Adversarial Networks for Secure Wireless Communications

We propose a data-driven secure wireless communication scheme, in which the goal is to transmit a signal to a legitimate receiver with minimal distortion, while keeping some information about the signal private from an eavesdropping adversary. When the data distribution is known, the optimal trade-off between the reconstruction quality at the legitimate receiver and the leakage to the adversary can be characterised in the information theoretic asymptotic limit. In this paper, we assume that we do not know the data distribution, but instead have access to a dataset, and we are interested in the finite blocklength regime rather than the asymptotic limits. We propose a data-driven adversarially trained deep joint source-channel coding architecture, and demonstrate through experiments with CIFAR-10 dataset that it is possible to transmit to the legitimate receiver with minimal end-to-end distortion while concealing information on the image class from the adversary.

[1]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[2]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[3]  H. Vincent Poor,et al.  Secure lossless compression with side information , 2008, 2008 IEEE Information Theory Workshop.

[4]  David Barber,et al.  The IM algorithm: a variational approach to Information Maximization , 2003, NIPS 2003.

[5]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[6]  Hirosuke Yamamoto Rate-distortion theory for the Shannon cipher system , 1997, IEEE Trans. Inf. Theory.

[7]  Deniz Gündüz,et al.  Successive Refinement of Images with Deep Joint Source-Channel Coding , 2019, 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[8]  Jakob Hoydis,et al.  An Introduction to Deep Learning for the Physical Layer , 2017, IEEE Transactions on Cognitive Communications and Networking.

[9]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[10]  Deniz Gündüz,et al.  Deep Joint Source-channel Coding for Wireless Image Transmission , 2018, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[11]  Eduard A. Jorswieck,et al.  Flexible Design of Finite Blocklength Wiretap Codes by Autoencoders , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[12]  Gerhard Wunder,et al.  Deep Learning for the Gaussian Wiretap Channel , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).