Abstract
Objective
This study aims to develop a lightweight convolutional neural network-based edge federated learning architecture for COVID-19 detection using X-ray images, aiming to minimize computational cost, latency, and bandwidth requirements while preserving patient privacy.
Method
The proposed method uses an edge federated learning architecture to optimize task allocation and execution. Unlike in traditional edge networks where requests from fixed nodes are handled by nearby edge devices or remote clouds, the proposed model uses an intelligent broker within the federation to assess member edge cloudlets' parameters, such as resources and hop count, to make optimal decisions for task offloading. This approach enhances performance and privacy by placing tasks in closer proximity to the user. DenseNet is used for model training, with a depth of 60 and 357,482 parameters. This resource-aware distributed approach optimizes computing resource utilization within the edge-federated learning architecture.
Results
The experimental results demonstrate significant improvements in various performance metrics. The proposed method reduces training time by 53.1%, optimizes CPU and memory utilization by 17.5% and 33.6%, and maintains accurate COVID-19 detection capabilities without compromising the F1 score, demonstrating the efficiency and effectiveness of the lightweight convolutional neural network-based edge federated learning architecture.
Conclusion
Existing studies predominantly concentrate on either privacy and accuracy or load balancing and energy optimization, with limited emphasis on training time. The proposed approach offers a comprehensive performance-centric solution that simultaneously addresses privacy, load balancing, and energy optimization while reducing training time, providing a more holistic and balanced solution for optimal system performance.
Introduction
Artificial intelligence (AI) is revolutionizing several emerging solutions to automate the healthcare sector. The advancements in healthcare automation have attracted many researchers to propose cost-efficient and high accuracy providing solutions such as automatic diagnosis, disease detection, prediction, bioinformatics, etc. Similarly, several solutions have been proposed for COVID-19 detection using X-ray images. However, algorithms used in such solutions often require high computational resources and consume a substantial amount of energy. 1 The existing solutions implement a variety of hybrid deep-learning (DL) algorithms to detect COVID-19 using X-ray images. Promising results are reported in several studies but complex DL algorithms require additional computational resources and the time to train such algorithms is also high.2–4 The computation scarcity challenge is addressed by placing the DL models and X-ray images on the cloud6–10 but this results in many concerns such as data privacy, network latency, and additional bandwidth requirements. Additionally, a solution implementing localized model training and sharing the model at a global level without compromising data privacy is the need of the hour.
The proposed work is focused on distributing the computational requirement among several machines available to the user in closer proximity as edge nodes. 11 The concept of the federation in cloud computing is entirely different from the concept of edge federation. The edge federated model is based on a central brokerage system and considers the closer proximity edge devices where the broker also resides at the edge. 12 The broker is responsible for maintaining the information of all the edge nodes. The broker allocates the tasks to edge nodes based on available resources on the edge nodes. These edge nodes in return send the results of the assigned task to the broker for the aggregation of the results.
The proposed approach is divided into a three-tier federated learning (FL) architecture, where the first layer comprises clients that send data to the nearest fixed node in the second layer. After receiving the data in the form of chest X-ray images13,14 of the patients from the clients and the updated convolutional neural network (CNN) from the broker, the fixed nodes start model training. The extracted features from each client are sent to the edge nodes on the third layer. These edge nodes then aggregate the results using an artificial neural network (ANN) and send the results to the broker to update the aggregated model. However, during feature extraction or model training, if any node faces a resource scarcity issue, the node can request the broker to find the nearest node within the federation to offload the task. To the best of the authors’ knowledge, no technique targets resource sharing and load balancing, training time, and privacy altogether, without compromising accuracy. The concept of the edge-based federation has also not been reported in the literature for distributed DL problems. The major contributions of the proposed work are as follows:
Novel lightweight CNN-based edge FL architecture: The proposed architecture, combining lightweight CNNs with edge FL for COVID-19 detection using chest X-rays, presents a novel approach to address the challenges of cloud deployment. This novel architecture focuses on minimizing computational costs, reducing latency, and optimizing bandwidth requirements, thus offering a unique solution in the field. Enhanced privacy preservation in edge FL: The approach introduces an innovative method to preserve patient privacy by enabling multiple clients, such as hospitals, to collaboratively train the model without sharing their local data. This novel privacy-preserving technique ensures data confidentiality while allowing for effective model training, which is particularly important in healthcare settings.
