Cargando…
Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas
This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper. In the meantime, a cooperative jammer (CJ)...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9407147/ https://www.ncbi.nlm.nih.gov/pubmed/36010711 http://dx.doi.org/10.3390/e24081047 |
_version_ | 1784774293435973632 |
---|---|
author | Kim, Brian Sagduyu, Yalin Davaslioglu, Kemal Erpek, Tugba Ulukus, Sennur |
author_facet | Kim, Brian Sagduyu, Yalin Davaslioglu, Kemal Erpek, Tugba Ulukus, Sennur |
author_sort | Kim, Brian |
collection | PubMed |
description | This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper. In the meantime, a cooperative jammer (CJ) with multiple antennas transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise. While generating the adversarial perturbation at the CJ, multiple antennas are utilized to improve the attack performance in terms of fooling the eavesdropper. Two main points are considered while exploiting the multiple antennas at the adversary, namely the power allocation among antennas and the utilization of channel diversity. To limit the impact on the bit error rate (BER) at the receiver, the CJ puts an upper bound on the strength of the perturbation signal. Performance results show that this adversarial perturbation causes the eavesdropper to misclassify the received signals as noise with a high probability while increasing the BER at the legitimate receiver only slightly. Furthermore, the adversarial perturbation is shown to become more effective when multiple antennas are utilized. |
format | Online Article Text |
id | pubmed-9407147 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-94071472022-08-26 Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas Kim, Brian Sagduyu, Yalin Davaslioglu, Kemal Erpek, Tugba Ulukus, Sennur Entropy (Basel) Article This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper. In the meantime, a cooperative jammer (CJ) with multiple antennas transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise. While generating the adversarial perturbation at the CJ, multiple antennas are utilized to improve the attack performance in terms of fooling the eavesdropper. Two main points are considered while exploiting the multiple antennas at the adversary, namely the power allocation among antennas and the utilization of channel diversity. To limit the impact on the bit error rate (BER) at the receiver, the CJ puts an upper bound on the strength of the perturbation signal. Performance results show that this adversarial perturbation causes the eavesdropper to misclassify the received signals as noise with a high probability while increasing the BER at the legitimate receiver only slightly. Furthermore, the adversarial perturbation is shown to become more effective when multiple antennas are utilized. MDPI 2022-07-29 /pmc/articles/PMC9407147/ /pubmed/36010711 http://dx.doi.org/10.3390/e24081047 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Kim, Brian Sagduyu, Yalin Davaslioglu, Kemal Erpek, Tugba Ulukus, Sennur Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas |
title | Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas |
title_full | Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas |
title_fullStr | Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas |
title_full_unstemmed | Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas |
title_short | Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas |
title_sort | adversarial machine learning for nextg covert communications using multiple antennas |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9407147/ https://www.ncbi.nlm.nih.gov/pubmed/36010711 http://dx.doi.org/10.3390/e24081047 |
work_keys_str_mv | AT kimbrian adversarialmachinelearningfornextgcovertcommunicationsusingmultipleantennas AT sagduyuyalin adversarialmachinelearningfornextgcovertcommunicationsusingmultipleantennas AT davaslioglukemal adversarialmachinelearningfornextgcovertcommunicationsusingmultipleantennas AT erpektugba adversarialmachinelearningfornextgcovertcommunicationsusingmultipleantennas AT ulukussennur adversarialmachinelearningfornextgcovertcommunicationsusingmultipleantennas |