Data-driven classification of low-power communication signals by an
unauthenticated user using a software-defined radio
- URL: http://arxiv.org/abs/2309.04088v1
- Date: Fri, 8 Sep 2023 02:57:38 GMT
- Title: Data-driven classification of low-power communication signals by an
unauthenticated user using a software-defined radio
- Authors: Tarun Rao Keshabhoina and Marcos M. Vasconcelos
- Abstract summary: We argue that a widely popular low-power communication protocol known as LoRa is vulnerable to denial-of-service attacks by an unauthenticated attacker.
We relate the problem of jointly inferring the two unknown parameters to a classification problem, which can be efficiently implemented using neural networks.
- Score: 2.3931689873603603
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Many large-scale distributed multi-agent systems exchange information over
low-power communication networks. In particular, agents intermittently
communicate state and control signals in robotic network applications, often
with limited power over an unlicensed spectrum, prone to eavesdropping and
denial-of-service attacks. In this paper, we argue that a widely popular
low-power communication protocol known as LoRa is vulnerable to
denial-of-service attacks by an unauthenticated attacker if it can successfully
identify a target signal's bandwidth and spreading factor. Leveraging a
structural pattern in the LoRa signal's instantaneous frequency representation,
we relate the problem of jointly inferring the two unknown parameters to a
classification problem, which can be efficiently implemented using neural
networks.
Related papers
- Multi-Agent-Driven Cognitive Secure Communications in Satellite-Terrestrial Networks [58.70163955407538]
Malicious eavesdroppers pose a serious threat to private information via satellite-terrestrial networks (STNs)<n>We propose a cognitive secure communication framework driven by multiple agents that coordinates spectrum scheduling and protection through real-time sensing.<n>We exploit generative adversarial networks to produce adversarial matrices, and employ learning-aided power control to set real and adversarial signal powers for protection layer.
arXiv Detail & Related papers (2026-01-06T10:30:41Z) - Beyond Static Thresholds: Adaptive RRC Signaling Storm Detection with Extreme Value Theory [0.8877220164547092]
In 5G and beyond networks, the radio communication between a User Equipment (UE) and a base station (gNodeB or gNB) is a critical component of network access and connectivity.<n>These attacks may occur when one or more UEs send a large number of connection requests to the gNB, preventing new UEs from establishing connections.<n>We propose an adaptive threshold-based detection system based on Extreme Value Theory (EVT)
arXiv Detail & Related papers (2025-11-03T09:42:12Z) - Generative AI-driven Cross-layer Covert Communication: Fundamentals, Framework and Case Study [62.5909195375364]
Cross-layer covert communication mechanism emerges as an effective strategy to mitigate regulatory challenges.
We propose an end-to-end cross-layer covert communication scheme driven by Generative Artificial Intelligence (GenAI)
Case study is conducted using diffusion reinforcement learning to sovle cloud edge internet of things cross-layer secure communication.
arXiv Detail & Related papers (2025-01-19T15:05:03Z) - AI Flow at the Network Edge [58.31090055138711]
AI Flow is a framework that streamlines the inference process by jointly leveraging the heterogeneous resources available across devices, edge nodes, and cloud servers.
This article serves as a position paper for identifying the motivation, challenges, and principles of AI Flow.
arXiv Detail & Related papers (2024-11-19T12:51:17Z) - Augmenting Training Data with Vector-Quantized Variational Autoencoder for Classifying RF Signals [9.99212997328053]
This paper proposes the use of a Vector-Quantized Variational Autoencoder (VQ-VAE) to augment training data.
The VQ-VAE model generates high-fidelity synthetic RF signals, increasing the diversity and fidelity of the training dataset.
Our experimental results show that incorporating VQ-VAE-generated data significantly improves the classification accuracy of the baseline model.
arXiv Detail & Related papers (2024-10-23T21:17:45Z) - Federated Learning in Wireless Networks via Over-the-Air Computations [0.0]
In a multi-agent system, agents can cooperatively learn a model from data by exchanging their estimated model parameters.
