IoT Network Security from the Perspective of Adversarial Deep Learning
Yalin E. Sagduyu,Yi Shi,Tugba Erpek +2 more
- pp 1-9
Reads0
Chats0
TLDR
This work presents new techniques built upon adversarial machine learning and applies them to three types of over-the-air (OTA) wireless attacks, namely denial of service (DoS) attack in terms of jamming, spectrum poisoning attack, and priority violation attack and introduces a defense mechanism that systematically increases the uncertainty of the adversary at the inference stage and improves the performance.Abstract:
Machine learning finds rich applications in Internet of Things (IoT) networks such as information retrieval, traffic management, spectrum sensing, and signal authentication. While there is a surge of interest to understand the security issues of machine learning, their implications have not been understood yet for wireless applications such as those in IoT systems that are susceptible to various attacks due the open and broadcast nature of wireless communications. To support IoT systems with heterogeneous devices of different priorities, we present new techniques built upon adversarial machine learning and apply them to three types of over-the-air (OTA) wireless attacks, namely denial of service (DoS) attack in terms of jamming, spectrum poisoning attack, and priority violation attack. By observing the spectrum, the adversary starts with an exploratory attack to infer the channel access algorithm of an IoT transmitter by building a deep neural network classifier that predicts the transmission outcomes. Based on these prediction results, the wireless attack continues to either jam data transmissions or manipulate sensing results over the air (by transmitting during the sensing phase) to fool the transmitter into making wrong transmit decisions in the test phase (corresponding to an evasion attack). When the IoT transmitter collects sensing results as training data to retrain its channel access algorithm, the adversary launches a causative attack to manipulate the input data to the transmitter over the air. We show that these attacks with different levels of energy consumption and stealthiness lead to significant loss in throughput and success ratio in wireless communications for IoT systems. Then we introduce a defense mechanism that systematically increases the uncertainty of the adversary at the inference stage and improves the performance. Results provide new insights on how to attack and defend IoT networks using deep learning.read more
Citations
More filters
Journal ArticleDOI
Machine Learning in IoT Security: Current Solutions and Future Challenges
TL;DR: This paper systematically review the security requirements, attack vectors, and the current security solutions for the IoT networks, and sheds light on the gaps in these security solutions that call for ML and DL approaches.
Proceedings ArticleDOI
Trojan Attacks on Wireless Signal Classification with Adversarial Machine Learning
TL;DR: A Trojan (backdoor or trapdoor) attack that targets deep learning applications in wireless communications that is successful over different channel conditions and cannot be mitigated by simply preprocessing the training and test data with random phase variations is presented.
Book ChapterDOI
Deep Learning for Wireless Communications
TL;DR: In this paper, the authors used deep learning to design an end-to-end communication system using autoencoders and showed the benefits of deep learning in spectrum situation awareness ranging from channel modeling and estimation to signal detection and classification tasks.
Posted Content
Adversarial Attacks on Deep-Learning Based Radio Signal Classification
Meysam Sadeghi,Erik G. Larsson +1 more
TL;DR: This work considers the use of DL for radio signal (modulation) classification tasks, and presents practical methods for the crafting of white-box and universal black-box adversarial attacks in that application.
Proceedings ArticleDOI
Deep Learning for RF Signal Classification in Unknown and Dynamic Spectrum Environments
Yi Shi,Kemal Davaslioglu,Yalin E. Sagduyu,William C. Headley,Michael C. Fowler,Gilbert Green +5 more
TL;DR: This work presents a deep learning based signal (modulation) classification solution in a realistic wireless network setting and utilizes the signal classification results in a distributed scheduling protocol, where in-network users employ signal classification scores to make channel access decisions and share the spectrum with each other while avoiding interference with out-network (primary) users and jammers.
References
More filters
Journal ArticleDOI
Mastering the game of Go with deep neural networks and tree search
David Silver,Aja Huang,Chris J. Maddison,Arthur Guez,Laurent Sifre,George van den Driessche,Julian Schrittwieser,Ioannis Antonoglou,Veda Panneershelvam,Marc Lanctot,Sander Dieleman,Dominik Grewe,John Nham,Nal Kalchbrenner,Ilya Sutskever,Timothy P. Lillicrap,Madeleine Leach,Koray Kavukcuoglu,Thore Graepel,Demis Hassabis +19 more
TL;DR: Using this search algorithm, the program AlphaGo achieved a 99.8% winning rate against other Go programs, and defeated the human European Go champion by 5 games to 0.5, the first time that a computer program has defeated a human professional player in the full-sized game of Go.
Proceedings ArticleDOI
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
TL;DR: A new class of model inversion attack is developed that exploits confidence values revealed along with predictions and is able to estimate whether a respondent in a lifestyle survey admitted to cheating on their significant other and recover recognizable images of people's faces given only their name.
Book ChapterDOI
Evasion attacks against machine learning at test time
Battista Biggio,Igino Corona,Davide Maiorca,Blaine Nelson,Nedim Srndic,Pavel Laskov,Giorgio Giacinto,Fabio Roli +7 more
TL;DR: This work presents a simple but effective gradient-based approach that can be exploited to systematically assess the security of several, widely-used classification algorithms against evasion attacks.
Journal ArticleDOI
Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing
He Li,Kaoru Ota,Mianxiong Dong +2 more
TL;DR: This article first introduces deep learning for IoTs into the edge computing environment, and designs a novel offloading strategy to optimize the performance of IoT deep learning applications with edge computing.
Proceedings ArticleDOI
Adversarial machine learning
TL;DR: In this article, the authors discuss an emerging field of study: adversarial machine learning (AML), the study of effective machine learning techniques against an adversarial opponent, and give a taxonomy for classifying attacks against online machine learning algorithms.