Adversarial jamming attacks and defense strategies via adaptive deep reinforcement learning

07/12/2020
by   Feng Wang, et al.
0

As the applications of deep reinforcement learning (DRL) in wireless communications grow, sensitivity of DRL based wireless communication strategies against adversarial attacks has started to draw increasing attention. In order to address such sensitivity and alleviate the resulting security concerns, we in this paper consider a victim user that performs DRL-based dynamic channel access, and an attacker that executes DRLbased jamming attacks to disrupt the victim. Hence, both the victim and attacker are DRL agents and can interact with each other, retrain their models, and adapt to opponents' policies. In this setting, we initially develop an adversarial jamming attack policy that aims at minimizing the accuracy of victim's decision making on dynamic channel access. Subsequently, we devise defense strategies against such an attacker, and propose three defense strategies, namely diversified defense with proportional-integral-derivative (PID) control, diversified defense with an imitation attacker, and defense via orthogonal policies. We design these strategies to maximize the attacked victim's accuracy and evaluate their performances.

READ FULL TEXT

page 4

page 5

page 6

page 7

page 8

page 9

page 11

page 13

research
05/12/2021

Adversarial Reinforcement Learning in Dynamic Channel Access and Power Control

Deep reinforcement learning (DRL) has recently been used to perform effi...
research
05/16/2022

Attacking and Defending Deep Reinforcement Learning Policies

Recent studies have shown that deep reinforcement learning (DRL) policie...
research
02/03/2023

Deep Reinforcement Learning for Cyber System Defense under Dynamic Adversarial Uncertainties

Development of autonomous cyber system defense strategies and action rec...
research
02/12/2021

Deep Reinforcement Learning for Backup Strategies against Adversaries

Many defensive measures in cyber security are still dominated by heurist...
research
06/03/2019

Adversarial Exploitation of Policy Imitation

This paper investigates a class of attacks targeting the confidentiality...
research
08/09/2023

Adversarial Deep Reinforcement Learning for Cyber Security in Software Defined Networks

This paper focuses on the impact of leveraging autonomous offensive appr...
research
05/08/2022

FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks

Channel hopping provides a defense mechanism against jamming attacks in ...

Please sign up or login with your details

Forgot password? Click here to reset