论文标题
空气中的生成对抗网络:无线信号的深层学习
Generative Adversarial Network in the Air: Deep Adversarial Learning for Wireless Signal Spoofing
论文作者
论文摘要
欺骗攻击对于绕过物理层信号身份验证至关重要。本文提出了基于深度学习的欺骗攻击,以产生合成无线信号,这些信号无法统计与预期的传输区分开。对手通过在空中玩Minimax游戏来分别建立一对发射器和接收器,分别构建生成对抗网络的发生器和歧视器。对手发射器训练一个深层的神经网络,以产生最好的欺骗信号,并欺骗接受对手接收器的另一个深层神经网络的最佳防御。每个节点(防御者或对手)可能具有多个发射器或接收器天线。信号通过共同捕获波形,频道和无线电硬件效果的共同攻击,这些效果是在攻击下固有的。与使用随机或重播信号的欺骗攻击相比,提议的攻击增加了将欺骗信号作为针对不同网络拓扑和移动性模式的预期信号的误解的可能性。对手发射器可以通过使用多个天线来增加欺骗攻击的成功,而当防守者接收者使用多个天线时,攻击成功会降低。对于实际部署,嵌入式平台上的攻击实现证明了生成或分类欺骗信号的潜伏期低。
The spoofing attack is critical to bypass physical-layer signal authentication. This paper presents a deep learning-based spoofing attack to generate synthetic wireless signals that cannot be statistically distinguished from intended transmissions. The adversary is modeled as a pair of a transmitter and a receiver that build the generator and discriminator of the generative adversarial network, respectively, by playing a minimax game over the air. The adversary transmitter trains a deep neural network to generate the best spoofing signals and fool the best defense trained as another deep neural network at the adversary receiver. Each node (defender or adversary) may have multiple transmitter or receiver antennas. Signals are spoofed by jointly capturing waveform, channel, and radio hardware effects that are inherent to wireless signals under attack. Compared with spoofing attacks using random or replayed signals, the proposed attack increases the probability of misclassifying spoofing signals as intended signals for different network topology and mobility patterns. The adversary transmitter can increase the spoofing attack success by using multiple antennas, while the attack success decreases when the defender receiver uses multiple antennas. For practical deployment, the attack implementation on embedded platforms demonstrates the low latency of generating or classifying spoofing signals.