MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) 2018
DOI: 10.1109/milcom.2018.8599832
|View full text |Cite
|
Sign up to set email alerts
|

Spectrum Data Poisoning with Adversarial Deep Learning

Abstract: Machine learning has been widely applied in wireless communications. However, the security aspects of machine learning in wireless applications have not been well understood yet. We consider the case that a cognitive transmitter senses the spectrum and transmits on idle channels determined by a machine learning algorithm. We present an adversarial machine learning approach to launch a spectrum data poisoning attack by inferring the transmitter's behavior and attempting to falsify the spectrum sensing data over… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
49
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
1

Relationship

5
4

Authors

Journals

citations
Cited by 80 publications
(50 citation statements)
references
References 26 publications
0
49
0
1
Order By: Relevance
“…This paper focuses on attacks during spectrum sensing of wireless communications. In [29], we performed the preliminary study on exploratory and evasion attacks on data sensing for wireless communications and corresponding defense strategies.…”
Section: Related Workmentioning
confidence: 99%
“…This paper focuses on attacks during spectrum sensing of wireless communications. In [29], we performed the preliminary study on exploratory and evasion attacks on data sensing for wireless communications and corresponding defense strategies.…”
Section: Related Workmentioning
confidence: 99%
“…Adversarial deep learning to jam the test phase of spectrum sensing was considered in [15]. We first use this attack as a benchmark and then extend this attack to the (re)training phase to improve energy efficiency and stealthiness of the attack.…”
Section: Spectrum Poisoning Attackmentioning
confidence: 99%
“…Recently, there has been a surge of efforts to apply machine learning to wireless security, including spoofing attacks [12], jamming attacks on data transmission [13], [14], and other attacks that target spectrum sensing [15] and signal classification [16] tasks. In particular, IoT system security benefits from machine learning to identify devices [17], [18], authenticate signals [19], and detect anomalies [20].…”
Section: Introductionmentioning
confidence: 99%
“…In the Trojan attack, as the perturbations are introduced by slightly rotating the signals, the PAPR change is not necessarily significant as a small phase shift is introduced for a small number of samples. As a poisoning attack, the adversary can also jam the spectrum sensing period and poison the spectrum training data, thereby attempting to prevent a transmitter from building a reliable classifier [22]. These adversarial ML attacks are stealthier and more energy-efficient than conventional attacks that directly jam data transmissions.…”
Section: Related Workmentioning
confidence: 99%