Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas

dc.contributor.authorKim, Brian
dc.contributor.authorSagduyu, Yalin
dc.contributor.authorDavaslioglu, Kemal
dc.contributor.authorErpek, Tugba
dc.contributor.authorUlukus, Sennur
dc.date.accessioned2023-10-19T19:46:28Z
dc.date.available2023-10-19T19:46:28Z
dc.date.issued2022-07-29
dc.description.abstractThis paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest. There exists one transmitter that transmits to its receiver in the presence of an eavesdropper. In the meantime, a cooperative jammer (CJ) with multiple antennas transmits carefully crafted adversarial perturbations over the air to fool the eavesdropper into classifying the received superposition of signals as noise. While generating the adversarial perturbation at the CJ, multiple antennas are utilized to improve the attack performance in terms of fooling the eavesdropper. Two main points are considered while exploiting the multiple antennas at the adversary, namely the power allocation among antennas and the utilization of channel diversity. To limit the impact on the bit error rate (BER) at the receiver, the CJ puts an upper bound on the strength of the perturbation signal. Performance results show that this adversarial perturbation causes the eavesdropper to misclassify the received signals as noise with a high probability while increasing the BER at the legitimate receiver only slightly. Furthermore, the adversarial perturbation is shown to become more effective when multiple antennas are utilized.
dc.description.urihttps://doi.org/10.3390/e24081047
dc.identifierhttps://doi.org/10.13016/dspace/oddp-2zvk
dc.identifier.citationKim, B.; Sagduyu, Y.; Davaslioglu, K.; Erpek, T.; Ulukus, S. Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas. Entropy 2022, 24, 1047.
dc.identifier.urihttp://hdl.handle.net/1903/31085
dc.language.isoen_US
dc.publisherMDPI
dc.relation.isAvailableAtA. James Clark School of Engineeringen_us
dc.relation.isAvailableAtElectrical & Computer Engineeringen_us
dc.relation.isAvailableAtDigital Repository at the University of Marylanden_us
dc.relation.isAvailableAtUniversity of Maryland (College Park, MD)en_us
dc.subjectdeep learning
dc.subjectcovert communications
dc.subjectsignal classification
dc.subjectadversarial attack
dc.titleAdversarial Machine Learning for NextG Covert Communications Using Multiple Antennas
dc.typeArticle
local.equitableAccessSubmissionNo

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
entropy-24-01047-v2.pdf
Size:
616.49 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.55 KB
Format:
Item-specific license agreed upon to submission
Description: