{"title":"Poisoning Attack Anticipation in Mobile Crowdsensing: A Competitive Learning-Based Study","authors":"Alexandre Prud'Homme, B. Kantarci","doi":"10.1145/3468218.3469050","DOIUrl":"https://doi.org/10.1145/3468218.3469050","url":null,"abstract":"Mobile Crowdsensing is prone to adversarial attacks particularly the data injection attacks to mislead the servers in the decision-making process. This paper aims to tackle the problem of threat anticipation from the standpoint of data poisoning attacks, and aims to model various classifiers to model the behaviour of the adversaries in a Mobile Crowdsensing setting. To this end, we study and quantify the impact of competitive learning-based data poisoning in a Mobile Crowdsensing environment by considering a black-box attack through a self organizing map. Under various machine learning classifiers in the decision-making platforms, it has been shown that the accuracy of the crowdsensing platform decisions are prone to a decrease in the range of 18%-22% when an adversary pursues a competitive learning-based data poisoning attack on the crowdsensing platform. Furthermore, we also show the robustness of certain classifiers under increasing poisoned samples.","PeriodicalId":318719,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning","volume":"973 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123077743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Agent Reinforcement Learning Approaches to RF Fingerprint Enhancement","authors":"Joseph M. Carmack, Steve Schmidt, Scott Kuzdeba","doi":"10.1145/3468218.3469037","DOIUrl":"https://doi.org/10.1145/3468218.3469037","url":null,"abstract":"Deep learning based RF Fingerprinting has shown great promise for IoT device security. This work explores various multi-agent reinforcement learning approaches to enable RF Fingerprint enhancement for an ensemble of transmitters. A RiftNetTM Reconstruction Model (RRM) is used to learn a latent Wi-Fi signal representation and how to reconstruct from that latent representation at the transmitter such that the reconstruction uniquely excites parts of the front-end to enhance the fingerprint. Deep reinforcement learning is then employed to learn the RRM control policy. Details on the design of the control interface, state representation, and rewards structure are presented for four different policy approaches. The resulting computational and security characteristics are discussed.","PeriodicalId":318719,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114890028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adversarial Learning for Cross Layer Security","authors":"Hesham Mohammed, D. Saha","doi":"10.1145/3468218.3469043","DOIUrl":"https://doi.org/10.1145/3468218.3469043","url":null,"abstract":"Spectrum access in the next generation wireless networks will be congested, competitive, and vulnerable to malicious intents of strong adversaries. This compels us to rethink wireless security for a cross-layer solution addressing it as a joint problem for encryption and modulation. We propose a novel neural network generated cross-layer security algorithm where the trusted transmitter encodes a secret message using a shared secret key to generate a secured waveform. This encrypted waveform remains undeciphered by the adversary while the intended receiver can recover the secret. Cooperative learning is introduced to enable our trusted pair to defeat the adversary and learn the encryption and modulation jointly. The model can encode any modulation order and improves both reliability and secrecy capacity compared to prior work. Our results demonstrate that the trusted pair succeeds in achieving secure data transmission while the adversary can not decipher the received cipher data.","PeriodicalId":318719,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133205809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Steve Schmidt, J. Stankowicz, Joseph M. Carmack, Scott Kuzdeba
{"title":"RiftNeXt™","authors":"Steve Schmidt, J. Stankowicz, Joseph M. Carmack, Scott Kuzdeba","doi":"10.1145/3468218.3469045","DOIUrl":"https://doi.org/10.1145/3468218.3469045","url":null,"abstract":"We propose a framework, RiftNeXtTM, to perform radio frequency (RF) scene context change detection and classification with Expert driven neural explainability. Our approach uses a deep learning based classifier to perform spectrum monitoring of Wi-Fi devices and usage patterns with an auxiliary classifier operating post-hoc to output human interpretable reasoning for classification declarations. The classification network operates on input spectrograms through a series of dilated causal convolution layers for feature extraction which are fed into classification layers. We have previously shown that dilated causal convolutions are well suited for RF applications, including RF fingerprinting, and extend their use here to new applications. The Explainability Module operates over an auxiliary dataset