Presentation + Paper
31 May 2022 Learning secure modulation using complex neural networks
Hesham Mohammed, Dola Saha
Author Affiliations +
Abstract
Growing interest in utilizing wireless spectrum makes spectrum access congested, competitive, and often contested making wireless signals vulnerable to various attacks. This compels us to design a secure waveform that solves encryption and modulation as a joint problem. We propose a novel end-to-end symmetric key encryption algorithm where the transmitter encodes the confidential data bits using a shared secret key to generate a secure waveform and the legitimate receiver decrypts the waveform to retrieve the transmitted bits. The trusted pairs are trained adversarially to learn secure data communication by introducing an adversarial NN, that helps to separate the mutual information between secret bits and secured waveform. Cooperative learning takes place between the trusted pair to defeat the adversary and learn encryption and modulation jointly. Complex neural networks are used to build encryption/decryption networks to improve the secrecy-reliability trade-off compared to prior works. Extensive simulated data set is used to train the trusted pair to learn secure data transmission. Our results demonstrate that the trusted pair succeeds in achieving secure data transmission over wireless links while the adversary can not decode or recognize the received waveform.
Conference Presentation
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Hesham Mohammed and Dola Saha "Learning secure modulation using complex neural networks", Proc. SPIE 12097, Big Data IV: Learning, Analytics, and Applications, 1209709 (31 May 2022); https://doi.org/10.1117/12.2618811
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Neural networks

Modulation

Reliability

Data modeling

Signal to noise ratio

Data transmission

Network architectures

Back to Top