2020
DOI: 10.48550/arxiv.2001.08883
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

When Wireless Security Meets Machine Learning: Motivation, Challenges, and Research Directions

Abstract: Wireless systems are vulnerable to various attacks such as jamming and eavesdropping due to the shared and broadcast nature of wireless medium. To support both attack and defense strategies, machine learning (ML) provides automated means to learn from and adapt to wireless communication characteristics that are hard to capture by hand-crafted features and models. This article discusses motivation, background, and scope of research efforts that bridge ML and wireless security. Motivated by research directions s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
3

Relationship

6
3

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 66 publications
0
15
0
Order By: Relevance
“…In particular, deep learning (DL) that has been empowered by recent algorithmic and computational advances can effectively capture highdimensional representations of spectrum data and support various wireless communications tasks, including but not limited to, spectrum sensing, signal classification, spectrum allocation, and waveform design [2]. However, the use of ML/DL also raises unique challenges in terms of security for wireless systems [3], [4]. With adversarial machine learning (AML), various attacks have been developed to launch against the ML/DL engines of wireless systems, including inference Yi Shi is with Virginia Tech, Blacksburg, VA, USA; Email: yshi@vt.edu.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, deep learning (DL) that has been empowered by recent algorithmic and computational advances can effectively capture highdimensional representations of spectrum data and support various wireless communications tasks, including but not limited to, spectrum sensing, signal classification, spectrum allocation, and waveform design [2]. However, the use of ML/DL also raises unique challenges in terms of security for wireless systems [3], [4]. With adversarial machine learning (AML), various attacks have been developed to launch against the ML/DL engines of wireless systems, including inference Yi Shi is with Virginia Tech, Blacksburg, VA, USA; Email: yshi@vt.edu.…”
Section: Introductionmentioning
confidence: 99%
“…However for jamming attacks and anti-jamming defensive mechanisms, both victim and attacker have limited observations of each other. Defense strategies against jamming attack are thus studied [30]. While the authors in [23] and [31] investigated mitigating wireless jamming attacks in one channel, scenarios with multiple channels are studied in [32] and [33], where an ensemble of several orthogonal policies is generated and used as a defense strategy against jamming attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Wireless medium is shared and open to jamming attacks that can also be launched via adversarial machine learning to target the underlying DNNs. Therefore, adversarial machine learning has recently gained attention as the emerging attack surface for wireless security [10]. The attacks built upon adversarial machine learning include exploratory (inference) attacks [11], [12], adversarial (evasion) attacks [13]- [26], poisoning (causative) attacks [27]- [30], membership inference attacks [31], Trojan attacks [32], and spoofing attacks [33], [34].…”
Section: Introductionmentioning
confidence: 99%