Game Theory and Machine Learning for Cyber Security 2021
DOI: 10.1002/9781119723950.ch14
|View full text |Cite
|
Sign up to set email alerts
|

Adversarial Machine Learning for 5G Communications Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 42 publications
(11 citation statements)
references
References 54 publications
0
11
0
Order By: Relevance
“…Different types of attacks built upon adversarial machine learning have been studied in wireless communications [21], [22] such as exploratory (inference) attacks [23], [24], evasion (adversarial) attacks [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39] and their extensions to secure and covert communications against eavesdroppers [40], [41], [42], causative (poisoning) attacks [43], [44], [45], membership inference attacks [46], [47], Trojan attacks [48], and spoofing attacks [49], [50], [51] that have been launched against various spectrum sensors and wireless signal (such as modulation) classifiers. Adversarial machine learning has also been considered for NextG by studying evasion and spoofing attacks on deep neural networks (without reinforcement learning) used for NextG spectrum sharing and NextG signal authentication [52]. In addition, flooding attacks have been considered for NextG network slicing with reinforcement learning [53].…”
Section: B Adversarial Machine Learning Based Attack On Nextg Radio A...mentioning
confidence: 99%
“…Different types of attacks built upon adversarial machine learning have been studied in wireless communications [21], [22] such as exploratory (inference) attacks [23], [24], evasion (adversarial) attacks [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39] and their extensions to secure and covert communications against eavesdroppers [40], [41], [42], causative (poisoning) attacks [43], [44], [45], membership inference attacks [46], [47], Trojan attacks [48], and spoofing attacks [49], [50], [51] that have been launched against various spectrum sensors and wireless signal (such as modulation) classifiers. Adversarial machine learning has also been considered for NextG by studying evasion and spoofing attacks on deep neural networks (without reinforcement learning) used for NextG spectrum sharing and NextG signal authentication [52]. In addition, flooding attacks have been considered for NextG network slicing with reinforcement learning [53].…”
Section: B Adversarial Machine Learning Based Attack On Nextg Radio A...mentioning
confidence: 99%
“…In particular, cognitive radio capabilities empowered by machine learning allow for performing spectrum aware-ness and spectrum sharing. For example, in study [32], an AI/ML model at an environmental sensing capability (ESC) station detects citizens broadband radio service (CBRS) as an incumbent user. If the incumbent user is not detected in a channel of interest, the ESC allows a gNB to communicate to UEs.…”
Section: Adversarial ML In 5g a Ai/ml In 5gmentioning
confidence: 99%
“…In [32], the adversary aims to compromise the integrity of the target AI/ML model deployed for intelligent spectrum sharing during the sensing periods to force the ESC into making wrong transmit decisions. In particular, the adversary attempts to fool the ESC to allow the gNB to transmit when an incumbent user is present, and vice versa, to fool the ESC to stop the gNB transmissions even though there are no CBRS users.…”
Section: B Adversarial Examples In 5gmentioning
confidence: 99%
See 1 more Smart Citation
“…Overall, AML is an emerging field that studies machine learning (ML) in the presence of adversaries that may aim to manipulate the test and/or training pipelines of ML algorithms [ 7 , 8 , 9 ]. While the applications of AML have originated in the computer vision domain, there has been a growing interest in applying AML to wireless communications [ 10 , 11 , 12 ], including exploratory (inference) attacks [ 13 , 14 ], evasion (adversarial) attacks [ 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 ] and their extensions to secure and covert communications against eavesdroppers [ 34 , 35 , 36 , 37 ], causative (poisoning) attacks [ 38 , 39 , 40 ], membership inference attacks [ 41 , 42 ], Trojan attacks [ 43 ], and spoofing attacks [ 44 , 45 , 46 , 47 ].…”
Section: Introductionmentioning
confidence: 99%