Adversarial Node Placement in Decentralized Federated Learning: Maximum Spanning-Centrality Strategy and Performance Analysis

Adam Piaseczny, Eric Ruzomberka, Rohit Parasnis, Christopher G. Brinton

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

—As federated learning (FL) becomes more widespread, there is growing interest in its decentralized variants. Decentralized FL leverages the benefits of fast and energy-efficient device-to-device communications to obviate the need for a central server. However, this opens the door to new security vulnerabilities as well. While FL security has been a popular research topic, the role of adversarial node placement in decentralized FL remains largely unexplored. This article addresses this gap by evaluating the impact of various coordinated adversarial node placement strategies on decentralized FL’s model training performance. We adapt two threads of placement strategies to this context: 1) maximum span-based algorithms and 2) network centrality-based approaches. Building on them, we propose a novel attack strategy, MaxSpAN-FL, which is a hybrid between these paradigms that adjusts node placement probabilistically based on network topology characteristics. Numerical experiments demonstrate that our attack consistently induces the largest degradation in decentralized FL models compared with baseline schemes across various network configurations and numbers of coordinating adversaries. We also provide theoretical support for why eigenvector centrality-based attacks are suboptimal in decentralized FL. Overall, our findings provide valuable insights into the vulnerabilities of decentralized FL systems, setting the stage for future research aimed at developing more secure and robust decentralized FL frameworks.

Original languageEnglish (US)
Pages (from-to)45-60
Number of pages16
JournalIEEE Internet of Things Journal
Volume12
Issue number1
DOIs
StatePublished - 2025
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Keywords

  • Adversarial attacks
  • attacker placement strategy
  • decentralized systems
  • distributed federated learning (FL)
  • network security

Fingerprint

Dive into the research topics of 'Adversarial Node Placement in Decentralized Federated Learning: Maximum Spanning-Centrality Strategy and Performance Analysis'. Together they form a unique fingerprint.

Cite this