ADVERSARIAL NETWORKS FOR SECURE WIRELESS COMMUNICATIONS

被引:0
|
作者
Marchioro, Thomas [1 ]
Laurenti, Nicola [1 ]
Gunduz, Deniz [2 ]
机构
[1] Univ Padua, Padua, Italy
[2] Imperial Coll London, London, England
基金
欧洲研究理事会;
关键词
security; wiretap channel; convolutional neural networks; generative adversarial networks;
D O I
10.1109/icassp40776.2020.9053216
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
We propose a data-driven secure wireless communication scheme, in which the goal is to transmit a signal to a legitimate receiver with minimal distortion, while keeping some information about the signal private from an eavesdropping adversary. When the data distribution is known, the optimal trade-off between the reconstruction quality at the legitimate receiver and the leakage to the adversary can be characterised in the information theoretic asymptotic limit. In this paper, we assume that we do not know the data distribution, but instead have access to a dataset, and we are interested in the finite blocklength regime rather than the asymptotic limits. We propose a data-driven adversarially trained deep joint source-channel coding architecture, and demonstrate through experiments with CIFAR-10 dataset that it is possible to transmit to the legitimate receiver with minimal end-to-end distortion while concealing information on the image class from the adversary.
引用
收藏
页码:8748 / 8752
页数:5
相关论文
共 50 条
  • [1] Secure group communications for wireless networks
    DeCleene, B
    Dondeti, L
    Griffin, S
    Hardjono, T
    Kiwior, D
    Kurose, J
    Towsley, D
    Vasudevan, S
    Zhang, C
    [J]. 2001 MILCOM, VOLS 1 AND 2, PROCEEDINGS: COMMUNICATIONS FOR NETWORK-CENTRIC OPERATIONS: CREATING THE INFORMATION FORCE, 2001, : 113 - 117
  • [2] TOWARD SECURE COGNITIVE COMMUNICATIONS IN WIRELESS NETWORKS
    Jiang, Tingting
    Li, Tongtong
    Ren, Jian
    [J]. IEEE WIRELESS COMMUNICATIONS, 2012, 19 (04) : 82 - 88
  • [3] Network decoupling for secure communications in wireless sensor networks
    Gu, Wenjun
    Bai, Xiaole
    Chellappan, Sriram
    Xuan, Dong
    [J]. 2006 14TH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, PROCEEDINGS, 2006, : 189 - +
  • [4] Pseudonymous Communications in Secure Industrial Wireless Sensor Networks
    Oualha, Nouha
    Olivereau, Alexis
    Boudguiga, Aymen
    [J]. 2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 98 - 102
  • [5] Optical wireless communications for cyber-secure ubiquitous wireless networks
    Abumarshoud, Hanaa
    Chen, Cheng
    Islim, Mohamed Sufyan
    Haas, Harald
    [J]. PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2020, 476 (2242):
  • [6] Generative Adversarial Networks for Secure Data Transmission in Wireless Network
    Jayabalan, E.
    Pugazendi, R.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (03): : 3757 - 3784
  • [7] Secure Many-to-One Communications in Wireless Sensor Networks
    Viejo, Alexandre
    Domingo-Ferrer, Josep
    Sebe, Francesc
    Castella-Roca, Jordi
    [J]. SENSORS, 2009, 9 (07) : 5324 - 5338
  • [8] Secure group communications over combined wired and wireless networks
    Nam, J
    Kim, S
    Won, D
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, 2005, 3592 : 90 - 99
  • [9] SCUR: Secure communications in Wireless Sensor Networks using Rabbit
    Tahir, Ruhma
    Javed, Muhammad Younas
    Ahmad, Attiq
    Iqbal, Raja
    [J]. WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 523 - +
  • [10] Network decoupling: A methodology for secure communications in wireless sensor networks
    Gu, Wenjun
    Bai, Xiaole
    Chellappan, Sriram
    Xuan, Dong
    Jia, Weijia
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (12) : 1784 - 1796