Adversarial Jamming Attacks on Deep Reinforcement Learning Based Dynamic Multichannel Access

Chen Zhong, Feng Wang, M. Cenk Gursoy, Senem Velipasalar

Research output: Chapter in Book/Entry/PoemConference contribution

22 Scopus citations

Abstract

Adversarial attack strategies have been widely studied in machine learning applications, and now are increasingly attracting interest in wireless communications as the application of machine learning methods to wireless systems grows along with security concerns. In this paper, we propose two adversarial policies, one based on feed-forward neural networks (FNNs) and the other based on deep reinforcement learning (DRL) policies. Both attack strategies aim at minimizing the accuracy of a DRL-based dynamic channel access agent. We first present the two frameworks and the dynamic attack procedures of the two adversarial policies. Then we demonstrate and compare their performances. Finally, the advantages and disadvantages of the two frameworks are identified.

Original languageEnglish (US)
Title of host publication2020 IEEE Wireless Communications and Networking Conference, WCNC 2020 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728131061
DOIs
StatePublished - May 2020
Event2020 IEEE Wireless Communications and Networking Conference, WCNC 2020 - Seoul, Korea, Republic of
Duration: May 25 2020May 28 2020

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
Volume2020-May
ISSN (Print)1525-3511

Conference

Conference2020 IEEE Wireless Communications and Networking Conference, WCNC 2020
Country/TerritoryKorea, Republic of
CitySeoul
Period5/25/205/28/20

Keywords

  • Adversarial policies
  • deep reinforcement learning
  • dynamic channel access
  • feed-forward neural networks

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Adversarial Jamming Attacks on Deep Reinforcement Learning Based Dynamic Multichannel Access'. Together they form a unique fingerprint.

Cite this