ABSTRACT
Despite being primarily developed for spectrum management, sharing, and enforcement in civilian and military applications, modulation classification can be exploited by an adversary to threaten user privacy (e.g., via traffic analysis), or launch jamming and spoofing attacks. Several existing works study how an adversary can still classify the user traffic despite obfuscation techniques at upper layers, but little work has been done on how an adversary can classify the "modulation scheme'' when it is obfuscated at the physical layer. In this respect, we aim to study how to break the state-of-the-art modulation obfuscation schemes by applying various machine learning (ML) methods. Our preliminary results show that common ML techniques perform poorly in correctly classifying an obfuscated modulation scheme except for the random forest method (with a score as much as twice the other techniques we consider), providing insights on why other techniques, e.g., deep learning, might be more promising for finding underlying correlations.
- Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and Selcuk Uluagac. 2020. Peek-a-Boo: I See Your Smart Home Activities, Even Encrypted!. In Proc. of the ACM Conference on Security and Privacy in Wireless and Mobile Netw. (WiSec '20). Linz, Austria, 207--218.Google ScholarDigital Library
- Inkyu Bang and Taehoon Kim. 2020. Secure Modulation Based on Constellation Mapping Obfuscation in OFDM Based TDD Systems. IEEE Access, Vol. 8 (2020), 197644--197653.Google ScholarCross Ref
- Kelly Hill. 2021. CTIA: Wireless investment hit 5-year high in 2020. (July 2021). Retrieved August 11, 2021 from https://www.rcrwireless.com/20210728/5g/ctia-wireless-investment-hit-5-year-high-in-2020Google Scholar
- Erma Perenda, Sreeraj Rajendran, Gerome Bovet, Sofie Pollin, and Mariya Zheleva. 2021. Learning the Unknown: Improving Modulation Classification Performance in Unseen Scenarios. In Proc. of the IEEE Conference on Comput. Commun. (INFOCOM '21). Virtual Conference.Google ScholarDigital Library
- Hanif Rahbari and Marwan Krunz. 2016. Full Frame Encryption and Modulation Obfuscation Using Channel-Independent Preamble Identifier. IEEE Trans. on Inf. Forensics and Security, Vol. 11, 12 (2016), 2732--2747.Google ScholarDigital Library
- Tasnuva Tithi, Bhaswati Deka, Ryan M. Gerdes, Chris Winstead, Ming Li, and Kevin Heaslip. 2018. Analysis of Friendly Jamming for Secure Location Verification of Vehicles for Intelligent Highways. IEEE Trans. on Veh. Technol., Vol. 67, 8 (2018), 7437--7449.Google ScholarCross Ref
- Triet D. Vo-Huu and Guevara Noubir. 2015. Mitigating Rate Attacks through Crypto-Coded Modulation. In Proc. of the ACM International Symposium on Mobile Ad Hoc Netw. and Comput. (MobiHoc '15). Hangzhou, China, 237--246.Google Scholar
- Wei Xiong, Petko Bogdanov, and Mariya Zheleva. 2021. MODELESS: MODulation rEcognition with LimitEd SuperviSion. In Proc. of the IEEE Int. Conference on Sensing, Commun., and Netw. (SECON '21). Virtual Conference.Google ScholarDigital Library
- Wei Xiong, Karyn Doke, Petko Bogdanov, and Mariya Zheleva. 2020. LinksIQ: Robust and Efficient Modulation Recognition with Imperfect Spectrum Scans. ArXiv, Vol. abs/2005.04149 (2020).Google Scholar
- Fan Zhang, Wenbo He, Yangyi Chen, Zhou Li, XiaoFeng Wang, Shuo Chen, and Xue Liu. 2014. Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing. IEEE Trans. on Wireless Commun., Vol. 13, 1 (2014), 86--98.Google ScholarCross Ref
Index Terms
- POSTER: A Tough Nut to Crack: Attempting to Break Modulation Obfuscation
Recommendations
Obfuscation: The Hidden Malware
A cyberwar exists between malware writers and antimalware researchers. At this war's heart rages a weapons race that originated in the 80s with the first computer virus. Obfuscation is one of the latest strategies to camouflage the telltale signs of ...
On the Limitations of Targeted Adversarial Evasion Attacks Against Deep Learning Enabled Modulation Recognition
WiseML 2019: Proceedings of the ACM Workshop on Wireless Security and Machine LearningWireless communications has greatly benefited in recent years from advances in machine learning. A new subfield, commonly termed Radio Frequency Machine Learning (RFML), has emerged that has demonstrated the application of Deep Neural Networks to ...
Poster: When Adversary Becomes the Guardian -- Towards Side-channel Security With Adversarial Attacks
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityMachine learning algorithms fall prey to adversarial examples. As profiling side-channel attacks are seeing rapid adoption of machine learning-based approaches that can even defeat commonly used side-channel countermeasures, we investigate the potential ...
Comments