-
Neural Networks Meet Elliptic Curve Cryptography: A Novel Approach to Secure Communication
Authors:
Mina Cecilie Wøien,
Ferhat Ozgur Catak,
Murat Kuzlu,
Umit Cali
Abstract:
In recent years, neural networks have been used to implement symmetric cryptographic functions for secure communications. Extending this domain, the proposed approach explores the application of asymmetric cryptography within a neural network framework to safeguard the exchange between two communicating entities, i.e., Alice and Bob, from an adversarial eavesdropper, i.e., Eve. It employs a set of…
▽ More
In recent years, neural networks have been used to implement symmetric cryptographic functions for secure communications. Extending this domain, the proposed approach explores the application of asymmetric cryptography within a neural network framework to safeguard the exchange between two communicating entities, i.e., Alice and Bob, from an adversarial eavesdropper, i.e., Eve. It employs a set of five distinct cryptographic keys to examine the efficacy and robustness of communication security against eavesdropping attempts using the principles of elliptic curve cryptography. The experimental setup reveals that Alice and Bob achieve secure communication with negligible variation in security effectiveness across different curves. It is also designed to evaluate cryptographic resilience. Specifically, the loss metrics for Bob oscillate between 0 and 1 during encryption-decryption processes, indicating successful message comprehension post-encryption by Alice. The potential vulnerability with a decryption accuracy exceeds 60\%, where Eve experiences enhanced adversarial training, receiving twice the training iterations per batch compared to Alice and Bob.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Uncertainty Quantification in Large Language Models Through Convex Hull Analysis
Authors:
Ferhat Ozgur Catak,
Murat Kuzlu
Abstract:
Uncertainty quantification approaches have been more critical in large language models (LLMs), particularly high-risk applications requiring reliable outputs. However, traditional methods for uncertainty quantification, such as probabilistic models and ensemble techniques, face challenges when applied to the complex and high-dimensional nature of LLM-generated outputs. This study proposes a novel…
▽ More
Uncertainty quantification approaches have been more critical in large language models (LLMs), particularly high-risk applications requiring reliable outputs. However, traditional methods for uncertainty quantification, such as probabilistic models and ensemble techniques, face challenges when applied to the complex and high-dimensional nature of LLM-generated outputs. This study proposes a novel geometric approach to uncertainty quantification using convex hull analysis. The proposed method leverages the spatial properties of response embeddings to measure the dispersion and variability of model outputs. The prompts are categorized into three types, i.e., `easy', `moderate', and `confusing', to generate multiple responses using different LLMs at varying temperature settings. The responses are transformed into high-dimensional embeddings via a BERT model and subsequently projected into a two-dimensional space using Principal Component Analysis (PCA). The Density-Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm is utilized to cluster the embeddings and compute the convex hull for each selected cluster. The experimental results indicate that the uncertainty of the model for LLMs depends on the prompt complexity, the model, and the temperature setting.
△ Less
Submitted 28 June, 2024;
originally announced June 2024.
-
Uncertainty Aware Deep Learning Model for Secure and Trustworthy Channel Estimation in 5G Networks
Authors:
Ferhat Ozgur Catak,
Umit Cali,
Murat Kuzlu,
Salih Sarp
Abstract:
With the rise of intelligent applications, such as self-driving cars and augmented reality, the security and reliability of wireless communication systems have become increasingly crucial. One of the most critical components of ensuring a high-quality experience is channel estimation, which is fundamental for efficient transmission and interference management in wireless networks. However, using d…
▽ More
With the rise of intelligent applications, such as self-driving cars and augmented reality, the security and reliability of wireless communication systems have become increasingly crucial. One of the most critical components of ensuring a high-quality experience is channel estimation, which is fundamental for efficient transmission and interference management in wireless networks. However, using deep neural networks (DNNs) in channel estimation raises security and trust concerns due to their complexity and the need for more transparency in decision-making. This paper proposes a Monte Carlo Dropout (MCDO)-based approach for secure and trustworthy channel estimation in 5G networks. Our approach combines the advantages of traditional and deep learning techniques by incorporating conventional pilot-based channel estimation as a prior in the deep learning model. Additionally, we use MCDO to obtain uncertainty-aware predictions, enhancing the model's security and trustworthiness. Our experiments demonstrate that our proposed approach outperforms traditional and deep learning-based approaches regarding security, trustworthiness, and performance in 5G scenarios.
△ Less
Submitted 4 May, 2023;
originally announced May 2023.
