How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy

被引:13
|
作者
Kim, Brian [1 ]
Sagduyu, Yalin E. [2 ]
Davaslioglu, Kemal [2 ]
Erpek, Tugba [2 ]
Ulukus, Sennur [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Intelligent Automat Inc, Rockville, MD 20855 USA
关键词
PHYSICAL-LAYER; INFORMATION; NETWORKS; SECURITY;
D O I
10.1109/IEEECONF51394.2020.9443500
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of hiding wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect whether any transmission of interest is present or not. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper, while a cooperative jammer (CJ) transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise. The CJ puts an upper bound on the strength of perturbation signal to limit its impact on the bit error rate (BER) at the receiver. We show that this adversarial perturbation causes the eavesdropper to misclassify the received signals as noise with high probability while increasing the BER only slightly. On the other hand, the CJ cannot fool the eavesdropper by simply transmitting Gaussian noise as in conventional jamming and instead needs to craft perturbation signals built by adversarial machine learning to enable covert communications. Our results show that signals with different modulation types and eventually 5G communications can be effectively hidden from an eavesdropper even if it is equipped with a DL classifier to detect transmissions.
引用
收藏
页码:763 / 767
页数:5
相关论文
共 50 条
  • [31] Multibeam Antenna Technologies for 5G Wireless Communications
    Hong, Wei
    Jiang, Zhi Hao
    Yu, Chao
    Zhou, Jianyi
    Chen, Peng
    Yu, Zhiqiang
    Zhang, Hui
    Yang, Binqi
    Pang, Xingdong
    Jiang, Mei
    Cheng, Yujian
    Al-Nuaitni, Mustafa K. Taher
    Zhang, Yan
    Chen, Jixin
    He, Shiwen
    IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2017, 65 (12) : 6231 - 6249
  • [32] Adversarial Machine Learning for Flooding Attacks on 5G Radio Access Network Slicing
    Shi, Yi
    Sagduyu, Yalin E.
    2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
  • [33] Machine Learning in 6G Wireless Communications
    Ohtsuki, Tomoaki
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2023, E106B (02) : 75 - 83
  • [34] Channel State Information Prediction for 5G Wireless Communications: A Deep Learning Approach
    Luo, Changqing
    Ji, Jinlong
    Wang, Qianlong
    Chen, Xuhui
    Li, Pan
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (01): : 227 - 236
  • [35] Evolutionary Learning of Link Allocation Algorithms for 5G Heterogeneous Wireless Communications Networks
    Lynch, David
    Saber, Takfarinas
    Kucera, Stepan
    Claussen, Holger
    O'Neill, Michael
    PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'19), 2019, : 1258 - 1265
  • [36] Machine Learning for Physical Layer in 5G and beyond Wireless Networks: A Survey
    Tanveer, Jawad
    Haider, Amir
    Ali, Rashid
    Kim, Ajung
    ELECTRONICS, 2022, 11 (01)
  • [37] Generative adversarial networks enhanced location privacy in 5G networks
    Youyang QU
    Jingwen ZHANG
    Ruidong LI
    Xiaoning ZHANG
    Xuemeng ZHAI
    Shui YU
    ScienceChina(InformationSciences), 2020, 63 (12) : 41 - 52
  • [38] Generative adversarial networks enhanced location privacy in 5G networks
    Qu, Youyang
    Zhang, Jingwen
    Li, Ruidong
    Zhang, Xiaoning
    Zhai, Xuemeng
    Yu, Shui
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (12)
  • [39] Generative adversarial networks enhanced location privacy in 5G networks
    Youyang Qu
    Jingwen Zhang
    Ruidong Li
    Xiaoning Zhang
    Xuemeng Zhai
    Shui Yu
    Science China Information Sciences, 2020, 63
  • [40] Networked Delay Control for 5G Wireless Machine-Type Communications Using Multiconnectivity
    Delgado, Ramon A.
    Lau, Katrina
    Middleton, Richard H.
    Wigren, Torbjorn
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2019, 27 (04) : 1510 - 1525