How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy

05/15/2020
by   Brian Kim, et al.
0

We consider the problem of hiding wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect whether any transmission of interest is present or not. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper, while a cooperative jammer (CJ) transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise. The CJ puts an upper bound on the strength of perturbation signal to limit its impact on the bit error rate (BER) at the receiver. We show that this adversarial perturbation causes the eavesdropper to misclassify the received signals as noise with high probability while increasing the BER only slightly. On the other hand, the CJ cannot fool the eavesdropper by simply transmitting Gaussian noise as in conventional jamming and instead needs to craft perturbation signals built by adversarial machine learning to enable covert communications. Our results show that signals with different modulation types and eventually 5G communications can be effectively hidden from an eavesdropper even if it is equipped with a DL classifier to detect transmissions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/11/2020

Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers

This paper presents channel-aware adversarial attacks against deep learn...
research
02/05/2020

Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels

We consider a wireless communication system that consists of a transmitt...
research
12/21/2021

Covert Communications via Adversarial Machine Learning and Reconfigurable Intelligent Surfaces

By moving from massive antennas to antenna surfaces for software-defined...
research
12/02/2020

Analyzing Training Using Phase Transitions in Entropy—Part II: Application to Quantization and Classification

We show that a quantized large-scale system with unknown parameters and ...
research
07/02/2018

Gaussian Signalling for Covert Communications

In this work, we examine the optimality of Gaussian signalling for cover...
research
09/05/2019

Coherent Optical Communications Enhanced by Machine Intelligence

Uncertainty in discriminating between different received coherent signal...
research
09/05/2022

Jamming Modulation: An Active Anti-Jamming Scheme

Providing quality communications under adversarial electronic attacks, e...

Please sign up or login with your details

Forgot password? Click here to reset