that is built based on domain expertise for learning how to reason over the classification network outputs. These two approaches, the deep learning classifier and Explainability Module are combined into a unique explainable deep learning approach that we apply to Wi-Fi spectrum monitoring. This paper provides results from this fused approach, leveraging the power of deep learning classification with user interpretable explainability.","PeriodicalId":318719,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122759311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intermittent Jamming against Telemetry and Telecommand of Satellite Systems and A Learning-driven Detection Strategy","authors":"Selen Gecgel, Günes Karabulut-Kurt","doi":"10.1145/3468218.3469041","DOIUrl":"https://doi.org/10.1145/3468218.3469041","url":null,"abstract":"Towards sixth-generation networks (6G), satellite communication systems, especially based on Low Earth Orbit (LEO) networks, become promising due to their unique and comprehensive capabilities. These advantages are accompanied by a variety of challenges such as security vulnerabilities, management of hybrid systems, and high mobility. In this paper, firstly, a security deficiency in the physical layer is addressed with a conceptual framework, considering the cyber-physical nature of the satellite systems, highlighting the potential attacks. Secondly, a learning-driven detection scheme is proposed, and the lightweight convolutional neural network (CNN) is designed. The performance of the designed CNN architecture is compared with a prevalent machine learning algorithm, support vector machine (SVM). The results show that deficiency attacks against the satellite systems can be detected by employing the proposed scheme.","PeriodicalId":318719,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning","volume":"9 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120935631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adversarial Attacks on Deep Learning-based Floor Classification and Indoor Localization","authors":"Mohini Patil, Xuyu Wang, Xiangyu Wang, S. Mao","doi":"10.1145/3468218.3469052","DOIUrl":"https://doi.org/10.1145/3468218.3469052","url":null,"abstract":"With the great advances in location-based services (LBS), Wi-Fi localization has attracted great interest due to its ubiquitous availability in indoor environments. Deep neural network (DNN) is a powerful method to achieve high localization performance using Wi-Fi signals. However, DNN models are shown vulnerable to adversarial examples generated by introducing a subtle perturbation. In this paper, we propose adversarial deep learning for indoor localization system using Wi-Fi received signal strength indicator (RSSI). In particular, we study the impact of adversarial attacks on floor classification and location prediction with Wi-Fi RSSI. Three white-box attacks methods are examined, including fast gradient sign attack (FGSM), projected gradient descent (PGD), and momentum iterative method (MIM). We validate the performance of DNN-based floor classification and location prediction using a public dataset and show that the DNN models are highly vulnerable to the three white-box adversarial attacks.","PeriodicalId":318719,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114071350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SWIPEGAN","authors":"Attaullah Buriro, F. Ricci, B. Crispo","doi":"10.1145/3468218.3469039","DOIUrl":"https://doi.org/10.1145/3468218.3469039","url":null,"abstract":"Behavioral biometric-based smartphone user authentication schemes based on touch/swipe have shown to provide the desired usability. However, their accuracy is not yet considered up to the mark. This is primarily due to the lack of a sufficient number of training samples, e.g., swiping gestures1: users are reluctant to provide many. Consequently, the application of such authentication techniques in the real world is still limited. To overcome the shortage of training samples and make behavioral biometric-based schemes more accurate, we propose the usage of Generative Adversarial Networks (GAN) for generating synthetic samples, in our case, or swiping gestures. GAN is an unsupervised approach for synthetic data generation and has already been used in a wide range of applications, such as image and video generation. However, their use in behavioral biometric-based user authentication schemes has not been explored yet. In this paper, we propose SWIPEGAN - to generate swiping samples to be used for smartphone user authentication. Extensive experimentation and evaluation show the quality of the generated synthetic swiping samples and their efficacy in increasing the accuracy of the authentication scheme.","PeriodicalId":318719,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127812410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient and Privacy-preserving Distributed Learning in Cloud-Edge Computing