Boxiang He,Fanggang Wang,Tony Q.S. Quek
Abstract:This letter explores the positive side of the adversarial attack for the security-aware semantic communication system. Specifically, a pair of matching pluggable modules is installed: one after the semantic transmitter and the other before the semantic receiver. The module at transmitter uses a trainable adversarial residual network (ARN) to generate adversarial examples, while the module at receiver employs another trainable ARN to remove the adversarial attacks and the channel noise. To mitigate the threat of semantic eavesdropping, the trainable ARNs are jointly optimized to minimize the weighted sum of the power of adversarial attack, the mean squared error of semantic communication, and the confidence of eavesdropper correctly retrieving private information. Numerical results show that the proposed scheme is capable of fooling the eavesdropper while maintaining the high-quality semantic communication.
What problem does this paper attempt to address?
The problem that this paper attempts to solve is how to improve security in semantic communication systems, especially the defense against adversarial attacks. Specifically, the paper proposes a design scheme based on Paired Adversarial Residual Networks (ARN), aiming to protect communication content from being intercepted by eavesdroppers by generating adversarial samples at the transmitter and eliminating these adversarial attacks and channel noise at the receiver, while maintaining high - quality semantic communication performance.
### Background and Problem Description of the Paper
With the development of deep learning technology, semantic communication technology based on deep learning has attracted wide attention because it can convey more abundant semantic information and is regarded as one of the key technologies in the future sixth - generation (6G) mobile communication systems. However, research in the field of adversarial machine learning shows that even a tiny adversarial attack may deceive a deep - learning model, which makes the deep - learning - based semantic communication system face unique security threats, especially the threat of adversarial attacks.
### Overview of the Solution
To meet this challenge, the paper proposes a security - aware semantic communication framework, which is implemented by installing a pair of matched plug - in modules at the transmitter and the receiver respectively. These modules are designed based on the trainable Adversarial Residual Network (ARN):
1. **Transmitter - side Module**: Use the trainable ARN to generate adversarial samples, which are added to the original signal to interfere with potential eavesdroppers.
2. **Receiver - side Module**: Also use a trainable ARN to remove adversarial attacks and channel noise and restore the original signal.
### Model Optimization Objectives
To optimize these plug - in modules, the paper defines a loss function, which consists of three parts:
- **Adversarial Attack Power**: Control the intensity of adversarial attacks through \( L_{\text{pow}} \), ensuring that it does not exceed the set threshold.
- **Semantic Communication Quality**: Measure the communication quality between the sender and the legitimate receiver through \( L_{\text{com}} \), usually using the mean - square error (MSE) as a metric.
- **Privacy Information Leakage**: Evaluate the probability that the eavesdropper correctly recovers private information through \( L_{\text{pri}} \), aiming to make the eavesdropper's classification confidence as low as possible.
The form of the loss function is:
\[ L(s, v, \theta_{\text{FAlice}}, \theta_{\text{FBob}}) = \lambda_{\text{pow}} L_{\text{pow}} + \lambda_{\text{com}} L_{\text{com}} + \lambda_{\text{pri}} L_{\text{pri}} \]
where \( \lambda_{\text{pow}} \), \( \lambda_{\text{com}} \) and \( \lambda_{\text{pri}} \) are hyper - parameters used to balance the importance of different objectives.
### Experimental Results
The experimental results show that the proposed scheme can effectively reduce the classification accuracy of eavesdroppers while maintaining high - quality semantic communication. Specifically:
- When using the paired plug - in modules, the mean - square error (MSE) of the legitimate receiver (Bob) is close to the level of the original semantic communication system without security considerations.
- The image classification accuracy of the eavesdropper (Eve) decreases significantly, and even in the "black - box" scenario (that is, the sender does not know the eavesdropper's model), the performance degradation only increases slightly.
### Conclusion
The paper proposes a design scheme of paired plug - in modules based on the Adversarial Residual Network to improve the security of semantic communication systems. By generating adversarial samples at the transmitter and eliminating these attacks at the receiver, this scheme can not only protect communication content from being intercepted by eavesdroppers, but also maintain high - quality semantic communication performance. Future research directions include replacing the current DNN blocks with more advanced deep models (such as Transformer) and evaluating performance on more datasets.