How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy

被引:14
作者
Kim, Brian [1 ]
Sagduyu, Yalin E. [2 ]
Davaslioglu, Kemal [2 ]
Erpek, Tugba [2 ]
Ulukus, Sennur [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Intelligent Automat Inc, Rockville, MD 20855 USA
来源
2020 54TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS | 2020年
关键词
PHYSICAL-LAYER; INFORMATION; NETWORKS; SECURITY;
D O I
10.1109/IEEECONF51394.2020.9443500
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of hiding wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect whether any transmission of interest is present or not. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper, while a cooperative jammer (CJ) transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise. The CJ puts an upper bound on the strength of perturbation signal to limit its impact on the bit error rate (BER) at the receiver. We show that this adversarial perturbation causes the eavesdropper to misclassify the received signals as noise with high probability while increasing the BER only slightly. On the other hand, the CJ cannot fool the eavesdropper by simply transmitting Gaussian noise as in conventional jamming and instead needs to craft perturbation signals built by adversarial machine learning to enable covert communications. Our results show that signals with different modulation types and eventually 5G communications can be effectively hidden from an eavesdropper even if it is equipped with a DL classifier to detect transmissions.
引用
收藏
页码:763 / 767
页数:5
相关论文
共 50 条
  • [21] Secure 5G Wireless Communications: A Joint Relay Selection and Wireless Power Transfer Approach
    Nam-Phong Nguyen
    Duong, Trung Q.
    Hien Quoc Ngo
    Hadzi-Velkov, Zoran
    Shu, Lei
    IEEE ACCESS, 2016, 4 : 3349 - 3359
  • [22] 5G Privacy: Scenarios and Solutions
    Liyanage, Madhusanka
    Salo, Jukka
    Braeken, An
    Kumar, Tanesh
    Seneviratne, Suranga
    Ylianttila, Mika
    2018 IEEE 5G WORLD FORUM (5GWF), 2018, : 197 - 203
  • [23] A Machine Learning Approach to 5G Infrastructure Market Optimization
    Bega, Dario
    Gramaglia, Marco
    Banchs, Albert
    Sciancalepore, Vincenzo
    Costa-Perez, Xavier
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 19 (03) : 498 - 512
  • [24] Machine Learning for early HARQ Feedback Prediction in 5G
    Strodthoff, Nils
    Goktepe, Baris
    Schierl, Thomas
    Samek, Wojciech
    Hellge, Cornelius
    2018 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2018,
  • [25] Broadband Optimization of Perfect Anomalous Reflective Metasurfaces for Beyond 5G Wireless Communications
    Yonemura, Kazuma
    Nakata, Yosuke
    Kato, Yuto
    Sanada, Atsushi
    2022 ASIA-PACIFIC MICROWAVE CONFERENCE (APMC), 2022, : 222 - 224
  • [26] Selection of Waveform Parameters Using Machine Learning for 5G and Beyond
    Yazar, Ahmet
    Arslan, Huseyin
    2019 IEEE 30TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2019, : 477 - 482
  • [27] NOMA-based Energy-Efficient Wireless Powered Communications in 5G Systems
    Zewde, Tewodros A.
    Gursoy, M. Cenk
    2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [28] UbiPriSEQ-Deep Reinforcement Learning to Manage Privacy, Security, Energy, and QoS in 5G IoT HetNets
    Mohammed, Thaha
    Albeshri, Aiiad
    Katib, Iyad
    Mehmood, Rashid
    APPLIED SCIENCES-BASEL, 2020, 10 (20): : 1 - 18
  • [29] Deep learning in physical layer communications: Evolution and prospects in 5G and 6G networks
    Mao, Chengchen
    Mu, Zongwen
    Liang, Qilian
    Schizas, Ioannis
    Pan, Chenyun
    IET COMMUNICATIONS, 2023, 17 (16) : 1863 - 1876
  • [30] Deep learning based modulation classification for 5G and beyond wireless systems
    Clement, J. Christopher
    Indira, N.
    Vijayakumar, P.
    Nandakumar, R.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (01) : 319 - 332