When Machine Learning Meets Spectrum Sharing Security: Methodologies and
Challenges
- URL: http://arxiv.org/abs/2201.04677v1
- Date: Wed, 12 Jan 2022 20:04:28 GMT
- Title: When Machine Learning Meets Spectrum Sharing Security: Methodologies and
Challenges
- Authors: Qun Wang, Haijian Sun, Rose Qingyang Hu, Arupjyoti Bhuyan
- Abstract summary: The exponential growth of internet connected systems has generated numerous challenges, such as spectrum shortage issues.
Complicated and dynamic spectrum sharing (SS) systems can be exposed to different potential security and privacy issues.
Machine learning (ML) based methods have frequently been proposed to address those issues.
- Score: 19.313414666640078
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The exponential growth of internet connected systems has generated numerous
challenges, such as spectrum shortage issues, which require efficient spectrum
sharing (SS) solutions. Complicated and dynamic SS systems can be exposed to
different potential security and privacy issues, requiring protection
mechanisms to be adaptive, reliable, and scalable. Machine learning (ML) based
methods have frequently been proposed to address those issues. In this article,
we provide a comprehensive survey of the recent development of ML based SS
methods, the most critical security issues, and corresponding defense
mechanisms. In particular, we elaborate the state-of-the-art methodologies for
improving the performance of SS communication systems for various vital
aspects, including ML based cognitive radio networks (CRNs), ML based database
assisted SS networks, ML based LTE-U networks, ML based ambient backscatter
networks, and other ML based SS solutions. We also present security issues from
the physical layer and corresponding defending strategies based on ML
algorithms, including Primary User Emulation (PUE) attacks, Spectrum Sensing
Data Falsification (SSDF) attacks, jamming attacks, eavesdropping attacks, and
privacy issues. Finally, extensive discussions on open challenges for ML based
SS are also given. This comprehensive review is intended to provide the
foundation for and facilitate future studies on exploring the potential of
emerging ML for coping with increasingly complex SS and their security
problems.
Related papers
- Socialized Learning: A Survey of the Paradigm Shift for Edge Intelligence in Networked Systems [62.252355444948904]
This paper presents the findings of a literature review on the integration of edge intelligence (EI) and socialized learning (SL)
SL is a learning paradigm predicated on social principles and behaviors, aimed at amplifying the collaborative capacity and collective intelligence of agents.
We elaborate on three integrated components: socialized architecture, socialized training, and socialized inference, analyzing their strengths and weaknesses.
arXiv Detail & Related papers (2024-04-20T11:07:29Z) - Generative AI for Secure Physical Layer Communications: A Survey [80.0638227807621]
Generative Artificial Intelligence (GAI) stands at the forefront of AI innovation, demonstrating rapid advancement and unparalleled proficiency in generating diverse content.
In this paper, we offer an extensive survey on the various applications of GAI in enhancing security within the physical layer of communication networks.
We delve into the roles of GAI in addressing challenges of physical layer security, focusing on communication confidentiality, authentication, availability, resilience, and integrity.
arXiv Detail & Related papers (2024-02-21T06:22:41Z) - Highlighting the Safety Concerns of Deploying LLMs/VLMs in Robotics [54.57914943017522]
We highlight the critical issues of robustness and safety associated with integrating large language models (LLMs) and vision-language models (VLMs) into robotics applications.
arXiv Detail & Related papers (2024-02-15T22:01:45Z) - Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review [51.31851488650698]
Machine learning (ML) sees an increasing prevalence of being used in the internet-of-things (IoT)-based smart grid.
adversarial distortion injected into the power signal will greatly affect the system's normal control and operation.
It is imperative to conduct vulnerability assessment for MLsgAPPs applied in the context of safety-critical power systems.
arXiv Detail & Related papers (2023-08-30T03:29:26Z) - Machine Learning with Confidential Computing: A Systematization of Knowledge [9.632031075287047]
Privacy and security challenges in Machine Learning (ML) have become increasingly severe, along with ML's pervasive development and the recent demonstration of large attack surfaces.
As a mature system-oriented approach, Confidential Computing has been utilized in both academia and industry to mitigate privacy and security issues in various ML scenarios.
We systematize the prior work on Confidential Computing-assisted ML techniques that provide i) confidentiality guarantees and ii) integrity assurances, and discuss their advanced features and drawbacks.
arXiv Detail & Related papers (2022-08-22T08:23:53Z) - Privacy-Preserving Machine Learning: Methods, Challenges and Directions [4.711430413139393]
Well-designed privacy-preserving machine learning (PPML) solutions have attracted increasing research interest from academia and industry.
This paper systematically reviews existing privacy-preserving approaches and proposes a PGU model to guide evaluation for various PPML solutions.
arXiv Detail & Related papers (2021-08-10T02:58:31Z) - Practical Machine Learning Safety: A Survey and Primer [81.73857913779534]
Open-world deployment of Machine Learning algorithms in safety-critical applications such as autonomous vehicles needs to address a variety of ML vulnerabilities.
New models and training techniques to reduce generalization error, achieve domain adaptation, and detect outlier examples and adversarial attacks.
Our organization maps state-of-the-art ML techniques to safety strategies in order to enhance the dependability of the ML algorithm from different aspects.
arXiv Detail & Related papers (2021-06-09T05:56:42Z) - Inspect, Understand, Overcome: A Survey of Practical Methods for AI
Safety [54.478842696269304]
The use of deep neural networks (DNNs) in safety-critical applications is challenging due to numerous model-inherent shortcomings.
In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged.
Our paper addresses both machine learning experts and safety engineers.
arXiv Detail & Related papers (2021-04-29T09:54:54Z) - Robust Machine Learning Systems: Challenges, Current Trends,
Perspectives, and the Road Ahead [24.60052335548398]
Machine Learning (ML) techniques have been rapidly adopted by smart Cyber-Physical Systems (CPS) and Internet-of-Things (IoT)
They are vulnerable to various security and reliability threats, at both hardware and software levels, that compromise their accuracy.
This paper summarizes the prominent vulnerabilities of modern ML systems, highlights successful defenses and mitigation techniques against these vulnerabilities.
arXiv Detail & Related papers (2021-01-04T20:06:56Z) - Distributed Machine Learning for Wireless Communication Networks:
Techniques, Architectures, and Applications [1.647426214278143]
Distributed machine learning (DML) techniques have been increasingly applied to wireless communications.
The unique features of wireless systems, such as large scale, geographically dispersed deployment, user mobility, and massive amount of data, give rise to new challenges in the design of DML techniques.
This survey bridges the gap by providing a contemporary and comprehensive survey of DML techniques with a focus on wireless networks.
arXiv Detail & Related papers (2020-12-02T19:53:32Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.