Membership Inference Attack and Defense for Wireless Signal Classifiers With Deep Learning

被引:8
作者
Shi, Yi [1 ]
Sagduyu, Yalin E. [2 ]
机构
[1] Virginia Tech, Elect & Comp Engn, Blacksburg, VA 24061 USA
[2] Intelligent Automat Inc, Rockville, MD 20855 USA
关键词
Wireless communication; Training data; Wireless sensor networks; Noise measurement; Mobile computing; Deep learning; Computational modeling; Adversarial machine learning; deep learning; membership inference attack; privacy; wireless signal classification; defense; ADVERSARIAL ATTACKS;
D O I
10.1109/TMC.2022.3148690
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An over-the-air membership inference attack (MIA) is presented to leak private information from a wireless signal classifier. Machine learning (ML) provides powerful means to classify wireless signals, e.g., for PHY-layer authentication. As an adversarial machine learning attack, the MIA infers whether a signal of interest has been used in the training data of a target classifier. This private information incorporates waveform, channel, and device characteristics, and if leaked, can be exploited by an adversary to identify vulnerabilities of the underlying ML model (e.g., to infiltrate the PHY-layer authentication). One challenge for the over-the-air MIA is that the received signals and consequently the RF fingerprints at the adversary and the intended receiver differ due to the discrepancy in channel conditions. Therefore, the adversary first builds a surrogate classifier by observing the spectrum and then launches the black-box MIA on this classifier. The MIA results (based on both simulations and over-the-air software-defined radio (SDR) experiments) show that the adversary can reliably infer signals (and potentially the radio and channel information) used to build the target classifier. Therefore, a proactive defense is developed against the MIA by building a shadow MIA model and fooling the adversary. This defense can successfully reduce the MIA accuracy and prevent information leakage from the wireless signal classifier. Moreover, this defense does not reduce the accuracy of signal classification.
引用
收藏
页码:4032 / 4043
页数:12
相关论文
共 64 条
[1]  
Adesina D., 2020, arXiv
[2]  
Bahramali A., 2021, arXiv
[3]   On the Limitations of Targeted Adversarial Evasion Attacks Against Deep Learning Enabled Modulation Recognition [J].
Bair, Samuel ;
DelVecchio, Matthew ;
Flowers, Bryse ;
Michaels, Alan J. ;
Headley, William C. .
PROCEEDINGS OF THE 2019 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING (WISEML '19), 2019, :25-30
[4]   GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models [J].
Chen, Dingfan ;
Yu, Ning ;
Zhang, Yang ;
Fritz, Mario .
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, :343-362
[5]  
Choquette-Choo C.A., 2021, arXiv
[6]   DeepWiFi: Cognitive WiFi with Deep Learning [J].
Davaslioglu, Kemal ;
Soltani, Sohraab ;
Erpek, Tugba ;
Sagduyu, Yalin E. .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2021, 20 (02) :429-444
[7]   Trojan Attacks on Wireless Signal Classification with Adversarial Machine Learning [J].
Davaslioglu, Kemal ;
Sagduyu, Yalin E. .
2019 IEEE INTERNATIONAL SYMPOSIUM ON DYNAMIC SPECTRUM ACCESS NETWORKS (DYSPAN), 2019, :515-520
[8]   Investigating a Spectral Deception Loss Metric for Training Machine Learning-based Evasion Attacks [J].
DelVecchio, Matthew ;
Arndorfer, Vanessa ;
Headley, William C. .
PROCEEDINGS OF THE 2ND ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2020, 2020, :43-48
[9]  
Sagduyu YE, 2020, Arxiv, DOI arXiv:2001.08883
[10]  
Erpek T, 2020, DEV ANAL DEEP LEARNI