The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection

被引:53
作者
Hameed, Muhammad Zaid [1 ,2 ]
Gyorgy, Andras [3 ]
Gunduz, Deniz [1 ]
机构
[1] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
[2] Imperial Coll London, Dept Comp, London SW7 2AZ, England
[3] DeepMind, London N1C 4AG, England
基金
欧洲研究理事会;
关键词
Secure communication; deep learning; adversarial attacks; modulation classification;
D O I
10.1109/TIFS.2020.3025441
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider a communication scenario, in which an intruder tries to determine the modulation scheme of the intercepted signal. Our aim is to minimize the accuracy of the intruder, while guaranteeing that the intended receiver can still recover the underlying message with the highest reliability. This is achieved by perturbing channel input symbols at the encoder, similarly to adversarial attacks against classifiers in machine learning. In image classification, the perturbation is limited to be imperceptible to a human observer, while in our case the perturbation is constrained so that the message can still be reliably decoded by the legitimate receiver, which is oblivious to the perturbation. Simulation results demonstrate the viability of our approach to make wireless communication secure against state-of-the-art intruders (using deep learning or decision trees) with minimal sacrifice in the communication performance. On the other hand, we also demonstrate that using diverse training data and curriculum learning can significantly boost the accuracy of the intruder.
引用
收藏
页码:1074 / 1087
页数:14
相关论文
共 38 条
[1]   Automatic modulation classification based on high order cumulants and hierarchical polynomial classifiers [J].
Abdelmutalab, Ameen ;
Assaleh, Khaled ;
El-Tarhuni, Mohamed .
PHYSICAL COMMUNICATION, 2016, 21 :10-18
[2]  
[Anonymous], 2017, IEEE INT S DYNAMIC
[3]  
[Anonymous], 2019, ARXIV190210674
[4]  
[Anonymous], PHYS COMMUN
[5]  
[Anonymous], 2016, TECHNICAL REPORT CLE
[6]   The security of machine learning [J].
Barreno, Marco ;
Nelson, Blaine ;
Joseph, Anthony D. ;
Tygar, J. D. .
MACHINE LEARNING, 2010, 81 (02) :121-148
[7]  
Bash BA, 2012, IEEE INT SYMP INFO, P448, DOI 10.1109/ISIT.2012.6284228
[8]   Learning Deep Architectures for AI [J].
Bengio, Yoshua .
FOUNDATIONS AND TRENDS IN MACHINE LEARNING, 2009, 2 (01) :1-127
[9]  
Bruna J., 2014, ICLR, P2
[10]   Towards Evaluating the Robustness of Neural Networks [J].
Carlini, Nicholas ;
Wagner, David .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :39-57