4.7 Article

Adversarial Deep Learning for Over-the-Air Spectrum Poisoning Attacks

期刊

IEEE TRANSACTIONS ON MOBILE COMPUTING
卷 20, 期 2, 页码 306-319

出版社

IEEE COMPUTER SOC
DOI: 10.1109/TMC.2019.2950398

关键词

Adversarial machine learning; deep learning; spectrum poisoning; jamming; exploratory attack; evasion attack; causative attack; adversarial attacks; defense

资金

  1. U.S. Army Research Office [W911NF-17-C-0090]

向作者/读者索取更多资源

An adversarial deep learning approach is used to launch over-the-air spectrum poisoning attacks, where an adversary learns the behavior of a transmitter and falsifies the spectrum sensing data. The attacks are energy efficient, hard to detect, and substantially reduce throughput. A dynamic defense is designed to manipulate the adversary's training data and sustain the transmitter's throughput.
An adversarial deep learning approach is presented to launch over-the-air spectrum poisoning attacks. A transmitter applies deep learning on its spectrum sensing results to predict idle time slots for data transmission. In the meantime, an adversary learns the transmitter's behavior (exploratory attack) by building another deep neural network to predict when transmissions will succeed. The adversary falsifies (poisons) the transmitter's spectrum sensing data over the air by transmitting during the short spectrum sensing period of the transmitter. Depending on whether the transmitter uses the sensing results as test data to make transmit decisions or as training data to retrain its deep neural network, either it is fooled into making incorrect decisions (evasion attack) or the transmitter's algorithm is retrained incorrectly for future decisions (causative attack). Both attacks are energy efficient and hard to detect (stealth) compared to jamming the long data transmission period, and substantially reduce the throughput. A dynamic defense is designed for the transmitter that deliberately makes a small number of incorrect transmissions (selected by the confidence score on channel classification) to manipulate the adversary's training data. This defense effectively fools the adversary (if any) and helps the transmitter sustain its throughput with or without an adversary present.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据