Secure AI for 6G Mobile Devices: Deep Learning Optimization Against Side-Channel Attacks

被引:9
作者
Ahmed, Amjed Abbas [1 ]
Hasan, Mohammad Kamrul [1 ]
Memon, Imran [2 ]
Aman, Azana Hafizah Mohd [1 ]
Islam, Shayla [3 ]
Gadekallu, Thippa Reddy [4 ,5 ,6 ,7 ]
Memon, Sufyan Ali [8 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Cyber Secur, Bangi 43600, Malaysia
[2] Shah Abdul Latif Univ Shahdadkot, Dept Comp Sci, Shahdadkot 77300, Pakistan
[3] UCSI Univ Malaysia, Inst Comp Sci & Digital Innovat, Kuala Lumpur 56000, Malaysia
[4] Lovely Profess Univ, Div Res & Dev, Phagwara 144001, India
[5] Lebanese Amer Univ, Dept Elect & Comp Engn, Byblos 03797, Lebanon
[6] Chitkara Univ, Sch Informat Technol & Engn, Rajpura 140401, India
[7] Chitkara Univ, Inst Engn & Technol, Ctr Res Impact & Outcome, Rajpura 140401, India
[8] Sejong Univ, Dept Def Syst Engn, Seoul 05006, South Korea
关键词
Neural networks; Deep learning; Bayes methods; Consumer electronics; Optimization; Vectors; Side-channel attacks; side-channel attack; hyperparameter; Bayesian optimization; SERVICE ATTACK;
D O I
10.1109/TCE.2024.3372018
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Deep learning-driven side-channel analysis (SCA) is a promising approach to side-channel analytic profiling. Recent studies have shown that neural networks can successfully attack defended targets, even with a small number of attack traces. However, developing neural networks requires fine-tuning hyperparameters, which is challenging and time-consuming, especially for complex neural networks. This study proposes an AutoSCA framework that uses Bayesian optimization to automate deep learning hyperparameter tuning for SCA. The framework is implemented using two popular neural network architectures: the multi-layer perceptron (MLP) and convolutional neural network (CNN). The AutoSCA framework improves deep learning performance and side-channel measurements, which has potential applications in 6G communication-based mobile devices. The framework was trained and evaluated using the ASCAD and CHES CTF datasets. The experimental results showed that the CNN-based AutoSCA outperformed the MLP-based AutoSCA and other state-of-the-art models, in terms of low time complexity and higher accuracy. Results suggest that Bayesian optimization is effective regardless of the dataset, neural network architecture, or type of leaky prototype in defeating contemporary attacks. Applying deep learning optimization against side-channel attacks in consumer electronics can significantly enhance the security of user data and privacy in an increasingly connected.
引用
收藏
页码:3951 / 3959
页数:9
相关论文
共 30 条
[1]   Review of deep learning: concepts, CNN architectures, challenges, applications, future directions [J].
Alzubaidi, Laith ;
Zhang, Jinglan ;
Humaidi, Amjad J. ;
Al-Dujaili, Ayad ;
Duan, Ye ;
Al-Shamma, Omran ;
Santamaria, J. ;
Fadhel, Mohammed A. ;
Al-Amidie, Muthana ;
Farhan, Laith .
JOURNAL OF BIG DATA, 2021, 8 (01)
[2]   Deep learning for side-channel analysis and introduction to ASCAD database [J].
Benadjila, Ryad ;
Prouff, Emmanuel ;
Strullu, Remi ;
Cagli, Eleonora ;
Dumas, Cecile .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) :163-188
[3]   Security-Aware Industrial Wireless Sensor Network Deployment Optimization [J].
Cao, Bin ;
Zhao, Jianwei ;
Gu, Yu ;
Fan, Shanshan ;
Yang, Peng .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (08) :5309-5316
[4]   Improving Physical Layer Security of Uplink NOMA via Energy Harvesting Jammers [J].
Cao, Kunrui ;
Wang, Buhong ;
Ding, Haiyang ;
Lv, Lu ;
Dong, Runze ;
Cheng, Tianhao ;
Gong, Fengkui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :786-799
[5]   When Deep Learning-Based Soft Sensors Encounter Reliability Challenges: A Practical Knowledge-Guided Adversarial Attack and Its Defense [J].
Guo, Runyuan ;
Liu, Han ;
Liu, Ding .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (02) :2702-2714
[6]   Towards Public Verifiable and Forward-Privacy Encrypted Search by Using Blockchain [J].
Guo, Yu ;
Zhang, Chen ;
Wang, Cong ;
Jia, Xiaohua .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) :2111-2126
[7]  
Gupta P., 2023, Rep. 2023/093
[8]   Distributed denial-of-service attack detection for smart grid wide area measurement system: A hybrid machine learning technique [J].
Habib, A. K. M. Ahasan ;
Hasan, Mohammad Kamrul ;
Hassan, Rosilah ;
Islam, Shayla ;
Thakkar, Rahul ;
Nguyen Vo .
ENERGY REPORTS, 2023, 9 :638-646
[9]   DDoS: Distributed denial of service attack in communication standard vulnerabilities in smart grid applications and cyber security with recent developments [J].
Hasan, Mohammad Kamrul ;
Habib, A. K. M. Ahasan ;
Islam, Shayla ;
Safie, Nurhizam ;
Abdullah, Siti Norul Huda Sheikh ;
Pandey, Bishwajeet .
ENERGY REPORTS, 2023, 9 :1318-1326
[10]   FPGA Based Countermeasures Against Side channel Attacks on Block Ciphers [J].
Jayasinghe, Darshana ;
Udugama, Brian ;
Parameswaran, Sri .
2023 28TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC, 2023, :365-371