Systems","authors":"Yili Jiang, Kuan Zhang, Y. Qian, R. Hu","doi":"10.1145/3468218.3469044","DOIUrl":"https://doi.org/10.1145/3468218.3469044","url":null,"abstract":"Machine learning and cloud computing have been integrated in diverse applications to provide intelligent services. With powerful computational ability, the cloud server can execute machine learning algorithm efficiently. However, since accurate machine learning highly depends on training the model with sufficient data. Transmitting massive raw data from distributed devices to the cloud leads to heavy communication overhead and privacy leakage. Distributed learning is a promising technique to reduce data transmission by allowing the distributed devices to participant in model training locally. Thus a global learning task can be performed in a distributed way. Although it avoids to disclose the participants' raw data to the cloud directly, the cloud can infer partial private information by analyzing their local models. To tackle this challenge, the state-of-the-art solutions mainly rely on encryption and differential privacy. In this paper, we propose to implement the distributed learning in a three-layer cloud-edge computing system. By applying the mini-batch gradient decent, we can decompose a learning task to distributed edge nodes and participants hierarchically. To improve the communication efficiency while preserving privacy, we employ secure aggregation protocol in small groups by utilizing the social network of participants. Simulation results are presented to show the effectiveness of our proposed scheme in terms of learning accuracy and efficiency.","PeriodicalId":318719,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127188012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning-Assisted Wireless PHY Key Generation with Reconfigurable Intelligent Surfaces","authors":"Long Jiao, Guohua Sun, Junqing Le, K. Zeng","doi":"10.1145/3468218.3469042","DOIUrl":"https://doi.org/10.1145/3468218.3469042","url":null,"abstract":"The key generation rate (KGR) performance of wireless physical layer (PHY) key generation can be limited by the quasi-static slow fading environment. In this work, we aim to exploit the radio environment reconfiguration ability enabled by reconfigurable intelligent surface (RIS) to improve KGR of PHY key generation. By rapidly changing the RIS configurations, the randomness or entropy rate of the wireless channel can be significantly increased, thus improving the KGR. To achieve high KGR while keeping low bit disagreement ratio (BDR), for the first time, we propose a machine learning (ML) based adaptive quantization level prediction scheme to decide an optimal quantization level based on channel state information (CSI). Simulation results show that with a prediction accuracy as high as 98.2%, the proposed ML-based prediction model tends to assign high quantization levels in the high SNR regime to reduce BDR, while adopting low quantization levels under low SNRs to maintain a low BDR.","PeriodicalId":318719,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127504657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jered Pawlak, Yuchen Li, Joshua Price, M. Wright, K. Shamaileh, Quamar Niyaz, V. Devabhaktuni
{"title":"A Machine Learning Approach for Detecting and Classifying Jamming Attacks Against OFDM-based UAVs","authors":"Jered Pawlak, Yuchen Li, Joshua Price, M. Wright, K. Shamaileh, Quamar Niyaz, V. Devabhaktuni","doi":"10.1145/3468218.3469049","DOIUrl":"https://doi.org/10.1145/3468218.3469049","url":null,"abstract":"In this paper, a machine learning (ML) approach is proposed to detect and classify jamming attacks on unmanned aerial vehicles (UAVs). Four attack types are implemented using software-defined radio (SDR); namely, barrage, single-tone, successive-pulse, and protocol-aware jamming. Each type is launched against a drone that uses orthogonal frequency division multiplexing (OFDM) communication to qualitatively analyze its impacts considering jamming range, complexity, and severity. Then, an SDR is utilized in proximity to the drone and in systematic testing scenarios to record the radiometric parameters before and after each attack is launched. Signal-to-noise ratio (SNR), energy threshold, and several OFDM parameters are exploited as features and fed to six ML algorithms to explore and enable autonomous jamming detection/classification. The algorithms are quantitatively evaluated with metrics including detection and false alarm rates to evaluate the received signals and facilitate efficient decision-making for improved reception integrity and reliability. The resulting ML approach detects and classifies jamming with an accuracy of 92.2% and a false-alarm rate of 1.35%.","PeriodicalId":318719,"journal":{"name":"Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning","volume":"64 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114016921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}