We consider a communication scenario, in which an intruder tries to determine the modulation scheme of the intercepted signal. Our aim is to minimize the accuracy of the intruder, while guaranteeing that the intended receiver can still recover the underlying message with the highest reliability. This is achieved by constellation perturbation at the encoder, similarly to adversarial attacks against classifiers in machine learning. In image classification, the perturbation is limited to be imperceptible to a human observer, while in our case the perturbation is constrained so that the message can still be reliably decoded by a legitimate receiver that is oblivious to the perturbation. Simulation results demonstrate the viability of our approach to make wireless communication secure against both state-of-the-art deep-learning- and decision-tree-based intruders with minimal sacrifice in the communication performance.
Communication without interception: Defense against modulation detection / Hameed, M. Z.; Gyorgy, A.; Gunduz, D.. - (2019), pp. 1-5. (Intervento presentato al convegno 7th IEEE Global Conference on Signal and Information Processing, GlobalSIP 2019 tenutosi a can nel 2019) [10.1109/GlobalSIP45357.2019.8969541].
Communication without interception: Defense against modulation detection
D. Gunduz
2019
Abstract
We consider a communication scenario, in which an intruder tries to determine the modulation scheme of the intercepted signal. Our aim is to minimize the accuracy of the intruder, while guaranteeing that the intended receiver can still recover the underlying message with the highest reliability. This is achieved by constellation perturbation at the encoder, similarly to adversarial attacks against classifiers in machine learning. In image classification, the perturbation is limited to be imperceptible to a human observer, while in our case the perturbation is constrained so that the message can still be reliably decoded by a legitimate receiver that is oblivious to the perturbation. Simulation results demonstrate the viability of our approach to make wireless communication secure against both state-of-the-art deep-learning- and decision-tree-based intruders with minimal sacrifice in the communication performance.Pubblicazioni consigliate
I metadati presenti in IRIS UNIMORE sono rilasciati con licenza Creative Commons CC0 1.0 Universal, mentre i file delle pubblicazioni sono rilasciati con licenza Attribuzione 4.0 Internazionale (CC BY 4.0), salvo diversa indicazione.
In caso di violazione di copyright, contattare Supporto Iris