4.7 Article

DeepWiFi: Cognitive WiFi with Deep Learning

Journal

IEEE TRANSACTIONS ON MOBILE COMPUTING
Volume 20, Issue 2, Pages 429-444

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TMC.2019.2949815

Keywords

WiFi; machine learning; deep learning; dynamic spectrum access; RF signal processing; signal classification; signal authentication

Funding

  1. U.S. Army [W91CRB-17-P-0068]

Ask authors/readers for more resources

The DeepWiFi protocol enhances baseline WiFi with deep learning to mitigate out-of-network interference and sustain high throughput. Users benefit from features such as RF front end processing, spectrum sensing, and signal classification, which improve transmission reliability and speed.
We present the DeepWiFi protocol, which hardens the baseline WiFi (IEEE 802.11ac) with deep learning and sustains high throughput by mitigating out-of-network interference. DeepWiFi is interoperable with baseline WiFi and builds upon the existing WiFi's PHY transceiver chain without changing the MAC frame format. Users run DeepWiFi for: i) RF front end processing; ii) spectrum sensing and signal classification; iii) signal authentication; iv) channel selection and access; v) power control; vi) modulation and coding scheme (MCS) adaptation; and vii) routing. DeepWiFi mitigates the effects of probabilistic, sensing-based, and adaptive jammers. RF front end processing applies a deep learning-based autoencoder to extract spectrum-representative features. Then a deep neural network is trained to classify waveforms reliably as idle, WiFi, or jammer. Utilizing channel labels, users effectively access idle or jammed channels, while avoiding interference with legitimate WiFi transmissions (authenticated by machine learning-based RF fingerprinting) resulting in higher throughput. Users optimize their transmit power for low probability of intercept/detection and their MCS to maximize link rates used by backpressure algorithm for routing. Supported by embedded platform implementation, DeepWiFi provides major throughput gains compared to baseline WiFi and another jamming-resistant protocol, especially when channels are likely to be jammed and the signal-to-interference-plus-noise-ratio is low.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Computer Science, Information Systems

Adversarial Deep Learning for Over-the-Air Spectrum Poisoning Attacks

Yalin E. Sagduyu, Yi Shi, Tugba Erpek

Summary: An adversarial deep learning approach is used to launch over-the-air spectrum poisoning attacks, where an adversary learns the behavior of a transmitter and falsifies the spectrum sensing data. The attacks are energy efficient, hard to detect, and substantially reduce throughput. A dynamic defense is designed to manipulate the adversary's training data and sustain the transmitter's throughput.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2021)

Article Telecommunications

Generative Adversarial Network in the Air: Deep Adversarial Learning for Wireless Signal Spoofing

Yi Shi, Kemal Davaslioglu, Yalin E. Sagduyu

Summary: The paper presents a deep learning-based spoofing attack to bypass physical-layer signal authentication by generating synthetic wireless signals that cannot be statistically distinguished from intended transmissions. The attack increases the probability of misclassifying spoofing signals as intended signals by jointly capturing waveform, channel, and radio hardware effects inherent to wireless signals under attack. The success of the spoofing attack can be increased by the adversary transmitter using multiple antennas, while it decreases when the defender receiver uses multiple antennas.

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2021)

Article Computer Science, Information Systems

Membership Inference Attack and Defense for Wireless Signal Classifiers With Deep Learning

Yi Shi, Yalin E. Sagduyu

Summary: This paper presents an over-the-air membership inference attack (MIA) that can leak private information from a wireless signal classifier. The attack uses machine learning to classify wireless signals, which is useful for PHY-layer authentication. The MIA infers whether a signal has been used in the training data of a target classifier and can exploit the leaked information to identify vulnerabilities. The paper also proposes a proactive defense strategy against the MIA, which involves building a shadow model to deceive the adversary and reduce the accuracy of the attack.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2023)

Article Computer Science, Information Systems

When Attackers Meet AI: Learning-Empowered Attacks in Cooperative Spectrum Sensing

Zhengping Luo, Shangqing Zhao, Zhuo Lu, Jie Xu, Yalin E. Sagduyu

Summary: This paper proposes a novel adversarial machine learning framework called Learning-Evaluation-Beating (LEB) to mislead the fusion center in cooperative spectrum sensing. The LEB attack effectively beats existing defense strategies by creating malicious sensing data using a surrogate model. Additionally, a non-invasive defense method named influence-limiting defense is introduced to reduce the overall disruption caused by LEB attack.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2022)

Article Physics, Multidisciplinary

Adversarial Machine Learning for NextG Covert Communications Using Multiple Antennas

Brian Kim, Yalin Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus

Summary: This paper investigates the privacy of wireless communications against eavesdroppers who use a deep learning classifier to detect transmissions of interest. By utilizing a cooperative jammer that sends adversarial perturbations, the eavesdropper can be deceived into misclassifying the received signals as noise. The results show that the adversarial perturbation is more effective when multiple antennas are used.

