2023
DOI: 10.1109/comst.2022.3205184
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Machine Learning in Wireless Communications Using RF Data: A Review

Abstract: Machine learning (ML) provides effective means to learn from spectrum data and solve complex tasks involved in wireless communications. Supported by recent advances in computational resources and algorithmic designs, deep learning (DL) has found success in performing various wireless communication tasks such as signal recognition, spectrum sensing and waveform design. However, ML in general and DL in particular have been found vulnerable to manipulations thus giving rise to a field of study called adversarial … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 41 publications
(17 citation statements)
references
References 259 publications
(350 reference statements)
0
13
0
Order By: Relevance
“…It entails putting the model through training on both the actual training data and adversarial instances, which are intentionally misleading inputs. When the model is trained with these adversarial examples, it becomes more resilient and is better able to generalize its predictions to deal with comparable attacks in real‐world situations [15]. In this research work, adversarial training is done for untargeted, white‐box, gradient‐based adversarial attacks.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…It entails putting the model through training on both the actual training data and adversarial instances, which are intentionally misleading inputs. When the model is trained with these adversarial examples, it becomes more resilient and is better able to generalize its predictions to deal with comparable attacks in real‐world situations [15]. In this research work, adversarial training is done for untargeted, white‐box, gradient‐based adversarial attacks.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…To maximize the impact of jamming the RBs, we pursue an adversarial machine learning approach. Different types of attacks built upon adversarial machine learning have been studied in wireless communications [21], [22] such as exploratory (inference) attacks [23], [24], evasion (adversarial) attacks [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39] and their extensions to secure and covert communications against eavesdroppers [40], [41], [42], causative (poisoning) attacks [43], [44], [45], membership inference attacks [46], [47], Trojan attacks [48], and spoofing attacks [49], [50], [51] that have been launched against various spectrum sensors and wireless signal (such as modulation) classifiers. Adversarial machine learning has also been considered for NextG by studying evasion and spoofing attacks on deep neural networks (without reinforcement learning) used for NextG spectrum sharing and NextG signal authentication [52].…”
Section: B Adversarial Machine Learning Based Attack On Nextg Radio A...mentioning
confidence: 99%
“…Entretanto, um atacante que observa o meio e envia um sinal malicioso gera perturbações na entrada de modelos em treinamento ou em produção para efetuar ataques. Os ataques e defesas utilizados em outros problemas de aprendizado de máquina não são necessariamente aplicáveis em comunicações sem fio, devido à natureza dinâmica do canal de comunicação [Adesina et al, 2023]. Os trabalhos relacionados a esse tópico são muito heterogêneos quanto ao tipo de tarefa de aprendizado, aos tipos de ataque, aos mecanismos de defesa e às tecnologias de radiofrequência (RF) utilizadas.…”
Section: Outros Ataques à Interface Sem Fiounclassified