论文标题

如何使5G通信“无形”:无线隐私的对抗机器学习

How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy

论文作者

Kim, Brian, Sagduyu, Yalin E., Davaslioglu, Kemal, Erpek, Tugba, Ulukus, Sennur

论文摘要

我们考虑将无线通信隐藏在窃听器中,该问题采用了深度学习(DL)分类器来检测是否存在感兴趣的传播。有一个发射器在窃听器的存在下传输到接收器,而合作的干扰器(CJ)在空气上经过精心制作的对抗性扰动,以欺骗窃听者,将所接收的信号叠加分类为噪音。 CJ对扰动信号的强度放置了上限,以限制其对接收器的位错误率(BER)的影响。我们表明,这种对抗性扰动会导致窃听器将接收的信号错误分类为噪声,同时仅略微增加了BER。另一方面,CJ不能像传统的干扰一样简单地传输高斯噪音来欺骗窃听者,而需要制作由对抗机器学习构建的扰动信号,以启用秘密通信。我们的结果表明,具有不同调制类型和最终5G通信的信号即使它配备了DL分类器来检测传输,也可以有效地隐藏在窃听器中。

We consider the problem of hiding wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect whether any transmission of interest is present or not. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper, while a cooperative jammer (CJ) transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise. The CJ puts an upper bound on the strength of perturbation signal to limit its impact on the bit error rate (BER) at the receiver. We show that this adversarial perturbation causes the eavesdropper to misclassify the received signals as noise with high probability while increasing the BER only slightly. On the other hand, the CJ cannot fool the eavesdropper by simply transmitting Gaussian noise as in conventional jamming and instead needs to craft perturbation signals built by adversarial machine learning to enable covert communications. Our results show that signals with different modulation types and eventually 5G communications can be effectively hidden from an eavesdropper even if it is equipped with a DL classifier to detect transmissions.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源