2019 16th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON) 2019
DOI: 10.1109/sahcn.2019.8824956
|View full text |Cite
|
Sign up to set email alerts
|

IoT Network Security from the Perspective of Adversarial Deep Learning

Abstract: Machine learning finds rich applications in Internet of Things (IoT) networks such as information retrieval, traffic management, spectrum sensing, and signal authentication. While there is a surge of interest to understand the security issues of machine learning, their implications have not been understood yet for wireless applications such as those in IoT systems that are susceptible to various attacks due the open and broadcast nature of wireless communications. To support IoT systems with heterogeneous devi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
51
0
3

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 91 publications
(55 citation statements)
references
References 34 publications
(53 reference statements)
0
51
0
3
Order By: Relevance
“…Poisoning attacks occur when an intruder injects false training sample to an ML algorithm for taking a wrong decision. Sagduyu et al [138] found that poisoning attacks would minimize DNN-based IDS predictability. Feedforward neural network was used as defensive mechanism which was implemented to systematically increase the adversary's confusion at the inference stage and enhance efficiency.…”
Section: Processing Layer Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…Poisoning attacks occur when an intruder injects false training sample to an ML algorithm for taking a wrong decision. Sagduyu et al [138] found that poisoning attacks would minimize DNN-based IDS predictability. Feedforward neural network was used as defensive mechanism which was implemented to systematically increase the adversary's confusion at the inference stage and enhance efficiency.…”
Section: Processing Layer Threatsmentioning
confidence: 99%
“…Sagduyu et al [138] considered various defense models against attacks on ML techniques such as poisoning attack and evasion attack. The work introduced a Stackelberg game approach to maximize the performance of the defense proce-This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.…”
Section: Processing Layer Threats Countermeasurementioning
confidence: 99%
“…Research on IoT system security has progressed from the perspective of deep learning applications [29]- [31]. In [29], they used a machine learning based classification model to identify the types of devices that attempt to connect to an IoT network to secure devices which have potential security vulnerabilities.…”
Section: Related Work a Internet Of Things Network Securitymentioning
confidence: 99%
“…In [29], they used a machine learning based classification model to identify the types of devices that attempt to connect to an IoT network to secure devices which have potential security vulnerabilities. IoT security with DNNs' vulnerabilities to several attacks such as inference attack, poisoning attacks, and evasion attacks (adversarial attack) have been addressed [31]. An adversary can use an adversarial attack to transform the input data to cause the target device or model to misclassify.…”
Section: Related Work a Internet Of Things Network Securitymentioning
confidence: 99%
“…Deep learning finds rich application in wireless communications. Examples include spectrum sensing [10], MIMO detection [11], channel estimation and signal detection [12], physical layer communications [13], jammer detection [14], stealth jamming [15], [16], power control [17], signal spoofing [18], and transmitter-receiver scheduling [19]. RF signal classification can support different applications such as radio fingerprinting [28] that can be ultimately used in cognitive radio systems [29] subject to dynamic and unknown interference and jamming effects [30].…”
Section: Related Workmentioning
confidence: 99%