How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy

被引:14
作者
Kim, Brian [1 ]
Sagduyu, Yalin E. [2 ]
Davaslioglu, Kemal [2 ]
Erpek, Tugba [2 ]
Ulukus, Sennur [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Intelligent Automat Inc, Rockville, MD 20855 USA
来源
2020 54TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS | 2020年
关键词
PHYSICAL-LAYER; INFORMATION; NETWORKS; SECURITY;
D O I
10.1109/IEEECONF51394.2020.9443500
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of hiding wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect whether any transmission of interest is present or not. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper, while a cooperative jammer (CJ) transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise. The CJ puts an upper bound on the strength of perturbation signal to limit its impact on the bit error rate (BER) at the receiver. We show that this adversarial perturbation causes the eavesdropper to misclassify the received signals as noise with high probability while increasing the BER only slightly. On the other hand, the CJ cannot fool the eavesdropper by simply transmitting Gaussian noise as in conventional jamming and instead needs to craft perturbation signals built by adversarial machine learning to enable covert communications. Our results show that signals with different modulation types and eventually 5G communications can be effectively hidden from an eavesdropper even if it is equipped with a DL classifier to detect transmissions.
引用
收藏
页码:763 / 767
页数:5
相关论文
共 50 条
  • [41] Evolution of 5G Wireless Network in IoT
    Arora, Saurabh
    Sharma, Nikhil
    Bhushan, Bharat
    Kaushik, Ila
    Ahmad, Anas
    2020 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2020), 2020, : 108 - 113
  • [42] Relay selection for secure 5G green communications
    Nikolaos Nomikos
    Ana Nieto
    Prodromos Makris
    Dimitrios N. Skoutas
    Demosthenes Vouyioukas
    Panagiotis Rizomiliotis
    Javier Lopez
    Charalambos Skianis
    Telecommunication Systems, 2015, 59 : 169 - 187
  • [43] Mobile assisted directional paging for 5G communications
    Agiwal, Mamta
    Saxena, Navrati
    Roy, Abhishek
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2018, 29 (02):
  • [44] The Case for Federated Identity Management in 5G Communications
    Edris, Ed Kamya Kiyemba
    Aiash, Mahdi
    Loo, Jonathan Kok-Keng
    2020 FIFTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2020, : 120 - 127
  • [45] 5G multimedia massive MIMO communications systems
    Ge, Xiaohu
    Wang, Haichao
    Zi, Ran
    Li, Qiang
    Ni, Qiang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2016, 16 (11) : 1377 - 1388
  • [46] Security for 5G Mobile Wireless Networks
    Fang, Dongfeng
    Qian, Yi
    Hu, Rose Qingyang
    IEEE ACCESS, 2018, 6 : 4850 - 4874
  • [47] 5G Vehicle-to-Everything Services: Gearing Up for Security and Privacy
    Lu, Rongxing
    Zhang, Lan
    Ni, Jianbing
    Fang, Yuguang
    PROCEEDINGS OF THE IEEE, 2020, 108 (02) : 373 - 389
  • [48] Relay selection for secure 5G green communications
    Nomikos, Nikolaos
    Nieto, Ana
    Makris, Prodromos
    Skoutas, Dimitrios N.
    Vouyioukas, Demosthenes
    Rizomiliotis, Panagiotis
    Lopez, Javier
    Skianis, Charalambos
    TELECOMMUNICATION SYSTEMS, 2015, 59 (01) : 169 - 187
  • [49] WEARABLE COMMUNICATIONS IN 5G Challenges and Enabling Technologies
    Sun, Haijian
    Zhang, Zekun
    Hu, Rose Qingyang
    Qian, Yi
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2018, 13 (03): : 100 - 109
  • [50] A Study on Deep Learning for Latency Constraint Applications in Beyond 5G Wireless Systems
    Sritharan, Suren
    Weligampola, Harshana
    Gacanin, Haris
    IEEE ACCESS, 2020, 8 : 218037 - 218061