Privacy-Aware Communication Over the Wiretap Channel with Generative Networks

We study privacy-aware communication over a wiretap channel using end-to-end learning. Alice wants to transmit a source signal to Bob over a binary symmetric channel, while passive eavesdropper Eve tries to infer some sensitive attribute of Alice’s source based on its overheard signal. Since we usually do not have access to true distributions, we propose a data-driven approach using variational autoencoder (VAE)-based joint source channel coding (JSCC). We show through simulations with the colored MNIST dataset that our approach provides high reconstruction quality at the receiver while confusing the eavesdropper about the latent sensitive attribute, which consists of the color and thickness of the digits. Finally, we consider a parallel-channel scenario, and show that our approach arranges the information transmission such that the channels with higher noise levels at the eavesdropper carry the sensitive information, while the non-sensitive information is transmitted over more vulnerable channels.

[1]  Neri Merhav Shannon's Secrecy System With Informed Receivers and its Application to Systematic Coding for Wiretapped Channels , 2008, IEEE Transactions on Information Theory.

[2]  Gerhard Wunder,et al.  Deep learning based wiretap coding via mutual information estimation , 2020, WiseML@WiSec.

[3]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[4]  Deniz Gündüz,et al.  On Perfect Privacy , 2017, 2018 IEEE International Symposium on Information Theory (ISIT).

[5]  Flávio du Pin Calmon,et al.  Privacy against statistical inference , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[6]  Deniz Gündüz,et al.  Adversarial Networks for Secure Wireless Communications , 2020, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[7]  Mihaela van der Schaar,et al.  Machine Learning in the Air , 2019, IEEE Journal on Selected Areas in Communications.

[8]  Deniz Gündüz,et al.  Privacy-Aware Time-Series Data Sharing With Deep Reinforcement Learning , 2021, IEEE Transactions on Information Forensics and Security.

[9]  Muriel Médard,et al.  From the Information Bottleneck to the Privacy Funnel , 2014, 2014 IEEE Information Theory Workshop (ITW 2014).

[10]  Jakob Hoydis,et al.  An Introduction to Deep Learning for the Physical Layer , 2017, IEEE Transactions on Cognitive Communications and Networking.

[11]  Tobias J. Oechtering,et al.  A Design Framework for Epsilon-Private Data Disclosure , 2020, ArXiv.

[12]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[13]  Deniz Gündüz,et al.  Deep Joint Source-channel Coding for Wireless Image Transmission , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[14]  Deniz Gündüz,et al.  Optimal Utility-Privacy Trade-off with the Total Variation Distance as the Privacy Measure , 2018, ArXiv.

[15]  David Barber,et al.  The IM algorithm: a variational approach to Information Maximization , 2003, NIPS 2003.

[16]  Alexander A. Alemi,et al.  On Variational Bounds of Mutual Information , 2019, ICML.

[17]  Deniz Gündüz,et al.  Active Privacy-Utility Trade-Off Against A Hypothesis Testing Adversary , 2021, ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[18]  Pier Luigi Dragotti,et al.  Smart Meter Privacy , 2020 .

[19]  Deniz Gündüz,et al.  The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection , 2021, IEEE Transactions on Information Forensics and Security.

[20]  Gerhard Wunder,et al.  Deep Learning for the Gaussian Wiretap Channel , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[21]  Stefano Ermon,et al.  Neural Joint Source-Channel Coding , 2018, ICML.

[22]  H. Vincent Poor,et al.  An Overview of Information-Theoretic Security and Privacy: Metrics, Limits and Applications , 2021, IEEE Journal on Selected Areas in Information Theory.

[23]  Eduard A. Jorswieck,et al.  Wiretap Code Design by Neural Network Autoencoders , 2020, IEEE Transactions on Information Forensics and Security.