How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy

被引:13
|
作者
Kim, Brian [1 ]
Sagduyu, Yalin E. [2 ]
Davaslioglu, Kemal [2 ]
Erpek, Tugba [2 ]
Ulukus, Sennur [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
[2] Intelligent Automat Inc, Rockville, MD 20855 USA
关键词
PHYSICAL-LAYER; INFORMATION; NETWORKS; SECURITY;
D O I
10.1109/IEEECONF51394.2020.9443500
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We consider the problem of hiding wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect whether any transmission of interest is present or not. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper, while a cooperative jammer (CJ) transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise. The CJ puts an upper bound on the strength of perturbation signal to limit its impact on the bit error rate (BER) at the receiver. We show that this adversarial perturbation causes the eavesdropper to misclassify the received signals as noise with high probability while increasing the BER only slightly. On the other hand, the CJ cannot fool the eavesdropper by simply transmitting Gaussian noise as in conventional jamming and instead needs to craft perturbation signals built by adversarial machine learning to enable covert communications. Our results show that signals with different modulation types and eventually 5G communications can be effectively hidden from an eavesdropper even if it is equipped with a DL classifier to detect transmissions.
引用
收藏
页码:763 / 767
页数:5
相关论文
共 50 条
  • [41] A Machine Learning Based Design of mmWave Compact Array Antenna for 5G Communications
    Mallat, Nazih K.
    Jafarieh, Alireza
    Nouri, Mahdi
    Behroozi, Hamid
    2022 5TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS, SIGNAL PROCESSING, AND THEIR APPLICATIONS (ICCSPA), 2022,
  • [42] 5G Wireless Communication Networks: Challenges in Security and Privacy
    Qian, Yi
    IEEE Wireless Communications, 2020, 27 (04): : 2 - 3
  • [43] A review of machine learning techniques for enhanced energy efficient 5G and 6G communications
    Fowdur, Tulsi Pawan
    Doorgakant, Bhuvaneshwar
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 122
  • [44] Artificial intelligence (AI) and machine learning (ML) for beyond 5G/6G communications
    Matin, Mohammad Abdul
    Goudos, Sotirios K.
    Wan, Shaohua
    Sarigiannidis, Panagiotis
    Tentzeris, Emmanouil M.
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2023, 2023 (01)
  • [45] 5G Wireless Security and Privacy: Architecture and Flexible Mechanisms
    Fang, Dongfeng
    Qian, Yi
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2020, 15 (02): : 58 - 64
  • [46] 5G WIRELESS COMMUNICATION NETWORKS: CHALLENGES IN SECURITY AND PRIVACY
    Qian, Yi
    IEEE WIRELESS COMMUNICATIONS, 2020, 27 (04) : 2 - 3
  • [47] Artificial intelligence (AI) and machine learning (ML) for beyond 5G/6G communications
    Mohammad Abdul Matin
    Sotirios K. Goudos
    Shaohua Wan
    Panagiotis Sarigiannidis
    Emmanouil M. Tentzeris
    EURASIP Journal on Wireless Communications and Networking, 2023
  • [48] Integrated Energy and Spectrum Harvesting for 5G Wireless Communications
    Liu, Yi
    Zhang, Yan
    Yu, Rong
    Xie, Shengli
    IEEE NETWORK, 2015, 29 (03): : 75 - 81
  • [49] Waveform Performance For Asynchronous Wireless 5G Uplink Communications
    Wang, Shendi
    Armstrong, Jean
    Thompson, John S.
    2016 IEEE 27TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2016, : 211 - 216
  • [50] Software Defined Apertures for 5G Wireless Network Communications
    Black, Eric J.
    Katko, Alexander R.
    Deutsch, Brian
    2015 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2015, : 124 - 129