Generative Adversarial Network for Wireless Signal Spoofing

Yi Shi, Kemal Davaslioglu, Y. Sagduyu
{"title":"Generative Adversarial Network for Wireless Signal Spoofing","authors":"Yi Shi, Kemal Davaslioglu, Y. Sagduyu","doi":"10.1145/3324921.3329695","DOIUrl":null,"url":null,"abstract":"The paper presents a novel approach of spoofing wireless signals by using a general adversarial network (GAN) to generate and transmit synthetic signals that cannot be reliably distinguished from intended signals. It is of paramount importance to authenticate wireless signals at the PHY layer before they proceed through the receiver chain. For that purpose, various waveform, channel, and radio hardware features that are inherent to original wireless signals need to be captured. In the meantime, adversaries become sophisticated with the cognitive radio capability to record, analyze, and manipulate signals before spoofing. Building upon deep learning techniques, this paper introduces a spoofing attack by an adversary pair of a transmitter and a receiver that assume the generator and discriminator roles in the GAN and play a minimax game to generate the best spoofing signals that aim to fool the best trained defense mechanism. The output of this approach is two-fold. From the attacker point of view, a deep learning-based spoofing mechanism is trained to potentially fool a defense mechanism such as RF ingerprinting. From the defender point of view, a deep learning-based defense mechanism is trained against potential spooing attacks when an adversary pair of a transmitter and a receiver cooperates. The probability that the spooing signal is misclassified as the intended signal is measured for random signal, replay, and GAN-based spoofing attacks. Results show that the GAN-based spooing attack provides a major increase in the success probability of wireless signal spoofing even when a deep learning classifier is used as the defense.","PeriodicalId":435733,"journal":{"name":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"64","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the ACM Workshop on Wireless Security and Machine Learning","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3324921.3329695","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 64

Abstract

The paper presents a novel approach of spoofing wireless signals by using a general adversarial network (GAN) to generate and transmit synthetic signals that cannot be reliably distinguished from intended signals. It is of paramount importance to authenticate wireless signals at the PHY layer before they proceed through the receiver chain. For that purpose, various waveform, channel, and radio hardware features that are inherent to original wireless signals need to be captured. In the meantime, adversaries become sophisticated with the cognitive radio capability to record, analyze, and manipulate signals before spoofing. Building upon deep learning techniques, this paper introduces a spoofing attack by an adversary pair of a transmitter and a receiver that assume the generator and discriminator roles in the GAN and play a minimax game to generate the best spoofing signals that aim to fool the best trained defense mechanism. The output of this approach is two-fold. From the attacker point of view, a deep learning-based spoofing mechanism is trained to potentially fool a defense mechanism such as RF ingerprinting. From the defender point of view, a deep learning-based defense mechanism is trained against potential spooing attacks when an adversary pair of a transmitter and a receiver cooperates. The probability that the spooing signal is misclassified as the intended signal is measured for random signal, replay, and GAN-based spoofing attacks. Results show that the GAN-based spooing attack provides a major increase in the success probability of wireless signal spoofing even when a deep learning classifier is used as the defense.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无线信号欺骗的生成对抗网络
本文提出了一种利用通用对抗网络(GAN)生成和传输无法与预期信号可靠区分的合成信号的无线信号欺骗新方法。在无线信号通过接收器链之前,在物理层对其进行认证是至关重要的。为此,需要捕获原始无线信号固有的各种波形、信道和无线电硬件特征。与此同时,在欺骗之前,对手变得具有复杂的认知无线电能力,可以记录、分析和操纵信号。在深度学习技术的基础上,本文介绍了一种欺骗攻击,由一对发送器和接收器组成的对手在GAN中扮演生成器和鉴别器的角色,并发挥极小极大游戏来生成最佳欺骗信号,旨在欺骗训练最好的防御机制。这种方法的输出是双重的。从攻击者的角度来看,训练基于深度学习的欺骗机制可能会欺骗防御机制,例如射频指纹。从防御者的角度来看,当发射器和接收器的对手对合作时,基于深度学习的防御机制可以针对潜在的欺骗攻击进行训练。针对随机信号、重放和基于gan的欺骗攻击,测量欺骗信号被误分类为预期信号的概率。结果表明,即使使用深度学习分类器作为防御,基于gan的欺骗攻击也大大增加了无线信号欺骗的成功概率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
RAPID: Real-time Anomaly-based Preventive Intrusion Detection Targeted Adversarial Examples Against RF Deep Classifiers Efficient Power Adaptation against Deep Learning Based Predictive Adversaries Detecting Drones Status via Encrypted Traffic Analysis Machine Learning-based Prevention of Battery-oriented Illegitimate Task Injection in Mobile Crowdsensing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1