Controllable Wireless Spoofing Attack Based on Conditional BEGAN and Auxiliary Channel Sensing

被引:2
|
作者
Ma, Mingjun [1 ]
Zhang, Yan [1 ]
Zhao, Tianyu [1 ]
Zhang, Wancheng [1 ]
He, Zunwen [1 ]
机构
[1] Beijing Inst Technol, Sch Informat & Elect, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
adversarial machine learning; spoofing attack; general adversarial network (GAN); channel sensing; wireless security; DEEP; NETWORK;
D O I
10.3390/electronics12010084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates how to build a controllable wireless spoofing attack launch framework that is driven by fundamental channel modeling and practical wireless datasets. First, we propose a wireless spoofing attack scheme against the defense mechanism with adversarial deep learning. To obtain channel characteristics and facilitate offline training of the attack model, auxiliary channel sensing is proposed with fundamental channel modeling. Based on these, a conditional boundary equilibrium generative adversarial network (CBEGAN) is designed with adversarial autoencoder (AAE), which takes true labels of signals and channel characteristics as conditions and enables the generation of controllable spoofing signals to fool the protected legitimate classifier. We verify the performance of the proposed spoofing attack scheme with CBEGAN and channel sensing by using wireless datasets, which contain signal data of multiple emitters and modulation types. Results show that the proposed scheme outperforms random attack, replay attack, and the recent attack scheme based on generative adversarial network (GAN) when a single legitimate emitter sends a fixed modulation type. It is also shown that the average attack success probability of the proposed CBEGAN attack model can reach more than 80% while mimicking multiple emitters and modulation types. The performance of the proposed scheme on different channel conditions including signal-to-noise ratio (SNR) and K-factor of the Rician fading channel is evaluated.
引用
收藏
页数:16
相关论文
共 2 条
  • [1] NISA: Node Identification and Spoofing Attack Detection Based on Clock Features and Radio Information for Wireless Sensor Networks
    Huan, Xintao
    Kim, Kyeong Soo
    Zhang, Junqing
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (07) : 4691 - 4703
  • [2] Defensive Distillation-Based Adversarial Attack Mitigation Method for Channel Estimation Using Deep Learning Models in Next-Generation Wireless Networks
    Catak, Ferhat Ozgur
    Kuzlu, Murat
    Catak, Evren
    Cali, Umit
    Guler, Ozgur
    IEEE ACCESS, 2022, 10 : 98191 - 98203