Deep Learning for Launching and Mitigating Wireless Jamming Attacks

07/03/2018
by   Tugba Erpek, et al.
0

An adversarial machine learning approach is introduced to launch jamming attacks on wireless communications and a defense strategy is provided. A cognitive transmitter uses a pre-trained classifier to predict current channel status based on recent sensing results and decides whether to transmit or not, whereas a jammer collects channel status and ACKs to build a deep learning classifier that reliably predicts whether there will be a successful transmission next and effectively jams these transmissions. This jamming approach is shown to reduce the performance of the transmitter much more severely compared with randomized or sensing-based jamming. Next, a generative adversarial network (GAN) is developed for the jammer to reduce the time to collect the training dataset by augmenting it with synthetic samples. Then, a defense scheme is introduced for the transmitter that prevents the jammer from building a reliable classifier by deliberately taking a small number of wrong actions (in form of a causative attack launched against the jammer) when it accesses the spectrum. The transmitter systematically selects when to take wrong actions and adapts the level of defense to machine learning-based or conventional jamming behavior in order to mislead the jammer into making prediction errors and consequently increase its throughput.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/01/2019

Adversarial Deep Learning for Over-the-Air Spectrum Poisoning Attacks

An adversarial deep learning approach is presented to launch over-the-ai...
research
01/26/2019

Spectrum Data Poisoning with Adversarial Deep Learning

Machine learning has been widely applied in wireless communications. How...
research
05/31/2019

IoT Network Security from the Perspective of Adversarial Deep Learning

Machine learning finds rich applications in Internet of Things (IoT) net...
research
05/03/2019

Generative Adversarial Network for Wireless Signal Spoofing

The paper presents a novel approach of spoofing wireless signals by usin...
research
12/20/2022

Is Semantic Communications Secure? A Tale of Multi-Domain Adversarial Attacks

Semantic communications seeks to transfer information from a source whil...
research
11/05/2018

Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls

Machine learning has been applied to a broad range of applications and s...
research
01/11/2023

Age of Information in Deep Learning-Driven Task-Oriented Communications

This paper studies the notion of age in task-oriented communications tha...

Please sign up or login with your details

Forgot password? Click here to reset