{"title":"Efficient Power Adaptation against Deep Learning Based Predictive Adversaries","authors":"E. Ciftcioglu, Mike Ricos","doi":"10.1145/3324921.3328787","DOIUrl":null,"url":null,"abstract":"Wireless communication networks are subject to various types of adversarial attacks, which might be passive in the form of eavesdropping, or active in the form of jamming. For the former category, even if the traffic is encrypted, an adversary performing analysis on observed traffic signatures may lead to leakage of the so called contextual information regarding the traffic. New advances in the field of machine learning also result in significantly more complex adversarial units, which may deduce different forms and uses of such contextual information. In this work, we are interested in power adaptation against an intelligent adversary which utilizes deep learning and attempts to perform predictions and time forecasting on the observed traffic traces to estimate the imminent traffic intensities. Based on its traffic predictions, the adversary might possibly activate its jamming mode and utilize its limited power more efficiently to inflict maximal damage. As a method of mitigation, the transmitter may want to increase transmitter power if it expects a higher probability of jamming, and it has a significant amount of upcoming data to transmit. We leverage Lyapunov optimization and virtual queues to meet a certain level of data transmission reliability while also minimizing power consumption.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3324921.3328787","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Wireless communication networks are subject to various types of adversarial attacks, which might be passive in the form of eavesdropping, or active in the form of jamming. For the former category, even if the traffic is encrypted, an adversary performing analysis on observed traffic signatures may lead to leakage of the so called contextual information regarding the traffic. New advances in the field of machine learning also result in significantly more complex adversarial units, which may deduce different forms and uses of such contextual information. In this work, we are interested in power adaptation against an intelligent adversary which utilizes deep learning and attempts to perform predictions and time forecasting on the observed traffic traces to estimate the imminent traffic intensities. Based on its traffic predictions, the adversary might possibly activate its jamming mode and utilize its limited power more efficiently to inflict maximal damage. As a method of mitigation, the transmitter may want to increase transmitter power if it expects a higher probability of jamming, and it has a significant amount of upcoming data to transmit. We leverage Lyapunov optimization and virtual queues to meet a certain level of data transmission reliability while also minimizing power consumption.