ENTROPY (2022)

Article Engineering, Electrical & Electronic

Channel-Aware Adversarial Attacks Against Deep Learning-Based Wireless Signal Classifiers

Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus

Summary: This paper introduces channel-aware adversarial attacks against deep learning-based wireless signal classifiers, exploring the failure of evasion attacks without considering channel effects and presenting realistic attacks by considering channel effects. It also proposes a certified defense based on randomized smoothing to make the modulation classifier robust to adversarial attacks.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2022)

Article Telecommunications

Machine Learning in NextG Networks via Generative Adversarial Networks

Ender Ayanoglu, Kemal Davaslioglu, Yalin E. Sagduyu

Summary: This paper investigates the application of Generative Adversarial Networks (GANs) in next-generation communications, particularly in addressing spectrum sharing, anomaly detection, and security attack mitigation in cognitive networks. GANs have advantages such as learning and synthesizing field data, pre-training classifiers, increasing resolution, and recovering corrupted bits.

IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING (2022)

Article Computer Science, Information Systems

Learning-Based UAV Path Planning for Data Collection With Integrated Collision Avoidance

Xueyuan Wang, M. Cenk Gursoy, Tugba Erpek, Yalin E. Sagduyu

Summary: This article discusses the challenging task of determining collision-free trajectory in multi-UAV noncooperative scenarios while collecting data from distributed IoT nodes. The problem is translated into a Markov decision process and a Dueling double deep Q-network algorithm is proposed to learn the decision-making policy. Numerical results demonstrate efficient real-time navigation in various scenarios.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Self-Supervised RF Signal Representation Learning for NextG Signal Classification With Deep Learning

Kemal Davaslioglu, Serdar Boztas, Mehmet Can Ertem, Yalin E. Sagduyu, Ender Ayanoglu

Summary: Deep learning has wide applications in the wireless domain for improving spectrum awareness. We propose a self-supervised RF signal representation learning method and apply it to automatic modulation recognition task. By capturing the wireless signal characteristics through a set of transformations, we demonstrate that self-supervised learning significantly increases the sample efficiency of automatic modulation recognition and maintains high accuracy even with limited training data.

IEEE WIRELESS COMMUNICATIONS LETTERS (2023)

Article Computer Science, Information Systems

An SDN-Enabled Framework for a Load-Balanced and QoS-Aware Internet of Underwater Things

Yaliang Shi, Qiuling Yang, Xiwen Huang, Deshun Li, Xiangdang Huang

Summary: This article proposes a load-balanced and QoS-aware software-defined IoUT framework using the SDN+AI paradigm. By adopting SDN technology to separate the data plane and control plane, the network's scalability and flexibility are enhanced. The CASM load-balancing strategy and SQAR adaptive routing protocol based on reinforcement learning further optimize the network's performance in terms of load balancing and QoS satisfaction. Experimental results show that CASM achieves efficient load balancing and SQAR outperforms existing QoS-aware routing protocols. Overall, the proposed framework maintains a low QoS violation rate and high load-balancing rate in a timely manner.

IEEE INTERNET OF THINGS JOURNAL (2023)

Review Computer Science, Information Systems

Adversarial Machine Learning in Wireless Communications Using RF Data: A Review

Damilola Adesina, Chung-Chu Hsieh, Yalin E. Sagduyu, Lijun Qian

Summary: Machine learning (ML) is effective in learning from spectrum data and solving complex wireless communication tasks, and deep learning (DL) has found success in various wireless communication tasks. However, ML and DL are vulnerable to attacks, leading to the field of adversarial machine learning (AML). AML in the wireless communications domain is still in its early stage. This paper presents a comprehensive review of the latest research efforts focused on AML in wireless communications, discussing AML attacks, defense mechanisms, and future outlook.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2023)

Article Engineering, Electrical & Electronic

How to Attack and Defend NextG Radio Access Network Slicing With Reinforcement Learning

Yi Shi, Yalin E. Sagduyu, Tugba Erpek, M. Cenk Gursoy

Summary: In this paper, the use of reinforcement learning (RL) for network slicing in NextG radio access networks is explored. An over-the-air attack is introduced based on adversarial machine learning to manipulate the RL algorithm and disrupt network slicing. The attack is shown to be more effective than benchmark jamming attacks. Different defense schemes are introduced to defend against this attack and improve the RL algorithm's reward.

IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY (2023)

No Data Available