Adversarial Machine Learning in Wireless Communications Using RF Data: A Review

被引:45
作者
Adesina, Damilola [1 ]
Hsieh, Chung-Chu [2 ]
Sagduyu, Yalin E. [3 ]
Qian, Lijun [1 ]
机构
[1] Prairie View A&M Univ, Ctr Excellence Res & Educ Big Mil Data Intelligenc, CREDIT Ctr, Dept Elect & Comp Engn, Prairie View, TX 77446 USA
[2] Norfolk State Univ, Ctr Excellence Cyber Secur, Norfolk, VA 23504 USA
[3] Virginia Tech, Natl Secur Inst, Arlington, VA 22203 USA
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2023年 / 25卷 / 01期
基金
美国国家科学基金会;
关键词
Wireless communication; Communication system security; Wireless sensor networks; Perturbation methods; Deep learning; Radio frequency; Data models; Adversarial machine learning; machine learning security; wireless security; wireless attacks; defenses; SIGNAL CLASSIFICATION; ARTIFICIAL-INTELLIGENCE; MODULATION RECOGNITION; RESOURCE-ALLOCATION; COGNITIVE RADIO; NEURAL-NETWORKS; DEEP; ATTACKS; SECURITY; CNN;
D O I
10.1109/COMST.2022.3205184
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning (ML) provides effective means to learn from spectrum data and solve complex tasks involved in wireless communications. Supported by recent advances in computational resources and algorithmic designs, deep learning (DL) has found success in performing various wireless communication tasks such as signal recognition, spectrum sensing and waveform design. However, ML in general and DL in particular have been found vulnerable to manipulations thus giving rise to a field of study called adversarial machine learning (AML). Although AML has been extensively studied in other data domains such as computer vision and natural language processing, research for AML in the wireless communications domain is still in its early stage. This paper presents a comprehensive review of the latest research efforts focused on AML in wireless communications while accounting for the unique characteristics of wireless systems. First, the background of AML attacks on deep neural networks is discussed and a taxonomy of AML attack types is provided. Various methods of generating adversarial examples and attack mechanisms are also described. In addition, an holistic survey of existing research on AML attacks for various wireless communication problems as well as the corresponding defense mechanisms in the wireless domain are presented. Finally, as new attacks and defense techniques are developed, recent research trends and the overarching future outlook for AML in next-generation wireless communications are discussed.
引用
收藏
页码:77 / 100
页数:24
相关论文
共 280 条
[1]   Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems [J].
Abusnaina, Ahmed ;
Khormali, Aminollah ;
Alasmary, Hisham ;
Park, Jeman ;
Anwar, Afsah ;
Mohaisen, Aziz .
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019), 2019, :1296-1305
[2]  
Abuzainab Nof, 2019, MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), P610, DOI 10.1109/MILCOM47813.2019.9020985
[3]   Deep Learning for THz Drones with Flying Intelligent Surfaces: Beam and Handoff Prediction [J].
Abuzainab, Nof ;
Alrabeiah, Muhammad ;
Alkhateeb, Ahmed ;
Sagduyu, Yalin E. .
2021 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC WORKSHOPS), 2021,
[4]  
Adesina Damilola, 2019, MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), P311, DOI 10.1109/MILCOM47813.2019.9020807
[5]   Robust Deep Radio Frequency Spectrum Learning for Future Wireless Communications Systems [J].
Adesina, Damilola ;
Bassey, Joshua ;
Qian, Lijun .
IEEE ACCESS, 2020, 8 :148528-148540
[6]   Machine Learning Meets Communication Networks: Current Trends and Future Challenges [J].
Ahmad, Ijaz ;
Shahabuddin, Shariar ;
Malik, Hassan ;
Harjula, Erkki ;
Leppanen, Teemu ;
Loven, Lauri ;
Anttonen, Antti ;
Sodhro, Ali Hassan ;
Mahtab Alam, Muhammad ;
Juntti, Markku ;
Yla-Jaaski, Antti ;
Sauter, Thilo ;
Gurtov, Andrei ;
Ylianttila, Mika ;
Riekki, Jukka .
IEEE ACCESS, 2020, 8 :223418-223460
[7]   Deep Learning for Radio Resource Allocation in Multi-Cell Networks [J].
Ahmed, K., I ;
Tabassum, H. ;
Hossain, E. .
IEEE NETWORK, 2019, 33 (06) :188-195
[8]   Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal ;
Kardan, Navid ;
Shah, Mubarak .
IEEE ACCESS, 2021, 9 :155161-155196
[9]   Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey [J].
Akhtar, Naveed ;
Mian, Ajmal .
IEEE ACCESS, 2018, 6 :14410-14430
[10]  
Al-shawabka A., 2020, IEEE GEOSCI REMOTE S, V182