4.7 Article

When Attackers Meet AI: Learning-Empowered Attacks in Cooperative Spectrum Sensing

Journal

IEEE TRANSACTIONS ON MOBILE COMPUTING
Volume 21, Issue 5, Pages 1892-1908

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TMC.2020.3030061

Keywords

Sensors; Data models; Measurement; Adversarial machine learning; Mobile computing; Security; Cooperative spectrum sensing; system security; attacks and defenses; adversarial machine learning

Funding

  1. NSF [2029875]
  2. Division Of Computer and Network Systems
  3. Direct For Computer & Info Scie & Enginr [2029875] Funding Source: National Science Foundation

Ask authors/readers for more resources

This paper proposes a novel adversarial machine learning framework called Learning-Evaluation-Beating (LEB) to mislead the fusion center in cooperative spectrum sensing. The LEB attack effectively beats existing defense strategies by creating malicious sensing data using a surrogate model. Additionally, a non-invasive defense method named influence-limiting defense is introduced to reduce the overall disruption caused by LEB attack.
Defense strategies have been well studied to combat Byzantine attacks that aim to disrupt cooperative spectrum sensing by sending falsified versions of spectrum sensing data to a fusion center. However, existing studies usually assume network or attackers as passive entities, e.g., assuming the prior knowledge of attacks is known or fixed. In practice, attackers can actively adopt arbitrary behaviors and avoid pre-assumed patterns or assumptions used by defense strategies. In this paper, we revisit this security vulnerability as an adversarial machine learning problem and propose a novel learning-empowered attack framework named Learning-Evaluation-Beating (LEB) to mislead the fusion center. Based on the black-box nature of the fusion center in cooperative spectrum sensing, our new perspective is to make the adversarial use of machine learning to construct a surrogate model of the fusion center's decision model. We propose a generic algorithm to create malicious sensing data using this surrogate model. Our real-world experiments show that the LEB attack is effective to beat a wide range of existing defense strategies with an up to 82 percent of success ratio. Given the gap between the proposed LEB attack and existing defenses, we introduce a non-invasive method named as influence-limiting defense, which can coexist with existing defenses to defend against LEB attack or other similar attacks. We show that this defense is highly effective and reduces the overall disruption ratio of LEB attack by up to 80 percent.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available