Adversarial jamming attacks and defense strategies via adaptive deep reinforcement learning

Feng Wang,Chen Zhong,M. Cenk Gursoy,Senem Velipasalar
DOI: https://doi.org/10.1109/ACCESS.2021.3133506
2020-07-13
Abstract:As the applications of deep reinforcement learning (DRL) in wireless communications grow, sensitivity of DRL based wireless communication strategies against adversarial attacks has started to draw increasing attention. In order to address such sensitivity and alleviate the resulting security concerns, we in this paper consider a victim user that performs DRL-based dynamic channel access, and an attacker that executes DRLbased jamming attacks to disrupt the victim. Hence, both the victim and attacker are DRL agents and can interact with each other, retrain their models, and adapt to opponents' policies. In this setting, we initially develop an adversarial jamming attack policy that aims at minimizing the accuracy of victim's decision making on dynamic channel access. Subsequently, we devise defense strategies against such an attacker, and propose three defense strategies, namely diversified defense with proportional-integral-derivative (PID) control, diversified defense with an imitation attacker, and defense via orthogonal policies. We design these strategies to maximize the attacked victim's accuracy and evaluate their performances.
Signal Processing,Machine Learning
What problem does this paper attempt to address?
The problem that this paper attempts to solve is the security issue brought about by the fact that in wireless communication, the dynamic channel access strategy driven by deep reinforcement learning (DRL) is very sensitive to adversarial attacks. Specifically: - **Attacker and Victim Models**: The paper constructs a scenario in which there is a user (the victim) performing DRL - based dynamic channel access, and an attacker performing DRL - based jamming attacks. Both are DRL agents and can interact, retrain the model and adapt to each other's strategies. - **Attack Objectives**: The attacker aims to minimize the accuracy of the victim's dynamic channel access decisions through jamming attacks. To this end, the paper first develops an adversarial jamming attack strategy aimed at reducing the victim's decision - making accuracy. - **Defense Strategies**: To counter such attacks, the paper proposes three defense strategies: - **PID - control - based Diversified Defense**: Enhance system stability by introducing a proportional - integral - differential (PID) controller. - **Imitating - Attacker - based Diversified Defense**: Improve the defense effect by imitating the attacker's strategy. - **Orthogonal - strategy Defense**: Maximize the victim's accuracy by adopting a method orthogonal to the attacker's strategy. - **Evaluation and Contributions**: The paper elaborately designs and evaluates the performance of these defense strategies, showing how to significantly improve the victim's channel access accuracy in the face of jamming attacks. In summary, the main objective of the paper is to analyze and experimentally verify the vulnerability of DRL in wireless communication and propose effective defense measures to enhance system security.