When wireless security meets machine learning: Motivation, challenges, and research directions

YE Sagduyu, Y Shi, T Erpek, W Headley… - arXiv preprint arXiv …, 2020 - arxiv.org
arXiv preprint arXiv:2001.08883, 2020arxiv.org
Wireless systems are vulnerable to various attacks such as jamming and eavesdropping
due to the shared and broadcast nature of wireless medium. To support both attack and
defense strategies, machine learning (ML) provides automated means to learn from and
adapt to wireless communication characteristics that are hard to capture by hand-crafted
features and models. This article discusses motivation, background, and scope of research
efforts that bridge ML and wireless security. Motivated by research directions surveyed in the …
Wireless systems are vulnerable to various attacks such as jamming and eavesdropping due to the shared and broadcast nature of wireless medium. To support both attack and defense strategies, machine learning (ML) provides automated means to learn from and adapt to wireless communication characteristics that are hard to capture by hand-crafted features and models. This article discusses motivation, background, and scope of research efforts that bridge ML and wireless security. Motivated by research directions surveyed in the context of ML for wireless security, ML-based attack and defense solutions and emerging adversarial ML techniques in the wireless domain are identified along with a roadmap to foster research efforts in bridging ML and wireless security.
arxiv.org
以上显示的是最相近的搜索结果。 查看全部搜索结果