Is Semantic Communication Secure? A Tale of Multi-Domain Adversarial Attacks

被引:9
作者
Sagduyu, Yalin E. [1 ]
Erpek, Tugba [1 ]
Ulukus, Sennur [2 ]
Yener, Aylin [3 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] Univ Maryland, Dept Elect & Comp Engn, Informat Sci & Syst, College Pk, MD USA
[3] Ohio State Univ, Columbus, OH USA
关键词
Wireless communication; Transmitters; Perturbation methods; Semantics; Receivers; Propagation losses; Decoding; SYSTEMS;
D O I
10.1109/MCOM.006.2200878
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Semantic communication seeks to transfer information from a source while conveying a desired meaning to its destination. We model the transmitter-receiver functionalities as an autoencoder, followed by a task classifier that evaluates the meaning of the conveyed information. The autoencoder consists of an encoder at the transmitter that jointly models source coding, channel coding, and modulation, and a decoder at the receiver that jointly models demodulation, channel decoding, and source decoding. By augmenting the reconstruction loss with a semantic loss, this encoder-decoder pair is interactively trained with the semantic task classifier. This approach transfers compressed feature vectors reliably with a small number of channel uses while keeping the semantic loss low. We identify the multi-domain security vulnerabilities of using deep neural networks (DNNs) for semantic communications. Based on adversarial machine learning, we introduce test-time (targeted and non-targeted) adversarial attacks on these DNNs. As a computer vision attack, small perturbations are injected into the images at the input of the transmitter's encoder. As a wireless attack, small perturbation signals are transmitted to interfere with the input of the receiver's decoder. By launching these attacks individually or jointly (as a multi-domain attack), we show that it is possible to change the semantics of the transferred information (with larger impact than conventional jamming) and highlight the need of defense methods for the safe adoption of semantic communications.
引用
收藏
页码:50 / 55
页数:6
相关论文
共 15 条
[1]   Adversarial Machine Learning in Wireless Communications Using RF Data: A Review [J].
Adesina, Damilola ;
Hsieh, Chung-Chu ;
Sagduyu, Yalin E. ;
Qian, Lijun .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (01) :77-100
[2]  
Guler B, 2014, INT CONF PERVAS COMP, P431, DOI 10.1109/PerComW.2014.6815245
[3]  
Gündüz D, 2023, IEEE J SEL AREA COMM, V41, P5, DOI 10.1109/JSAC.2022.3223408
[4]   Robust Semantic Communications Against Semantic Noise [J].
Hu, Qiyu ;
Zhang, Guangyi ;
Qin, Zhijin ;
Cai, Yunlong ;
Yu, Guanding ;
Li, Geoffrey Ye .
2022 IEEE 96TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2022-FALL), 2022,
[5]   Wireless Semantic Communications for Video Conferencing [J].
Jiang, Peiwen ;
Wen, Chao-Kai ;
Jin, Shi ;
Li, Geoffrey Ye .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2023, 41 (01) :230-244
[6]   Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers [J].
Kim, Brian ;
Sagduyu, Yalin E. ;
Davaslioglu, Kemal ;
Erpek, Tugba ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (06) :3868-3880
[7]   An Introduction to Deep Learning for the Physical Layer [J].
O'Shea, Timothy ;
Hoydis, Jakob .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2017, 3 (04) :563-575
[8]  
Qin ZJ, 2022, Arxiv, DOI [arXiv:2201.01389, DOI 10.48550/ARXIV.2201.01389]
[9]   Physical Adversarial Attacks Against End-to-End Autoencoder Communication Systems [J].
Sadeghi, Meysam ;
Larsson, Erik G. .
IEEE COMMUNICATIONS LETTERS, 2019, 23 (05) :847-850
[10]   Learning Task-Oriented Communication for Edge Inference: An Information Bottleneck Approach [J].
Shao, Jiawei ;
Mao, Yuyi ;
Zhang, Jun .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (01) :197-211