Adversarial Machine Learning in Wireless Communications Using RF Data: A Review

被引:45
|
作者
Adesina, Damilola [1 ]
Hsieh, Chung-Chu [2 ]
Sagduyu, Yalin E. [3 ]
Qian, Lijun [1 ]
机构
[1] Prairie View A&M Univ, Ctr Excellence Res & Educ Big Mil Data Intelligenc, CREDIT Ctr, Dept Elect & Comp Engn, Prairie View, TX 77446 USA
[2] Norfolk State Univ, Ctr Excellence Cyber Secur, Norfolk, VA 23504 USA
[3] Virginia Tech, Natl Secur Inst, Arlington, VA 22203 USA
来源
基金
美国国家科学基金会;
关键词
Wireless communication; Communication system security; Wireless sensor networks; Perturbation methods; Deep learning; Radio frequency; Data models; Adversarial machine learning; machine learning security; wireless security; wireless attacks; defenses; SIGNAL CLASSIFICATION; ARTIFICIAL-INTELLIGENCE; MODULATION RECOGNITION; RESOURCE-ALLOCATION; COGNITIVE RADIO; NEURAL-NETWORKS; DEEP; ATTACKS; SECURITY; CNN;
D O I
10.1109/COMST.2022.3205184
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning (ML) provides effective means to learn from spectrum data and solve complex tasks involved in wireless communications. Supported by recent advances in computational resources and algorithmic designs, deep learning (DL) has found success in performing various wireless communication tasks such as signal recognition, spectrum sensing and waveform design. However, ML in general and DL in particular have been found vulnerable to manipulations thus giving rise to a field of study called adversarial machine learning (AML). Although AML has been extensively studied in other data domains such as computer vision and natural language processing, research for AML in the wireless communications domain is still in its early stage. This paper presents a comprehensive review of the latest research efforts focused on AML in wireless communications while accounting for the unique characteristics of wireless systems. First, the background of AML attacks on deep neural networks is discussed and a taxonomy of AML attack types is provided. Various methods of generating adversarial examples and attack mechanisms are also described. In addition, an holistic survey of existing research on AML attacks for various wireless communication problems as well as the corresponding defense mechanisms in the wireless domain are presented. Finally, as new attacks and defense techniques are developed, recent research trends and the overarching future outlook for AML in next-generation wireless communications are discussed.
引用
收藏
页码:77 / 100
页数:24
相关论文
共 50 条
  • [21] ADVERSARIAL NETWORKS FOR SECURE WIRELESS COMMUNICATIONS
    Marchioro, Thomas
    Laurenti, Nicola
    Gunduz, Deniz
    2020 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2020, : 8748 - 8752
  • [22] Review of Optical Wireless Communications for Data Centers
    Arnon, Shlomi
    ADVANCED FREE-SPACE OPTICAL COMMUNICATION TECHNIQUES AND APPLICATIONS III, 2017, 10437
  • [23] Efficient Wireless Communications Schemes for Machine to Machine Communications
    Kim, Ronny Yongho
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 3, 2011, 181 : 313 - 323
  • [24] Multi-Agent Reinforcement Learning for Wireless Networks Against Adversarial Communications
    Lv, Zefang
    Chen, Yifan
    Xiao, Liang
    Yang, Helin
    Ji, Xiangyang
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 3409 - 3414
  • [25] Adversarial Approaches to Tackle Imbalanced Data in Machine Learning
    Ayoub, Shahnawaz
    Gulzar, Yonis
    Rustamov, Jaloliddin
    Jabbari, Abdoh
    Reegu, Faheem Ahmad
    Turaev, Sherzod
    SUSTAINABILITY, 2023, 15 (09)
  • [26] A Review on Machine Learning Big Data using R
    Prakash, M.
    Padmapriya, G.
    Kumar, M. Vinoth
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1873 - 1877
  • [27] RF D transceiver for 433 MHz, ISM wireless data communications
    RF Micro Devices Inc
    Electron Eng London, 856 (21, 22, 24, 26, 28):
  • [28] Adversarial Machine Learning in Industry: A Systematic Literature Review
    Jedrzejewski, Felix Viktor
    Thode, Lukas
    Fischbach, Jannik
    Gorschek, Tony
    Mendez, Daniel
    Lavesson, Niklas
    COMPUTERS & SECURITY, 2024, 145
  • [29] Machine Learning for Signal Demodulation in Underwater Wireless Optical Communications
    Ma, Shuai
    Yang, Lei
    Ding, Wanying
    Li, Hang
    Zhang, Zhongdan
    Xu, Jing
    Li, Zongyan
    Xu, Gang
    Li, Shiyin
    CHINA COMMUNICATIONS, 2024, 21 (05) : 297 - 313
  • [30] Knowledge-Driven Machine Learning and Applications in Wireless Communications
    Li, Daofeng
    Xu, Yamei
    Zhao, Ming
    Zhu, Jinkang
    Zhang, Sihai
    IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2022, 8 (02) : 454 - 467