Related work
Multiple studies on FL have been reported in the literature that focus on the utilization of resources, security, privacy, and energy efficiency. The dispersed FL (DFL) proposed in Khan et al. 15 minimizes the FL cost by using an integer linear optimization approach for DFL and dividing the problem into two sub-problems. The first problem is resource allocation and association, while the second problem is the relaxation of association and allocation problems, which are converted into convex optimization problems. The proposed algorithm works iteratively to resolve the variable of association and compute the second variable of resource allocation. The algorithm runs iterations till the optimization of resources is complete. While keeping in view resource utilization, privacy is also a big issue that is resolved using privacy-enhanced FL (PEFL) in Hao et al. 16 The privacy enhancement using FL is initiated to allow the participants to share models without sharing their local data. Despite that the parameters must still be shared, posing a risk to privacy in different industries such as robotics, auto-driving, navigation, etc. As a solution, this study introduces the factor of encryption for sharing the parameters. The data is trained on the local machine after which the encrypted parameters are shared with other participants using a public–private key pair.
The application of FL in internet of things (IoT)-based applications is gaining popularity recently. The scheme proposed in Khan et al. 17 uses the Stackelberg game based on an incentive model for active participation in the model training by the members. The study uses edge networks for the implementation of a federation. The impact of dependent and identically distributed device data is reduced by assigning higher weights to devices with lower capacities to increase the efficiency of the algorithm. An energy optimization scheme, based on fifth generation plus (5G+) technology is proposed in Shi et al. 18 that employs software and hardware-based solutions at the edge networks. High energy consumption is the main obstacle to 5G+ technology. The scheme works by examining different energy consumption models for graphical processing units and wireless transmission. The energy-efficient techniques such as weight quantization, pruning, and gradient sparsification are used for the selection of an optimized model.
FL-based camouflage learning is proposed in Sigg et al. 19 that can be implemented using multiple deep learning (DL) approaches to secure privacy. The proposed approach avoids the sharing of models and data to preserve privacy. The scheme is simulated using camouflage learning on an IoT application that is equipped with the ability to sense light, temperature, and humidity. 20 The data is scaled based on the maximum and minimum sensed values. These values are averaged over 60 s intervals and sent to the coordinator to train a logistic regression model with a learning rate of 0.8 to achieve maximum accuracy.
A training algorithm named FedGKT (Group Knowledge Transfer) is proposed in He et al., 21 which suggests that scaling up the CNN can achieve better accuracy. When FL produces the load on the edge nodes, the FedGKT minimizes the load of CNN from the edge devices and transfers this load toward the consolidated servers by converting it into a single framework. The model is trained based on residual network (ResNet) 22 variant ResNet-56 and ResNet-110 based on different datasets (CIFAR-10), 23 CIFAR-100, and CINIC-10 24 ). The study claims to take 9 to 17 times less computation power as compared to FedAvg 25 and also needs 54 to 105 times lesser parameters than in an edge CNN.
In the medical field, X-rays and computed tomography (CT) scans are easy and less costly resources to extract patient information for diagnosis. FL is also applied in the medical field to look for various anomalies such as abnormal growth in the lungs. 26 The authors proposed a decentralized approach to improve privacy that consists of two models. The first model detects the occurrence of nodules, while the second model confirms its presence. Experimental results show that the proposed approach achieves a higher accuracy as compared to traditional models. Privacy is a big concern in using medical images of patients. A novel approach is proposed in Grama et al. 27 that is robust and has higher accuracy. It also detects and blocks malicious nodes that send bad model updates. The proposed approaches thus help in the reduction of computational and communication burdens and privacy concerns. The trials are run with two healthcare datasets for the diagnosis and classification of the data. From the two datasets, each dataset is trained using three different FL approaches to avoid any malicious activity. Experimental results show that the best robustness is achieved by the Byzantine-robust aggregation keeping the differential privacy intact.
