When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing

05/04/2019
by   Zhengping Luo, et al.
0

Defense strategies have been well studied to combat Byzantine attacks that aim to disrupt cooperative spectrum sensing by sending falsified sensing data. However, existing studies usually make network or attack assumptions biased towards the defense (e.g., assuming the prior knowledge of attacks is known). In practice, attackers can adopt any arbitrary behavior and avoid any pre-assumed pattern or assumption used by defense strategies. In this paper, we revisit this traditional security problem and propose a novel learning-empowered framework named Learn-Evaluate-Beat (LEB) to mislead the fusion center. Based on the black-box nature of the fusion center in cooperative spectrum sensing process, our new perspective is to make the adversarial use of machine learning to construct a surrogate model of the fusion center's decision model. Then, we propose a generic algorithm to create malicious sensing data. Our real-world experiments show that the LEB attack is very effective to beat a wide range of existing defense strategies with an up to 82 defenses, we introduce a non-invasive and parallel method named as influence-limiting policy sided with existing defenses to defend against the LEB-based or other similar attacks, which demonstrates a strong performance in terms of overall disruption ratio reduction by up to 80

READ FULL TEXT

page 8

page 9

research
03/11/2023

Investigating Stateful Defenses Against Black-Box Adversarial Examples

Defending machine-learning (ML) models against white-box adversarial att...
research
04/01/2018

Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning

As machine learning becomes widely used for automated decisions, attacke...
research
09/14/2020

A Game Theoretic Analysis of Additive Adversarial Attacks and Defenses

Research in adversarial learning follows a cat and mouse game between at...
research
03/12/2023

Multi-metrics adaptively identifies backdoors in Federated learning

The decentralized and privacy-preserving nature of federated learning (F...
research
08/12/2019

Employing Game Theory and TDMA Protocol to Enhance Security and Manage Power Consumption in WSNs-based Cognitive Radio

The rapid development of wireless sensor networks (WSNs) is the signific...
research
08/22/2022

An Input-Aware Mimic Defense Theory and its Practice

The current security problems in cyberspace are characterized by strong ...
research
10/23/2018

Adversarial WiFi Sensing

Wireless devices are everywhere, at home, at the office, and on the stre...

Please sign up or login with your details

Forgot password? Click here to reset