This strategy, often called federated learning, is mainly employed for two reasons: (i) improving resource-efficiency by avoiding to share potentially large datasets and (ii) guaranteeing privacy of local agents' data.
efficiency can be further increased by adopting a beyond-5G communication strategy that goes under the name of Over-the-Air Computation.
arXiv Detail & Related papers (2023-05-08T11:12:22Z) - Task-Oriented Communications for NextG: End-to-End Deep Learning and AI
Security Aspects [78.84264189471936]
NextG communication systems are beginning to explore shifting this design paradigm to reliably executing a given task such as in task-oriented communications.
Wireless signal classification is considered as the task for the NextG Radio Access Network (RAN), where edge devices collect wireless signals for spectrum awareness and communicate with the NextG base station (gNodeB) that needs to identify the signal label.
Task-oriented communications is considered by jointly training the transmitter, receiver and classifier functionalities as an encoder-decoder pair for the edge device and the gNodeB.
arXiv Detail & Related papers (2022-12-19T17:54:36Z) - Spoofing Attack Detection in the Physical Layer with Commutative Neural
Networks [21.6399273864521]
In a spoofing attack, an attacker impersonates a legitimate user to access or tamper with data intended for or produced by the legitimate user.
Existing schemes rely on long-term estimates, which makes it difficult to distinguish spoofing from movement of a legitimate user.
This limitation is here addressed by means of a deep neural network that implicitly learns the distribution of pairs of short-term RSS vector estimates.
arXiv Detail & Related papers (2022-11-08T14:20:58Z) - FGAN: Federated Generative Adversarial Networks for Anomaly Detection in
Network Traffic [0.0]
This work aims at tackling two issues by using GANs in a federated architecture in networks of such scale and capacity.
The dataset required to train these models has to be made centrally available and publicly accessible.
In such a setting, different users of the network will be able to train and customize a centrally available adversarial model according to their own frequently faced conditions.
arXiv Detail & Related papers (2022-03-21T16:32:44Z) - SignalNet: A Low Resolution Sinusoid Decomposition and Estimation
Network [79.04274563889548]
We propose SignalNet, a neural network architecture that detects the number of sinusoids and estimates their parameters from quantized in-phase and quadrature samples.
We introduce a worst-case learning threshold for comparing the results of our network relative to the underlying data distributions.
In simulation, we find that our algorithm is always able to surpass the threshold for three-bit data but often cannot exceed the threshold for one-bit data.
arXiv Detail & Related papers (2021-06-10T04:21:20Z) - Communication-Efficient Split Learning Based on Analog Communication and
Over the Air Aggregation [48.150466900765316]
Split-learning (SL) has recently gained popularity due to its inherent privacy-preserving capabilities and ability to enable collaborative inference for devices with limited computational power.
Standard SL algorithms assume an ideal underlying digital communication system and ignore the problem of scarce communication bandwidth.
We propose a novel SL framework to solve the remote inference problem that introduces an additional layer at the agent side and constrains the choices of the weights and the biases to ensure over the air aggregation.
arXiv Detail & Related papers (2021-06-02T07:49:41Z) - Adversarial Attacks on Deep Learning Based Power Allocation in a Massive
MIMO Network [62.77129284830945]
We show that adversarial attacks can break DL-based power allocation in the downlink of a massive multiple-input-multiple-output (maMIMO) network.
We benchmark the performance of these attacks and show that with a small perturbation in the input of the neural network (NN), the white-box attacks can result in infeasible solutions up to 86%.
arXiv Detail & Related papers (2021-01-28T16:18:19Z) - Adversarial Attacks On Multi-Agent Communication [80.4392160849506]
Modern autonomous systems will soon be deployed at scale, opening up the possibility for cooperative multi-agent systems.
Such advantages rely heavily on communication channels which have been shown to be vulnerable to security breaches.
In this paper, we explore such adversarial attacks in a novel multi-agent setting where agents communicate by sharing learned intermediate representations.
arXiv Detail & Related papers (2021-01-17T00:35:26Z) - Distributed Learning in Ad-Hoc Networks: A Multi-player Multi-armed
Bandit Framework [0.0]
Next-generation networks are expected to be ultra-dense with a very high peak rate but relatively lower expected traffic per user.
To overcome this problem, cognitive ad-hoc networks (CAHN) that share spectrum with other networks are being envisioned.
We discuss state-of-the-art multi-armed multi-player bandit based distributed learning algorithms that allow users to adapt to the environment.
arXiv Detail & Related papers (2020-03-06T18:11:47Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.