Cargando…

Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas

This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper. In the meantime, a cooperative jammer (CJ)...

Descripción completa

Detalles Bibliográficos
Autores principales: Kim, Brian, Sagduyu, Yalin, Davaslioglu, Kemal, Erpek, Tugba, Ulukus, Sennur
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9407147/
https://www.ncbi.nlm.nih.gov/pubmed/36010711
http://dx.doi.org/10.3390/e24081047
_version_ 1784774293435973632
author Kim, Brian
Sagduyu, Yalin
Davaslioglu, Kemal
Erpek, Tugba
Ulukus, Sennur
author_facet Kim, Brian
Sagduyu, Yalin
Davaslioglu, Kemal
Erpek, Tugba
Ulukus, Sennur
author_sort Kim, Brian
collection PubMed
description This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper. In the meantime, a cooperative jammer (CJ) with multiple antennas transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise. While generating the adversarial perturbation at the CJ, multiple antennas are utilized to improve the attack performance in terms of fooling the eavesdropper. Two main points are considered while exploiting the multiple antennas at the adversary, namely the power allocation among antennas and the utilization of channel diversity. To limit the impact on the bit error rate (BER) at the receiver, the CJ puts an upper bound on the strength of the perturbation signal. Performance results show that this adversarial perturbation causes the eavesdropper to misclassify the received signals as noise with a high probability while increasing the BER at the legitimate receiver only slightly. Furthermore, the adversarial perturbation is shown to become more effective when multiple antennas are utilized.
format Online
Article
Text
id pubmed-9407147
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-94071472022-08-26 Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas Kim, Brian Sagduyu, Yalin Davaslioglu, Kemal Erpek, Tugba Ulukus, Sennur Entropy (Basel) Article This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper. In the meantime, a cooperative jammer (CJ) with multiple antennas transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise. While generating the adversarial perturbation at the CJ, multiple antennas are utilized to improve the attack performance in terms of fooling the eavesdropper. Two main points are considered while exploiting the multiple antennas at the adversary, namely the power allocation among antennas and the utilization of channel diversity. To limit the impact on the bit error rate (BER) at the receiver, the CJ puts an upper bound on the strength of the perturbation signal. Performance results show that this adversarial perturbation causes the eavesdropper to misclassify the received signals as noise with a high probability while increasing the BER at the legitimate receiver only slightly. Furthermore, the adversarial perturbation is shown to become more effective when multiple antennas are utilized. MDPI 2022-07-29 /pmc/articles/PMC9407147/ /pubmed/36010711 http://dx.doi.org/10.3390/e24081047 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Kim, Brian
Sagduyu, Yalin
Davaslioglu, Kemal
Erpek, Tugba
Ulukus, Sennur
Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas
title Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas
title_full Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas
title_fullStr Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas
title_full_unstemmed Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas
title_short Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas
title_sort adversarial machine learning for nextg covert communications using multiple antennas
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9407147/
https://www.ncbi.nlm.nih.gov/pubmed/36010711
http://dx.doi.org/10.3390/e24081047
work_keys_str_mv AT kimbrian adversarialmachinelearningfornextgcovertcommunicationsusingmultipleantennas
AT sagduyuyalin adversarialmachinelearningfornextgcovertcommunicationsusingmultipleantennas
AT davaslioglukemal adversarialmachinelearningfornextgcovertcommunicationsusingmultipleantennas
AT erpektugba adversarialmachinelearningfornextgcovertcommunicationsusingmultipleantennas
AT ulukussennur adversarialmachinelearningfornextgcovertcommunicationsusingmultipleantennas