Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3468218.3469051acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper
Public Access

Low-cost Influence-Limiting Defense against Adversarial Machine Learning Attacks in Cooperative Spectrum Sensing

Published: 28 June 2021 Publication History

Abstract

Cooperative spectrum sensing aims to improve the reliability of spectrum sensing by individual sensors for better utilization of the scarce spectrum bands, which gives the feasibility for secondary spectrum users to transmit their signals when primary users remain idle. However, there are various vulnerabilities experienced in cooperative spectrum sensing, especially when machine learning techniques are applied. The influence-limiting defense is proposed as a method to defend the data fusion center when a small number of spectrum sensing devices is controlled by an intelligent attacker to send erroneous sensing results. Nonetheless, this defense suffers from a computational complexity problem. In this paper, we propose a low-cost version of the influence-limiting defense and demonstrate that it can decrease the computation cost significantly (the time cost is reduced to less than 20% of the original defense) while still maintaining the same level of defense performance.

References

[1]
Akyildiz, Ian F., Brandon F. Lo, and Ravikumar Balakrishnan. "Cooperative spectrum sensing in cognitive radio networks: A survey." Physical communication 4, no. 1 (2011): 40--62.
[2]
Fatemieh, Omid, Ali Farhadi, Ranveer Chandra, and Carl A. Gunter. "Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks." In Network and Distributed System Security Symposium (NDSS). 2011.
[3]
Zhang, Linyuan, Guoru Ding, Qihui Wu, Yulong Zou, Zhu Han, and Jinlong Wang. "Byzantine attack and defense in cognitive radio networks: A survey." IEEE Communications Surveys & Tutorials 17, no. 3 (2015): 1342--1363.
[4]
Wang, Wei, Lin Chen, Kang G. Shin, and Lingjie Duan. "Secure cooperative spectrum sensing and access against intelligent malicious behaviors." In IEEE INFOCOM 2014-IEEE Conference on Computer Communications, pp. 1267--1275. IEEE, 2014.
[5]
Kaligineedi, Praveen, Majid Khabbazian, and Vijay K. Bhargava. "Malicious user detection in a cognitive radio cooperative sensing system." IEEE Transactions on Wireless Communications 9, no. 8 (2010): 2488--2497.
[6]
Chen, Huifang, Ming Zhou, Lei Xie, and Jie Li. "Cooperative spectrum sensing with M-ary quantized data in cognitive radio networks under SSDF attacks." IEEE Transactions on Wireless Communications 16, no. 8 (2017): 5244--5257.
[7]
Chen, Changlong, Min Song, Chunsheng Xin, and Mansoor Alam. "A robust malicious user detection scheme in cooperative spectrum sensing." In 2012 IEEE Global Communications Conference (GLOBECOM), pp. 4856--4861. IEEE, 2012.
[8]
Li, Husheng, and Zhu Han. "Catch me if you can: An abnormality detection approach for collaborative spectrum sensing in cognitive radio networks." IEEE Transactions on Wireless Communications 9, no. 11 (2010): 3554--3565.
[9]
Thilina, Karaputugala Madushan, Kae Won Choi, Nazmus Saquib, and Ekram Hossain. "Machine learning techniques for cooperative spectrum sensing in cognitive radio networks." IEEE Journal on Selected Areas in Communications, 31, no. 11 (2013): 2209--2221.
[10]
Chen, Ruiliang, J-M. Park, and Kaigui Bian. "Robust distributed spectrum sensing in cognitive radio networks." In IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 1876--1884. IEEE, 2008.
[11]
Sagduyu, Yalin E. "Securing cognitive radio networks with dynamic trust against spectrum sensing data falsification." In 2014 IEEE Military Communications Conference, pp. 235--241. IEEE, 2014.
[12]
Rawat, Ankit Singh, Priyank Anand, Hao Chen, and Pramod K. Varshney. "Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks." IEEE Transactions on Signal Processing 59, no. 2 (2010): 774--786.
[13]
Luo, Zhengping, Shangqing Zhao, Zhuo Lu, Jie Xu, and Yalin Sagduyu. "When attackers meet AI: Learning-empowered attacks in cooperative spectrum sensing." IEEE Transactions on Mobile Computing (2020).
[14]
Vorobeychik, Yevgeniy, and Murat Kantarcioglu. "Adversarial machine learning." Synthesis Lectures on Artificial Intelligence and Machine Learning 12, no. 3 (2018): 1--169.
[15]
Adesina, Damilola, Chung-Chu Hsieh, Yalin E. Sagduyu, and Lijun Qian. "Adversarial machine learning in wireless communications using RF data: a review." arXiv preprint arXiv:2012.14392 (2020).
[16]
Sagduyu, Yalin E., Yi Shi, Tugba Erpek, William Headley, Bryse Flowers, George Stantchev, and Zhuo Lu. "When wireless security meets machine learning: motivation, challenges, and research Directions." arXiv preprint arXiv:2001.08883 (2020).
[17]
Erpek, Tugba, Tim O'Shea, Yalin E. Sagduyu, Yi Shi, and T. Charles Clancy. "Deep learning for wireless communications." in Development and Analysis of Deep Learning Architectures, Springer (2020).
[18]
Erpek, Tugba, Yalin E. Sagduyu, and Yi Shi. "Deep learning for launching and mitigating wireless jamming attacks." IEEE Transactions on Cognitive Communications and Networking 5, no. 1 (2018): 2--14.
[19]
Shi, Yi, Tugba Erpek, Yalin E Sagduyu, and Jason Li. "Spectrum data poisoning with adversarial deep learning." In IEEE Military Communications Conference (MILCOM), pp. 407--412. IEEE, 2018.
[20]
Sagduyu, Yalin E., Yi Shi, and Tugba Erpek. "IoT network security from the perspective of adversarial deep learning." IEEE International Conference on Sensing, Communication and Networking (SECON), pp. 1--9. IEEE 2019.
[21]
Sagduyu, Yalin E., Yi Shi, and Tugba Erpek, "Adversarial deep learning for over-the-air spectrum poisoning attacks," IEEE Transactions on Mobile Computing, 20, no. 2 (2021): 306--319.
[22]
Luo, Zhengping, Shangqing Zhao, Zhuo Lu, Yalin E. Sagduyu, and Jie Xu. "Adversarial machine learning based partial-model attack in IoT." ACM Workshop on Wireless Security and Machine Learning (WiseML), pp. 13--18. ACM, 2020.
[23]
Saeed, Ahmed, Khaled A. Harras, Ellen Zegura, and Mostafa Ammar. "Local and low-cost white space detection." In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 503--516. IEEE, 2017.
[24]
Flores, Adriana B., Ryan E. Guerra, Edward W. Knightly, Peter Ecclesine, and Santosh Pandey. "IEEE 802.11 af: A standard for TV white space spectrum sharing." IEEE Communications Magazine 51, no. 10 (2013): 92--100.
[25]
Stevenson, Carl R., Gerald Chouinard, Zhongding Lei, Wendong Hu, Stephen J. Shellhammer, and Winston Caldwell. "IEEE 802.22: The first cognitive radio wireless regional area network standard." IEEE Communications Magazine 47, no. 1 (2009): 130--138.
[26]
Wolpert, David H., and William G. Macready. "No free lunch theorems for optimization." IEEE transactions on evolutionary computation 1, no. 1 (1997): 67--82.
[27]
Papernot, Nicolas, Patrick McDaniel, and Ian Goodfellow. "Transferability in machine learning: from phenomena to black-box attacks using adversarial samples." arXiv preprint arXiv:1605.07277 (2016).