Secure multiparty computation (SMC) is conventionally used in FL, which is susceptible to differential privacy and achieves lower accuracy against the data distributed among different parties. A novel approach is proposed in Truex et al. 28 to gain equilibrium in SMC and differential privacy. The hybrid of SMC and differential privacy results in the reduction of noise injection (adding noise artificially to the ANN input data during the training process) as multiple parties carry out the training process. A variety of DL algorithms is trained using the given technique providing better results in terms of accuracy and privacy. For warfighting, techniques are developed to carry out activities such as contesting, breaching, breaking, and exploiting opponents under the multi-domain operations (MDO) Joint Force. When AI techniques are implemented several challenges arise such as data infection, noise, and partial or full errors that can benefit the opponent. FL is a technique that does not require any sharing of data and trains the model in a collaborative environment. The collaborative environment built on Tactical Edge 29 and FL is implemented in MDO using six different AI strategies addressing the above-mentioned challenges. Table 1 shows a comparative analysis of the discussed techniques considering privacy, accuracy, training time, load balancing, and energy.
Comparative overview of the discussed works.
DFL: dispersed federated learning; PEFL: privacy-enhanced federated learning; IoT: internet of things; 5G: fifth generation; CT: computed tomography; SMC: secure multiparty computation; MDO: multi-domain operations.
The literature review highlights that most of the existing studies focus on privacy and accuracy, and only a few studies focus on load balancing and energy optimization while no study targets training time which is the focus of this study.
Edge federation-based lightweight DL approach
Figure 1 shows the architecture of the proposed edge federation-based DL approach. In edge federation, clients receive services from the nearest edge devices in the federation without worrying about the delay in data transfer. The broker in the federation manages all the edge federation operations such as the management of resources, optimal placement, model sharing, and migration decisions. Other responsibilities of the broker include receiving and sharing resource information with all the edge nodes in the federation to carry out decision-making. In case of resource scarcity at an edge node, a request is forwarded to the broker to find a node in the federation with adequate resources. The broker evaluates the optimal edge concerning the proximity and available resources. If somehow the broker is not working, any edge node can use the local information matrix previously pushed by the broker thus eliminating the chances of failure. 1 Next, the task is offloaded from the connected node to the optimal edge node. The task can be offloaded in the form of workload, code, or virtual machine. In this study, we are considering the task bundled as a virtual machine. After that, the client and the fixed node communicate for the training of the model. The model lending task is requested from the broker which is responsible for the optimal DL model placement. This process is independent of the platform, programmer, or underlying infrastructure. If in the worst case, the required resources are not available in the federation, the request is forwarded to the cloud.

Edge federation-based lightweight deep learning (DL) approach.
As shown in Figure 1, clients
Problem formulation
Let
The immediate edge node has the required resources available, The immediate edge node is unable to fulfill the requirements, and resources from other neighboring edge nodes are borrowed using edge federation, and Neither the immediate edge node nor the federation possesses adequate resources to fulfill the requirement and hence the request is forwarded to the cloud.
The last case is considered the worst-case scenario. All the notations used in the system setup are shown in Table 2.
Table of notations.
The condition for the eligible node is as follows:

Communication flow between nodes.
Resource aware distributed approach
In a traditional edge network, the request of the fixed node is resolved by the connected nearby edge device, or it is sent to the remote cloud for execution. In the proposed edge federation model, the broker within the federation makes the optimal decision for task offloading to provide the optimal edge node. This decision is based on the current parameters of the member edge cloudlets received at the broker such as available resources and hop count since the objective is to place the task in closer proximity to the user, as shown in Algorithm ??. The main objective of using federated deep learning (FDL) is to train the model without transferring data from the fixed node, which helps in achieving a higher scale of privacy. The fixed nodes contain the data; however, share a small number of weights obtained from the training of CNN. The weights are averaged at edge nodes and used to train the model. Later on, the optimal edge node referred by the broker starts communicating with the requesting node. The DL model is shared between the fixed devices where the data is stored. Algorithm ?? provides details of the client and server-side processing.
Broker.
