECHNOLOGY & ENGINEERING. Downloaded on November 21,2023 at 09:37:11 UTC from IEEE Xplore. Restrictions apply.
ZHENG et al.: COVERT FEDERATED LEARNING VIA INTELLIGENT REFLECTING SURFACES 4603
Authorized licensed use limited to: SASI INSTITUTE OF TECHNOLOGY & ENGINEERING. Downloaded on November 21,2023 at 09:37:11 UTC from IEEE Xplore. Restrictions apply.
4604 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 71, NO. 8, AUGUST 2023
[40] K. Cumanan, Z. Ding, B. Sharif, G. Y. Tian, and K. K. Leung, “Secrecy Jiawen Kang received the Ph.D. degree from
rate optimizations for a MIMO secrecy channel with a multiple-antenna the Guangdong University of Technology, China,
eavesdropper,” IEEE Trans. Veh. Technol., vol. 63, no. 4, pp. 1678–1690, in 2018. He was a Post-Doctoral Researcher
May 2014. with Nanyang Technological University, Singapore,
[41] G. Zhu, Y. Du, D. Gunduz, and K. Huang, “One-bit over-the-air from 2018 to 2021. He is currently a Full Professor
aggregation for communication-efficient federated edge learning: Design with the Guangdong University of Technology. His
and convergence analysis,” IEEE Trans. Wireless Commun., vol. 20, research interests include blockchain, security, and
no. 3, pp. 2120–2135, Mar. 2021. privacy protection in wireless communications and
networking.
Authorized licensed use limited to: SASI INSTITUTE OF TECHNOLOGY & ENGINEERING. Downloaded on November 21,2023 at 09:37:11 UTC from IEEE Xplore. Restrictions apply.