Cited By

View all
  • (2024)Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary StatisticsIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621153(691-700)Online publication date: 20-May-2024
  • (2024)Advances in Machine Learning-Driven Cognitive Radio for Wireless Networks: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2023.334579626:2(1201-1237)Online publication date: Oct-2025
  • (2024)A comprehensive study on IoT privacy and security challenges with focus on spectrum sharing in Next-Generation networks (5G/6G/beyond)High-Confidence Computing10.1016/j.hcc.2024.1002204:2(100220)Online publication date: Jun-2024
  • Show More Cited By

Index Terms

  1. Low-cost Influence-Limiting Defense against Adversarial Machine Learning Attacks in Cooperative Spectrum Sensing

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiseML '21: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning
      June 2021
      104 pages
      ISBN:9781450385619
      DOI:10.1145/3468218
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 28 June 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Cooperative spectrum sensing
      2. adversarial machine learning
      3. attack
      4. data fusion
      5. defense
      6. machine learning

      Qualifiers

      • Short-paper
      • Research
      • Refereed limited

      Funding Sources

      Conference

      WiSec '21

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)70
      • Downloads (Last 6 weeks)12
      Reflects downloads up to 16 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary StatisticsIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621153(691-700)Online publication date: 20-May-2024
      • (2024)Advances in Machine Learning-Driven Cognitive Radio for Wireless Networks: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2023.334579626:2(1201-1237)Online publication date: Oct-2025
      • (2024)A comprehensive study on IoT privacy and security challenges with focus on spectrum sharing in Next-Generation networks (5G/6G/beyond)High-Confidence Computing10.1016/j.hcc.2024.1002204:2(100220)Online publication date: Jun-2024
      • (2023)Membership Inference Attack and Defense for Wireless Signal Classifiers With Deep LearningIEEE Transactions on Mobile Computing10.1109/TMC.2022.314869022:7(4032-4043)Online publication date: 1-Jul-2023
      • (2023)Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security2023 32nd International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN58024.2023.10230189(1-10)Online publication date: Jul-2023
      • (2023)Adversarial Machine Learning in Wireless Communications Using RF Data: A ReviewIEEE Communications Surveys & Tutorials10.1109/COMST.2022.320518425:1(77-100)Online publication date: 1-Jan-2023
      • (2022)Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal ClassifiersIEEE Transactions on Wireless Communications10.1109/TWC.2021.312485521:6(3868-3880)Online publication date: 1-Jun-2022
      • (2021)Adversarial Attacks against Deep Learning Based Power Control in Wireless Communications2021 IEEE Globecom Workshops (GC Wkshps)10.1109/GCWkshps52748.2021.9682097(1-6)Online publication date: Dec-2021

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media