Deep Learning for Launching and Mitigating Wireless Jamming Attacks

被引:168
作者
Erpek, Tugba [1 ,2 ]
Sagduyu, Yalin E. [2 ]
Shi, Yi [2 ,3 ]
机构
[1] Virginia Tech, Bradley Dept Elect & Comp Engn, Res Ctr Arlington, Arlington, VA 22203 USA
[2] Intelligent Automat Inc, Rockville, MD 20855 USA
[3] Virginia Tech, Bradley Dept Elect & Comp Engn, Blacksburg, VA USA
关键词
Cognitive radio; jammer; adversarial machine learning; deep learning; generative adversarial network; power control;
D O I
10.1109/TCCN.2018.2884910
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
An adversarial machine learning approach is introduced to launch jamming attacks on wireless communications and a defense strategy is presented. A cognitive transmitter uses a pre-trained classifier to predict the current channel status based on recent sensing results and decides whether to transmit or not, whereas a jammer collects channel status and ACKs to build a deep learning classifier that reliably predicts the next successful transmissions and effectively jams them. This jamming approach is shown to reduce the transmitter's performance much more severely compared with random or sensing-based jamming. The deep learning classification scores are used by the jammer for power control subject to an average power constraint. Next, a generative adversarial network is developed for the jammer to reduce the time to collect the training dataset by augmenting it with synthetic samples. As a defense scheme, the transmitter deliberately takes a small number of wrong actions in spectrum access (in form of a causative attack against the jammer) and therefore prevents the jammer from building a reliable classifier. The transmitter systematically selects when to take wrong actions and adapts the level of defense to mislead the jammer into making prediction errors and consequently increase its throughput.
引用
收藏
页码:2 / 14
页数:13
相关论文
共 39 条
[1]  
Abadi M, 2015, TENSORFLOW LARGE SCA
[2]   Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications [J].
Abu Alsheikh, Mohammad ;
Lin, Shaowei ;
Niyato, Dusit ;
Tan, Hwee-Pink .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1996-2018
[3]  
[Anonymous], 2017, ARXIV170508164
[4]  
[Anonymous], 2018, Guide to Vulnerability Analysis for Computer Networks and Systems
[5]  
[Anonymous], P IEEE INT S SIGN PR
[6]  
[Anonymous], 2014, ARXIV PREPRINT ARXIV
[7]  
Ateniese Giuseppe, 2015, International Journal of Security and Networks, V10, P137
[8]  
Biggio Battista, 2013, Machine Learning and Knowledge Discovery in Databases. European Conference, ECML PKDD 2013. Proceedings: LNCS 8190, P387, DOI 10.1007/978-3-642-40994-3_25
[9]  
Challita U., 2017, CORR
[10]   Applications of machine learning to cognitive radio networks [J].
Clancy, Charles ;
Hecker, Joe ;
Stuntebeck, Erich ;
O'Shea, Tim .
IEEE WIRELESS COMMUNICATIONS, 2007, 14 (04) :47-52