Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems

被引:29
作者
Bahramali, Alireza [1 ]
Nasr, Milad [1 ]
Houmansadr, Amir [1 ]
Goeckel, Dennis [1 ]
Towsley, Don [1 ]
机构
[1] Univ Massachusetts, Amherst, MA 01003 USA
来源
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2021年
关键词
Wireless Communication Systems; Adversarial Examples; Universal Perturbations; Deep Neural Networks; CHANNEL ESTIMATION; DEEP;
D O I
10.1145/3460120.3484777
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is significant enthusiasm for the employment of Deep Neural Networks (DNNs) for important tasks in major wireless communication systems: channel estimation and decoding in orthogonal frequency division multiplexing (OFDM) systems, end-to-end autoencoder system design, radio signal classification, and signal authentication. Unfortunately, DNNs can be susceptible to adversarial examples, potentially making such wireless systems fragile and vulnerable to attack. In this work, by designing robust adversarial examples that meet key criteria, we perform a comprehensive study of the threats facing DNN-based wireless systems. We model the problem of adversarial wireless perturbations as an optimization problem that incorporates domain constraints specific to different wireless systems. This allows us to generate wireless adversarial perturbations that can be applied to wireless signals on-the-fly (i.e., with no need to know the target signals a priori), are undetectable from natural wireless noise, and are robust against removal. We show that even in the presence of significant defense mechanisms deployed by the communicating parties, our attack performs significantly better compared to existing attacks against DNN-based wireless systems. In particular, the results demonstrate that even when employing well-considered defenses, DNN-based wireless communication systems are vulnerable to adversarial attacks and call into question the employment of DNNs for a number of tasks in robust wireless communication.
引用
收藏
页码:126 / 140
页数:15
相关论文
共 48 条
[1]  
Albaseer Abdullatif., 2020, 2020 IEEE INT C INF
[2]   On the Limitations of Targeted Adversarial Evasion Attacks Against Deep Learning Enabled Modulation Recognition [J].
Bair, Samuel ;
DelVecchio, Matthew ;
Flowers, Bryse ;
Michaels, Alan J. ;
Headley, William C. .
PROCEEDINGS OF THE 2019 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING (WISEML '19), 2019, :25-30
[3]   Five Disruptive Technology Directions for 5G [J].
Boccardi, Federico ;
Heath, Robert W., Jr. ;
Lozano, Angel ;
Marzetta, Thomas L. ;
Popovski, Petar .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (02) :74-80
[4]  
Cohen J, 2019, PR MACH LEARN RES, V97
[5]   DEEP LEARNING FOR WIRELESS COMMUNICATIONS: AN EMERGING INTERDISCIPLINARY PARADIGM [J].
Dai, Linglong ;
Jiao, Ruicheng ;
Adachi, Fumiyuki ;
Poor, H. Vincent ;
Hanzo, Lajos .
IEEE WIRELESS COMMUNICATIONS, 2020, 27 (04) :133-139
[6]  
DelVecchio Matthew., 2020, ARXIV PREPRINT ARXIV
[7]  
Demir Ali Fatih, 2019, ARXIV PREPRINT ARXIV
[8]   Survey of automatic modulation classification techniques: classical approaches and new trends [J].
Dobre, O. A. ;
Abdi, A. ;
Bar-Ness, Y. ;
Su, W. .
IET COMMUNICATIONS, 2007, 1 (02) :137-156
[9]   Boosting Adversarial Attacks with Momentum [J].
Dong, Yinpeng ;
Liao, Fangzhou ;
Pang, Tianyu ;
Su, Hang ;
Zhu, Jun ;
Hu, Xiaolin ;
Li, Jianguo .
2018 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2018, :9185-9193
[10]  
EWest Nathan, 2017, 2017 IEEE INT S DYN