Anti-Modulation-Classification Transmitter Design Against Deep Learning Approaches

被引:2
作者
He, Boxiang [1 ]
Wang, Fanggang [1 ]
机构
[1] Beijing Jiaotong Univ, Frontiers Sci Ctr Smart High Speed Railway Syst, Sch Elect & Informat Engn, State Key Lab Adv Rail Autonomous Operat, Beijing 100044, Peoples R China
基金
中国国家自然科学基金;
关键词
Modulation; Perturbation methods; Wireless communication; Transmitters; Optimization; Jamming; Communication system security; Adversarial machine learning; deep learning; modulation classification; physical layer security; WIRELESS INFORMATION; ADVERSARIAL ATTACKS; RECOGNITION; SECURITY;
D O I
10.1109/TWC.2023.3335050
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
For the modulation classification problems, the deep learning approaches can determine the unknown modulation formats in high confidence. However, it has been maliciously used by eavesdroppers. In this paper, we consider the wireless communication scenario, in which Alice intends to communicate with Bob confidentially in the threat of Eve, who tries to determine the unknown modulation formats of Alice using some deep learning approach. Recent advancements in adversarial machine learning have demonstrated that the deep learning techniques are vulnerable to crafted perturbations. To prevent Eve from classifying Alice's modulation formats, Alice transmits the modulation signal with the well-designed adversarial perturbation. We first formulate an optimization problem to determine the optimized adversarial perturbation, in which the objective is to mislead the modulation classifier of Eve subject to the communication constraints, i.e., the power efficiency, the achievable rate, and the reliability. Then, the augmented Lagrangian method is adopted to solve the perturbation optimization problem, in which the implicit objective is evaluated using the Monte Carlo method, and the gradients of the implicit constraints are obtained using the Gaussian-based estimation algorithm. We further extend the perturbation design to the both cases of Alice having and not having the prior knowledge of Eve. Finally, the input-independent universal perturbation for the specific modulation type is proposed, which is deployed via a lookup table method. Numerical results show that the designed perturbation with 10% power of the modulated signal can attack Eve's modulation classifier with the great success while ensuring both the achievable rate and the reliability close to the ideal case (say, no perturbation). Compared to the existing methods, the designed perturbation achieves the better attack performance and is robust to the filtering, the oversampling, and the time/frequency offset. Furthermore, this paper reveals that the structure type of Eve's model has a large impact on the attack performance, and verifies that the adversarial perturbation can effectively attack the modulation classifiers that resort to the expert knowledge.
引用
收藏
页码:6808 / 6823
页数:16
相关论文
共 45 条
  • [1] Adversarial Machine Learning in Wireless Communications Using RF Data: A Review
    Adesina, Damilola
    Hsieh, Chung-Chu
    Sagduyu, Yalin E.
    Qian, Lijun
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (01): : 77 - 100
  • [2] Bhatnagar S., 2013, Stochastic Approximation Algorithms
  • [3] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [4] A Hierarchical Classification Head Based Convolutional Gated Deep Neural Network for Automatic Modulation Classification
    Chang, Shuo
    Zhang, Ruiyun
    Ji, Kejia
    Huang, Sai
    Feng, Zhiyong
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (10) : 8713 - 8728
  • [5] Investigating a Spectral Deception Loss Metric for Training Machine Learning-based Evasion Attacks
    DelVecchio, Matthew
    Arndorfer, Vanessa
    Headley, William C.
    [J]. PROCEEDINGS OF THE 2ND ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2020, 2020, : 43 - 48
  • [6] Improving Wireless Physical Layer Security via Cooperating Relays
    Dong, Lun
    Han, Zhu
    Petropulu, Athina P.
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) : 1875 - 1888
  • [7] Flowers Bryse, 2019, MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), P133, DOI 10.1109/MILCOM47813.2019.9020716
  • [8] Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications
    Flowers, Bryse
    Buehrer, R. Michael
    Headley, William C.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (15) : 1102 - 1113
  • [9] A Novel Deep Learning and Polar Transformation Framework for an Adaptive Automatic Modulation Classification
    Ghasemzadeh, Pejman
    Banerjee, Subharthi
    Hempel, Michael
    Sharif, Hamid
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) : 13243 - 13258
  • [10] Guaranteeing secrecy using artificial noise
    Goel, Satashu
    Negi, Rohit
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) : 2180 - 2189