Client--server federation model.
Experimental setup
Figure 3(a) to (c) illustrates the three use cases considered in this study. Edge devices receive the DL model from the broker to train on the data available at the edge devices. Fixed client nodes use the trained model for the classification of images.

Use cases for the experimental setup. (a) First use case: Client and server are both executed on the same machine; (b) Second use case: Client and server are executed on two separate machines; (c) Third use case: Edge federation comprising two fixed client nodes, two edge devices, and a broker.
This study uses three machines and one access point to conduct the experiments. This study uses a testbed for the experiments. The specifications of the machines used for experimentation are given in Table 3. Machine 1 is used for the first case. For the second use case, Machine 1 is used as a client while Machine 2 is used as the server. For the third use case, Machine 1 is used as the first client edge node, Machine 2 is used as the second client edge node while Machine 3 is used as the broker. The access point used for the communication between the client and the server is a TP-link model TL-WR840N V6.20 and has a 300 Mbps speed.
Specification of devices used for experimentation.
All experiments are repeated five times and the best results are reported in this paper as there was insignificant difference across runs. For training the CNN model, two rounds are executed, each of 10 epochs using a publicly available dataset13,14 containing 13,808 chest X-ray images, each of size 291
Results
We evaluate the performance and efficacy of the proposed edge-based distributed DL approach using accuracy, precision, recall, and F1 score parameters, the equations of which are shown in equations (2) to (5). To evaluate the resource utilization and load balancing of the proposed approach, we consider execution time, central processing unit (CPU) utilization, and memory utilization.
For the first use case, the client and server reside on the same computer. CNN is applied to the actual environment of FDL. The split ratio of data is 80% and 20% for train and test sets, respectively. Table 4 shows the comparative results obtained for all three use cases. For the first use case, the achieved accuracy, precision, recall, and F1 scores are 86.3%, 92.7%, 74.8%, and 82.7%, respectively. For the second use case, the achieved accuracy, precision, recall, and F1 score are 89.6%, 90.5%, 78.3%, and 83.9%, respectively. For the third use case, scores for accuracy, precision, recall, and F1 are 87.8%, 89.9%, 76.3%, and 82.5%, respectively. The model training time for the first use case is 17 min and 10 s. The model training time for the second use case is 15 min and 30 s and the model training time for the third case is 8 min and 3 s. The training time for the third use case is 53.1% and 48.1% less than the first and second use case, respectively. It is observed that our approach significantly reduces the training time without compromising the F1 score.
Comparison of three use cases.
Figure 4 shows the confusion matrix obtained for the three use cases considered in this study. In the third use case, the data is distributed between two different fixed nodes

Confusion matrices of the three use cases: (a) first use case; (b) second use case; (c) third use case.

Confusion matrices of nodes in the third use case: (a) fixed node A and (b) fixed node B.
Figure 6 shows the CPU and memory utilization of all three use cases. The CPU utilization for the first use case, where only a single machine is used, is 90% on average, the memory utilization is 5.5 GB on average, and the training time is 17 min and 10 s. The CPU utilization for the second use case is 87.5% on average, the memory utilization is 4.75 GB on average, and the training time is reduced to 15 min and 30 s. As compared to the first use case, a decrease of 2.5% is observed in terms of CPU utilization and a decrease of 13.6% is observed in terms of memory utilization.

Central processing unit (CPU) and memory utilization for the three use cases while model training: (a) CPU utilization and (b) memory utilization.
The CPU utilization for the proposed third use case is 72.5% on average, the memory utilization is 3.65 GB on average, and the training time is reduced to 8 min and 3 s. In terms of CPU utilization, a decrease of 17.5% and 15% is observed for use case three as compared to the first and second use case, respectively. In terms of memory utilization, a decrease of 33.6% and 23.1% is observed for use case three as compared to the first and second use case, respectively. Since the processing at the server is not playing a significant role in the model training, the results of the server side are ignored.
