RETRACTED: Detection of Constellation-Modulated Wireless Covert Channel Based on Adjusted CNN Model (Retracted Article)

被引:1
作者
Huang, Shuhua [1 ]
Liu, Weiwei [1 ]
Liu, Guangjie [2 ]
Dai, Yuewei [2 ]
Bai, Huiwen [1 ]
机构
[1] Nanjing Univ Sci & Technol, Nanjing 210094, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Nanjing 210044, Peoples R China
基金
中国国家自然科学基金;
关键词
NEURAL-NETWORKS;
D O I
10.1155/2021/5569745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of wireless communication technology, more and more information leakage is realized through a wireless covert channel, which brings great challenges to the security of wireless communication. Compared with the wireless covert channel on the upper layer, the wireless covert channel based on the physical layer (WCC-P) has better concealment and greater capacity. As the most widely used scheme of WCC-P, the wireless covert channel with the modulation of the constellation point (WCC-MC) has attracted more and more attention. In this paper, a deep learning scheme based on amplitude-phase characteristics is proposed to detect and classify the WCC-MC scheme. We first extract the amplitude and phase characteristic of error vector magnitude (EVM) and constellation points and then map the amplitude and phase characteristic to the grayscale image, respectively. Finally, the generated feature images are trained, detected, and classified with the adjusted convolution neural network. The experimental results show that the detection accuracy of our proposed scheme can reach 98.5%, and the classification accuracy can reach 81.7%.
引用
收藏
页数:14
相关论文
共 34 条
[11]  
Dutta Aveek, 2013, Information Hiding. 14th International Conference, IH 2012 Revised Selected Papers, P160, DOI 10.1007/978-3-642-36373-3_11
[12]  
Gianvecchio S, 2008, LECT NOTES COMPUT SC, V5230, P211, DOI 10.1007/978-3-540-87403-4_12
[13]   An Entropy-Based Approach to Detecting Covert Timing Channels [J].
Gianvecchio, Steven ;
Wang, Haining .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) :785-797
[14]   Reducing the dimensionality of data with neural networks [J].
Hinton, G. E. ;
Salakhutdinov, R. R. .
SCIENCE, 2006, 313 (5786) :504-507
[15]   Exploiting Correlation Characteristics to Detect Covert digital communication [J].
Huang, Shuhua ;
Liu, Weiwei ;
Liu, Guangjie ;
Dai, Yuewei ;
Tian, Wen .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (08) :3550-3566
[16]   Transfer batch sizing in flexible manufacturing systems [J].
Langevin, A ;
Riopel, D ;
Stecke, KE .
JOURNAL OF MANUFACTURING SYSTEMS, 1999, 18 (02) :140-151
[17]   Gradient-based learning applied to document recognition [J].
Lecun, Y ;
Bottou, L ;
Bengio, Y ;
Haffner, P .
PROCEEDINGS OF THE IEEE, 1998, 86 (11) :2278-2324
[18]  
Luo X., 2007, CLOAK 10 FOLD WAY RE
[19]  
Nielsen M. A., 2015, Neural networks and deep learning, V2018
[20]  
Praveenkumar P., 2013, P 2013 IEEE C INF CO