skip to main content
10.1145/3324921.3328787acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Efficient Power Adaptation against Deep Learning Based Predictive Adversaries

Published: 15 May 2019 Publication History

Abstract

Wireless communication networks are subject to various types of adversarial attacks, which might be passive in the form of eavesdropping, or active in the form of jamming. For the former category, even if the traffic is encrypted, an adversary performing analysis on observed traffic signatures may lead to leakage of the so called contextual information regarding the traffic. New advances in the field of machine learning also result in significantly more complex adversarial units, which may deduce different forms and uses of such contextual information. In this work, we are interested in power adaptation against an intelligent adversary which utilizes deep learning and attempts to perform predictions and time forecasting on the observed traffic traces to estimate the imminent traffic intensities. Based on its traffic predictions, the adversary might possibly activate its jamming mode and utilize its limited power more efficiently to inflict maximal damage. As a method of mitigation, the transmitter may want to increase transmitter power if it expects a higher probability of jamming, and it has a significant amount of upcoming data to transmit. We leverage Lyapunov optimization and virtual queues to meet a certain level of data transmission reliability while also minimizing power consumption.

References

[1]
2018. Kaggle Dataset: Predict traffic of LTE network. Retrieved November 2018 from https://www.kaggle.com/naebolo/predict-traffic-of-lte-network
[2]
Roni Bar-Yanai, Michael Langberg, David Peleg, and Liam Roditty. 2010. Realtime classification for encrypted traffic. In International Symposium on Experimental Algorithms. Springer, 373--385.
[3]
Dimitri P Bertsekas, Dimitri P Bertsekas, Dimitri P Bertsekas, and Dimitri P Bertsekas. 1995. Dynamic programming and optimal control. Vol. 1. Athena scientific Belmont, MA.
[4]
Ye Chen, Yanda Li, Dongjin Xu, and Liang Xiao. 2018. Dqn-based power control for iot transmission against jamming. In 2018 IEEE 87th Vehicular Technology Conference (VTC Spring). IEEE, 1--5.
[5]
Anestis Dalgkitsis, Malamati Louta, and George T Karetsos. 2018. Traffic forecasting in cellular networks using the LSTM RNN. In Proceedings of the 22nd Pan-Hellenic Conference on Informatics. ACM, 28--33.
[6]
Tugba Erpek, Yalin E Sagduyu, and Yi Shi. 2019. Deep learning for launching and mitigating wireless jamming attacks. IEEE Transactions on Cognitive Communications and Networking 5, 1 (2019), 2--14.
[7]
Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural computation 9, 8 (1997), 1735--1780.
[8]
Michael J Neely. 2006. Energy optimal control for time-varying wireless networks. IEEE transactions on Information Theory 52, 7 (2006), 2915--2934.
[9]
Nicolas Papernot, Patrick McDaniel, Ananthram Swami, and Richard Harang. 2016. Crafting adversarial input sequences for recurrent neural networks. In MILCOM 2016-2016 IEEE Military Communications Conference. IEEE, 49--54.
[10]
Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, and Lior Rokach. 2019. Defense Methods Against Adversarial Examples for Recurrent Neural Networks. arXiv preprint arXiv:1901.09963 (2019).
[11]
Yi Shi, Tugba Erpek, Yalin E Sagduyu, and Jason H Li. 2018. Spectrum data poisoning with adversarial deep learning. In MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM). IEEE, 407--412.
[12]
Leandros Tassiulas and Anthony Ephremides. 1990. Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks. In 29th IEEE Conference on Decision and Control. IEEE, 2130--2132.
[13]
Gunjan Verma, Ertugrul Ciftcioglu, Ryan Sheatsley, Kevin Chan, and Lisa Scott. 2018. Network Traffic Obfuscation: An Adversarial Machine Learning Approach. In MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM). IEEE, 1--6.
[14]
Dejun Yang, Guoliang Xue, Jin Zhang, Andrea Richa, and Xi Fang. 2013. Coping with a smart jammer in wireless networks: A Stackelberg game approach. IEEE Transactions on Wireless Communications 12, 8 (2013), 4038--4047.
[15]
Bo Zhou, Dan He, Zhili Sun, and Wee Hock Ng. 2005. Network traffic modeling and prediction with ARIMA/GARCH. In Proc. of HET-NETs Conference. 1--10.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WiseML 2019: Proceedings of the ACM Workshop on Wireless Security and Machine Learning
May 2019
76 pages
ISBN:9781450367691
DOI:10.1145/3324921
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 May 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. power control
  2. recurrent neural networks
  3. wireless security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

WiSec '19
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 126
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media