In the first use case, the feature extraction and model training is performed on a single machine, which takes more time due to resource constraints. In the second use case, the task of model training and feature extraction is divided between the server and client, respectively, which helps reduce the memory and CPU utilization. However, with the proposed distributed approach, as in the third use case, an edge federation consisting of multiple systems is deployed, which substantially reduces the CPU and memory utilization as well as model training time as compared to the first and second use cases. Additionally, privacy is preserved as the images remain on the fixed nodes in the proposed model.
Discussion
COVID-19 detection using DL methods with X-ray images has been widely studied in the literature. However, these methods often involve complex algorithms that consume significant computational resources and require extensive training time. Moreover, the conventional FL models used for this purpose are centralized in nature and rely on a single heavy-duty machine to execute the complex DL algorithms. This poses challenges when dealing with X-ray data belonging to different patients, which is distributed across various machines in hospitals and medical facilities. The transfer of such confidential data to a single machine not only raises privacy concerns, but also results in significant time delays and encounters limitations related to bandwidth and latency. These limitations underscore the necessity for a distributed approach that eliminates the reliance on a centralized heavy-duty machine, preserves privacy, and reduces dependence on the Internet.
In this research, an edge federation-based lightweight DL approach is proposed that successfully addresses the limitations of conventional FL approaches and achieves the desired objectives. The primary challenge in developing the proposed edge federation approach was to design a distributed lightweight DL model that is well-suited to the environment. Additionally, it was crucial to overcome the limitations of computational resources, bandwidth, and latency while ensuring privacy and accuracy.
The proposed edge federation leverages the normal systems already present in different medical facilities and incorporates them into the federation. This enables the direct transfer of images, whether from patients or diagnostic facilities to fixed nodes within the hospital. Since the primary objective of these images is the analysis by doctors, they naturally need to reach the doctor’s system and subsequently become part of the edge nodes as patient data. The proposed model acquires the required model from the broker and performs training on these images to reach a conclusion. Importantly, as these images never leave the intended premises, privacy is effectively maintained. Moreover, the use of edge nodes in closer proximity mitigates the challenges associated with limited bandwidth and latency. Additionally, different edge nodes collaborate and share resources to address computational challenges.
The results of the proposed work indicate its success in achieving the set objectives. However, it is important to acknowledge the limitations of this study. Firstly, there is limited existing research available for comparison, as edge federation for resource sharing in a distributed manner is a relatively new concept. Further studies and comparisons are necessary to establish benchmarks and evaluate the performance of the proposed approach. Additionally, other challenges, such as security and ownership, remain unexplored within this emerging paradigm. Since each edge node falls under different administration compared to the cloud, it is important to address these challenges to ensure the robustness and viability of the proposed edge federation approach.
In conclusion, this research demonstrates the effectiveness of an edge federation-based lightweight DL approach for COVID-19 detection using X-ray images. By addressing the limitations of conventional FL approaches and adopting a distributed framework, this approach offers advantages such as reduced reliance on a centralized heavy-duty machine, preserved privacy, and improved utilization of limited resources. Nonetheless, further research is needed to compare and validate the results, as well as to explore additional challenges associated with security and ownership in this new paradigm.
Conclusion and future directions
This study addresses the challenges of privacy, increased model training time, and the need for higher computational resources in DL algorithms. It introduces a novel lightweight CNN-based edge FL architecture, offering an alternative to traditional cloud-based solutions. The proposed approach employs a load-balancing mechanism that distributes compute-intensive tasks among edge federation nodes, ensuring privacy, reducing model training time, and managing the computational load on edge nodes. The experiments conducted in three phases demonstrate the effectiveness of the approach, showcasing reduced model training time, improved load balancing, and privacy preservation. By participating in an edge federation, healthcare providers can benefit from better model training, data sharing, and computational resources while upholding privacy. Future work can explore additional parameters such as energy and carbon dissipation, adopt hybrid models combining CNN and graphical neural networks for enhanced accuracy and performance, and emphasize trust management in edge federations to expand the federation’s membership.
Footnotes
Acknowledgement
Not applicable.
Contributorship
Not applicable.
Declaration of conflicting interests
The authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Ethical approval
Not applicable.
Funding
The authors disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This research was supported by the European University of the Atlantic.
Guarantor
Not applicable.
