IoT Network Security from the Perspective of Adversarial Deep Learning

被引:23
|
作者
Sagduyu, Yalin E. [1 ]
Shi, Yi [1 ,2 ]
Erpek, Tugba [1 ,3 ]
机构
[1] Intelligent Automat Inc, Rockville, MD 20855 USA
[2] Virginia Tech, Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
[3] Virginia Tech, Hume Ctr, Dept Elect & Comp Engn, Arlington, VA 22203 USA
来源
2019 16TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON) | 2019年
关键词
Adversarial machine learning; IoT; wireless communications; machine learning; deep learning; IoT security; exploratory attack; causative attack; evasion attack;
D O I
10.1109/sahcn.2019.8824956
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Machine learning finds rich applications in Internet of Things (IoT) networks such as information retrieval, traffic management, spectrum sensing, and signal authentication. While there is a surge of interest to understand the security issues of machine learning, their implications have not been understood yet for wireless applications such as those in IoT systems that are susceptible to various attacks due the open and broadcast nature of wireless communications. To support IoT systems with heterogeneous devices of different priorities, we present new techniques built upon adversarial machine learning and apply them to three types of over-the-air (OTA) wireless attacks, namely denial of service (DoS) attack in terms of jamming, spectrum poisoning attack, and priority violation attack. By observing the spectrum, the adversary starts with an exploratory attack to infer the channel access algorithm of an IoT transmitter by building a deep neural network classifier that predicts the transmission outcomes. Based on these prediction results, the wireless attack continues to either jam data transmissions or manipulate sensing results over the air (by transmitting during the sensing phase) to fool the transmitter into making wrong transmit decisions in the test phase (corresponding to an evasion attack). When the IoT transmitter collects sensing results as training data to retrain its channel access algorithm, the adversary launches a causative attack to manipulate the input data to the transmitter over the air. We show that these attacks with different levels of energy consumption and stealthiness lead to significant loss in throughput and success ratio in wireless communications for IoT systems. Then we introduce a defense mechanism that systematically increases the uncertainty of the adversary at the inference stage and improves the performance. Results provide new insights on how to attack and defend IoT networks using deep learning.
引用
收藏
页数:9
相关论文
共 50 条
  • [21] Face Occlusion Recognition With Deep Learning in Security Framework for the IoT
    Mao, Li
    Sheng, Fusheng
    Zhang, Tao
    IEEE ACCESS, 2019, 7 : 174531 - 174540
  • [22] Classifying IoT security risks using Deep Learning algorithms
    Abbass, Wissam
    Bakraouy, Zineb
    Baina, Amine
    Bellafkih, Mostafa
    2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 205 - 210
  • [23] Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network Traffic
    Pantelakis, Vasileios
    Bountakas, Panagiotis
    Farao, Aristeidis
    Xenakis, Christos
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [24] IoT security using deep learning algorithm: intrusion detection model using LSTM
    Lija, Abitha V. K.
    Shobana, R.
    Misbha, J. Caroline
    Chandrakala, S.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2025, 17 (1-2) : 283 - 293
  • [25] Deep Learning for IoT Communications
    Thompson, Willie L.
    Talley, Michael F., Jr.
    2019 53RD ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2019,
  • [26] Black-Box Adversarial Attack for Deep Learning Classifiers in IoT Applications
    Singh, Abhijit
    Sikdar, Biplab
    2022 IEEE 8TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2022,
  • [27] Botnet-based IoT network traffic analysis using deep learning
    Singh, N. Joychandra
    Hoque, Nazrul
    Singh, Kh. Robindro
    Bhattacharyya, Dhruba K.
    SECURITY AND PRIVACY, 2024, 7 (02)
  • [28] Robustness and Security in Deep Learning: Adversarial Attacks and Countermeasures
    Kaur, Navjot
    Singh, Someet
    Deore, Shailesh Shivaji
    Vidhate, Deepak A.
    Haridas, Divya
    Kosuri, Gopala Varma
    Kolhe, Mohini Ravindra
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 1250 - 1257
  • [29] A Network Security Classifier Defense: Against Adversarial Machine Learning Attacks
    De Lucia, Michael J.
    Cotton, Chase
    PROCEEDINGS OF THE 2ND ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING, WISEML 2020, 2020, : 67 - 73
  • [30] Adversarial Examples-Security Threats to COVID-19 Deep Learning Systems in Medical IoT Devices
    Rahman, Md Abdur
    Hossain, M. Shamim
    Alrajeh, Nabil A.
    Alsolami, Fawaz
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12) : 9603 - 9610