Membership Inference Attack and Defense for Wireless Signal Classifiers With Deep Learning

被引:13
作者
Shi, Yi [1 ]
Sagduyu, Yalin E. [2 ]
机构
[1] Virginia Tech, Elect & Comp Engn, Blacksburg, VA 24061 USA
[2] Intelligent Automat Inc, Rockville, MD 20855 USA
关键词
Wireless communication; Training data; Wireless sensor networks; Noise measurement; Mobile computing; Deep learning; Computational modeling; Adversarial machine learning; deep learning; membership inference attack; privacy; wireless signal classification; defense; ADVERSARIAL ATTACKS;
D O I
10.1109/TMC.2022.3148690
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An over-the-air membership inference attack (MIA) is presented to leak private information from a wireless signal classifier. Machine learning (ML) provides powerful means to classify wireless signals, e.g., for PHY-layer authentication. As an adversarial machine learning attack, the MIA infers whether a signal of interest has been used in the training data of a target classifier. This private information incorporates waveform, channel, and device characteristics, and if leaked, can be exploited by an adversary to identify vulnerabilities of the underlying ML model (e.g., to infiltrate the PHY-layer authentication). One challenge for the over-the-air MIA is that the received signals and consequently the RF fingerprints at the adversary and the intended receiver differ due to the discrepancy in channel conditions. Therefore, the adversary first builds a surrogate classifier by observing the spectrum and then launches the black-box MIA on this classifier. The MIA results (based on both simulations and over-the-air software-defined radio (SDR) experiments) show that the adversary can reliably infer signals (and potentially the radio and channel information) used to build the target classifier. Therefore, a proactive defense is developed against the MIA by building a shadow MIA model and fooling the adversary. This defense can successfully reduce the MIA accuracy and prevent information leakage from the wireless signal classifier. Moreover, this defense does not reduce the accuracy of signal classification.
引用
收藏
页码:4032 / 4043
页数:12
相关论文
共 64 条
[21]  
Kim B., 2021, ICC 2021-IEEE International Conference on Communications, P1
[22]  
Kim B., 2021, P IEEE GLOB WORKSH G, P1
[23]  
Kim B., 2021, arXiv
[24]  
Kim B, 2021, Arxiv, DOI [arXiv:2005.05321, 10.1109/TWC.2021.3124855]
[25]   How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy [J].
Kim, Brian ;
Sagduyu, Yalin E. ;
Davaslioglu, Kemal ;
Erpek, Tugba ;
Ulukus, Sennur .
2020 54TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2020, :763-767
[26]   Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers [J].
Kim, Brian ;
Sagduyu, Yalin E. ;
Erpek, Tugba ;
Davaslioglu, Kemal ;
Ulukus, Sennur .
2020 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2020,
[27]   Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels [J].
Kim, Brian ;
Sagduyu, Yalin E. ;
Davaslioglu, Kemal ;
Erpek, Tugba ;
Ulukus, Sennur .
2020 54TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2020, :330-335
[28]   Targeted Adversarial Examples Against RF Deep Classifiers [J].
Kokalj-Filipovic, Silvija ;
Miller, Rob ;
Morman, Joshua .
PROCEEDINGS OF THE 2019 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING (WISEML '19), 2019, :6-11
[29]  
Leino K, 2020, Arxiv, DOI arXiv:1906.11798
[30]  
Lin Y, 2020, IEEE INFOCOM SER, P2469, DOI [10.1109/INFOCOM41043.2020.9155389, 10.1109/infocom41043.2020.9155389]