scispace - formally typeset
Open AccessProceedings ArticleDOI

IoT Network Security from the Perspective of Adversarial Deep Learning

Yalin E. Sagduyu, +2 more
- pp 1-9
Reads0
Chats0
TLDR
This work presents new techniques built upon adversarial machine learning and applies them to three types of over-the-air (OTA) wireless attacks, namely denial of service (DoS) attack in terms of jamming, spectrum poisoning attack, and priority violation attack and introduces a defense mechanism that systematically increases the uncertainty of the adversary at the inference stage and improves the performance.
Abstract
Machine learning finds rich applications in Internet of Things (IoT) networks such as information retrieval, traffic management, spectrum sensing, and signal authentication. While there is a surge of interest to understand the security issues of machine learning, their implications have not been understood yet for wireless applications such as those in IoT systems that are susceptible to various attacks due the open and broadcast nature of wireless communications. To support IoT systems with heterogeneous devices of different priorities, we present new techniques built upon adversarial machine learning and apply them to three types of over-the-air (OTA) wireless attacks, namely denial of service (DoS) attack in terms of jamming, spectrum poisoning attack, and priority violation attack. By observing the spectrum, the adversary starts with an exploratory attack to infer the channel access algorithm of an IoT transmitter by building a deep neural network classifier that predicts the transmission outcomes. Based on these prediction results, the wireless attack continues to either jam data transmissions or manipulate sensing results over the air (by transmitting during the sensing phase) to fool the transmitter into making wrong transmit decisions in the test phase (corresponding to an evasion attack). When the IoT transmitter collects sensing results as training data to retrain its channel access algorithm, the adversary launches a causative attack to manipulate the input data to the transmitter over the air. We show that these attacks with different levels of energy consumption and stealthiness lead to significant loss in throughput and success ratio in wireless communications for IoT systems. Then we introduce a defense mechanism that systematically increases the uncertainty of the adversary at the inference stage and improves the performance. Results provide new insights on how to attack and defend IoT networks using deep learning.

read more

Citations
More filters
Journal ArticleDOI

Machine Learning in IoT Security: Current Solutions and Future Challenges

TL;DR: This paper systematically review the security requirements, attack vectors, and the current security solutions for the IoT networks, and sheds light on the gaps in these security solutions that call for ML and DL approaches.
Proceedings ArticleDOI

Trojan Attacks on Wireless Signal Classification with Adversarial Machine Learning

TL;DR: A Trojan (backdoor or trapdoor) attack that targets deep learning applications in wireless communications that is successful over different channel conditions and cannot be mitigated by simply preprocessing the training and test data with random phase variations is presented.
Book ChapterDOI

Deep Learning for Wireless Communications

TL;DR: In this paper, the authors used deep learning to design an end-to-end communication system using autoencoders and showed the benefits of deep learning in spectrum situation awareness ranging from channel modeling and estimation to signal detection and classification tasks.
Posted Content

Adversarial Attacks on Deep-Learning Based Radio Signal Classification

TL;DR: This work considers the use of DL for radio signal (modulation) classification tasks, and presents practical methods for the crafting of white-box and universal black-box adversarial attacks in that application.
Proceedings ArticleDOI

Deep Learning for RF Signal Classification in Unknown and Dynamic Spectrum Environments

TL;DR: This work presents a deep learning based signal (modulation) classification solution in a realistic wireless network setting and utilizes the signal classification results in a distributed scheduling protocol, where in-network users employ signal classification scores to make channel access decisions and share the spectrum with each other while avoiding interference with out-network (primary) users and jammers.
References
More filters
Journal ArticleDOI

Mastering the game of Go with deep neural networks and tree search

TL;DR: Using this search algorithm, the program AlphaGo achieved a 99.8% winning rate against other Go programs, and defeated the human European Go champion by 5 games to 0.5, the first time that a computer program has defeated a human professional player in the full-sized game of Go.
Proceedings ArticleDOI

Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures

TL;DR: A new class of model inversion attack is developed that exploits confidence values revealed along with predictions and is able to estimate whether a respondent in a lifestyle survey admitted to cheating on their significant other and recover recognizable images of people's faces given only their name.
Book ChapterDOI

Evasion attacks against machine learning at test time

TL;DR: This work presents a simple but effective gradient-based approach that can be exploited to systematically assess the security of several, widely-used classification algorithms against evasion attacks.
Journal ArticleDOI

Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing

He Li, +2 more
- 26 Jan 2018 - 
TL;DR: This article first introduces deep learning for IoTs into the edge computing environment, and designs a novel offloading strategy to optimize the performance of IoT deep learning applications with edge computing.
Proceedings ArticleDOI

Adversarial machine learning

TL;DR: In this article, the authors discuss an emerging field of study: adversarial machine learning (AML), the study of effective machine learning techniques against an adversarial opponent, and give a taxonomy for classifying attacks against online machine learning algorithms.
Related Papers (5)