How to Make 5G Communications "Invisible": Adversarial Machine Learning
for Wireless Privacy
- URL: http://arxiv.org/abs/2005.07675v1
- Date: Fri, 15 May 2020 17:45:11 GMT
- Title: How to Make 5G Communications "Invisible": Adversarial Machine Learning
for Wireless Privacy
- Authors: Brian Kim and Yalin E. Sagduyu and Kemal Davaslioglu and Tugba Erpek
and Sennur Ulukus
- Abstract summary: We study the problem of hiding wireless communications from an eavesdropper.
There exists one transmitter that transmits to its receiver in the presence of an eavesdropper.
A cooperative jammer (CJ) transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise.
- Score: 43.156901821548935
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We consider the problem of hiding wireless communications from an
eavesdropper that employs a deep learning (DL) classifier to detect whether any
transmission of interest is present or not. There exists one transmitter that
transmits to its receiver in the presence of an eavesdropper, while a
cooperative jammer (CJ) transmits carefully crafted adversarial perturbations
over the air to fool the eavesdropper into classifying the received
superposition of signals as noise. The CJ puts an upper bound on the strength
of perturbation signal to limit its impact on the bit error rate (BER) at the
receiver. We show that this adversarial perturbation causes the eavesdropper to
misclassify the received signals as noise with high probability while
increasing the BER only slightly. On the other hand, the CJ cannot fool the
eavesdropper by simply transmitting Gaussian noise as in conventional jamming
and instead needs to craft perturbation signals built by adversarial machine
learning to enable covert communications. Our results show that signals with
different modulation types and eventually 5G communications can be effectively
hidden from an eavesdropper even if it is equipped with a DL classifier to
detect transmissions.
Related papers
- Secure Semantic Communication via Paired Adversarial Residual Networks [59.468221305630784]
This letter explores the positive side of the adversarial attack for the security-aware semantic communication system.
A pair of matching pluggable modules is installed: one after the semantic transmitter and the other before the semantic receiver.
The proposed scheme is capable of fooling the eavesdropper while maintaining the high-quality semantic communication.
arXiv Detail & Related papers (2024-07-02T08:32:20Z) - Interference and noise cancellation for joint communication radar (JCR)
system based on contextual information [11.861415744626076]
This paper examines the separation of wireless communication and radar signals.
We show that the optimizing beamforming weights mitigate the interference caused by signals.
When the channel responses were unknown, we designed an interference filter as a low-complex noise and interference cancellation autoencoder.
arXiv Detail & Related papers (2023-02-14T02:06:21Z) - Vulnerabilities of Deep Learning-Driven Semantic Communications to
Backdoor (Trojan) Attacks [70.51799606279883]
This paper highlights vulnerabilities of deep learning-driven semantic communications to backdoor (Trojan) attacks.
Backdoor attack can effectively change the semantic information transferred for poisoned input samples to a target meaning.
Design guidelines are presented to preserve the meaning of transferred information in the presence of backdoor attacks.
arXiv Detail & Related papers (2022-12-21T17:22:27Z) - Is Semantic Communications Secure? A Tale of Multi-Domain Adversarial
Attacks [70.51799606279883]
We introduce test-time adversarial attacks on deep neural networks (DNNs) for semantic communications.
We show that it is possible to change the semantics of the transferred information even when the reconstruction loss remains low.
arXiv Detail & Related papers (2022-12-20T17:13:22Z) - Task-Oriented Communications for NextG: End-to-End Deep Learning and AI
Security Aspects [78.84264189471936]
NextG communication systems are beginning to explore shifting this design paradigm to reliably executing a given task such as in task-oriented communications.
Wireless signal classification is considered as the task for the NextG Radio Access Network (RAN), where edge devices collect wireless signals for spectrum awareness and communicate with the NextG base station (gNodeB) that needs to identify the signal label.
Task-oriented communications is considered by jointly training the transmitter, receiver and classifier functionalities as an encoder-decoder pair for the edge device and the gNodeB.
arXiv Detail & Related papers (2022-12-19T17:54:36Z) - Covert Communications via Adversarial Machine Learning and
Reconfigurable Intelligent Surfaces [46.34482158291128]
The reconfigurable intelligent surfaces (RISs) rely on arrays of unit cells to control the scattering and reflection profiles of signals.
In this paper, covert communication is considered in the presence of the RIS.
arXiv Detail & Related papers (2021-12-21T18:23:57Z) - Open Set RF Fingerprinting using Generative Outlier Augmentation [15.572581983129655]
We propose to use generative deep learning methods to emulate unauthorized signal samples for the augmentation of training datasets.
Experiments conducted on a dataset captured from a WiFi testbed indicate that data augmentation allows for significant increases in open set classification accuracy.
arXiv Detail & Related papers (2021-08-30T10:12:46Z) - Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless
Signal Classifiers [43.156901821548935]
This paper presents channel-aware adversarial attacks against deep learning-based wireless signal classifiers.
A certified defense based on randomized smoothing that augments training data with noise is introduced to make the modulation classifier robust to adversarial perturbations.
arXiv Detail & Related papers (2020-05-11T15:42:54Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.