-
A Streamlit-based Artificial Intelligence Trust Platform for Next-Generation Wireless Networks
Authors:
M. Kuzlu,
F. O. Catak,
S. Sarp,
U. Cali,
O Gueler
Abstract:
With the rapid development and integration of artificial intelligence (AI) methods in next-generation networks (NextG), AI algorithms have provided significant advantages for NextG in terms of frequency spectrum usage, bandwidth, latency, and security. A key feature of NextG is the integration of AI, i.e., self-learning architecture based on self-supervised algorithms, to improve the performance o…
▽ More
With the rapid development and integration of artificial intelligence (AI) methods in next-generation networks (NextG), AI algorithms have provided significant advantages for NextG in terms of frequency spectrum usage, bandwidth, latency, and security. A key feature of NextG is the integration of AI, i.e., self-learning architecture based on self-supervised algorithms, to improve the performance of the network. A secure AI-powered structure is also expected to protect NextG networks against cyber-attacks. However, AI itself may be attacked, i.e., model poisoning targeted by attackers, and it results in cybersecurity violations. This paper proposes an AI trust platform using Streamlit for NextG networks that allows researchers to evaluate, defend, certify, and verify their AI models and applications against adversarial threats of evasion, poisoning, extraction, and interference.
△ Less
Submitted 25 October, 2022;
originally announced November 2022.
-
Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals
Authors:
Ferhat Ozgur Catak,
Murat Kuzlu,
Salih Sarp,
Evren Catak,
Umit Cali
Abstract:
Cellular networks (LTE, 5G, and beyond) are dramatically growing with high demand from consumers and more promising than the other wireless networks with advanced telecommunication technologies. The main goal of these networks is to connect billions of devices, systems, and users with high-speed data transmission, high cell capacity, and low latency, as well as to support a wide range of new appli…
▽ More
Cellular networks (LTE, 5G, and beyond) are dramatically growing with high demand from consumers and more promising than the other wireless networks with advanced telecommunication technologies. The main goal of these networks is to connect billions of devices, systems, and users with high-speed data transmission, high cell capacity, and low latency, as well as to support a wide range of new applications, such as virtual reality, metaverse, telehealth, online education, autonomous and flying vehicles, advanced manufacturing, and many more. To achieve these goals, spectrum sensing has been paid more attention, along with new approaches using artificial intelligence (AI) methods for spectrum management in cellular networks. This paper provides a vulnerability analysis of spectrum sensing approaches using AI-based semantic segmentation models for identifying cellular network signals under adversarial attacks with and without defensive distillation methods. The results showed that mitigation methods can significantly reduce the vulnerabilities of AI-based spectrum sensing models against adversarial attacks.
△ Less
Submitted 27 September, 2022;
originally announced September 2022.
-
Defensive Distillation based Adversarial Attacks Mitigation Method for Channel Estimation using Deep Learning Models in Next-Generation Wireless Networks
Authors:
Ferhat Ozgur Catak,
Murat Kuzlu,
Evren Catak,
Umit Cali,
Ozgur Guler
Abstract:
Future wireless networks (5G and beyond) are the vision of forthcoming cellular systems, connecting billions of devices and people together. In the last decades, cellular networks have been dramatically growth with advanced telecommunication technologies for high-speed data transmission, high cell capacity, and low latency. The main goal of those technologies is to support a wide range of new appl…
▽ More
Future wireless networks (5G and beyond) are the vision of forthcoming cellular systems, connecting billions of devices and people together. In the last decades, cellular networks have been dramatically growth with advanced telecommunication technologies for high-speed data transmission, high cell capacity, and low latency. The main goal of those technologies is to support a wide range of new applications, such as virtual reality, metaverse, telehealth, online education, autonomous and flying vehicles, smart cities, smart grids, advanced manufacturing, and many more. The key motivation of NextG networks is to meet the high demand for those applications by improving and optimizing network functions. Artificial Intelligence (AI) has a high potential to achieve these requirements by being integrated in applications throughout all layers of the network. However, the security concerns on network functions of NextG using AI-based models, i.e., model poising, have not been investigated deeply. Therefore, it needs to design efficient mitigation techniques and secure solutions for NextG networks using AI-based methods. This paper proposes a comprehensive vulnerability analysis of deep learning (DL)-based channel estimation models trained with the dataset obtained from MATLAB's 5G toolbox for adversarial attacks and defensive distillation-based mitigation methods. The adversarial attacks produce faulty results by manipulating trained DL-based models for channel estimation in NextG networks, while making models more robust against any attacks through mitigation methods. This paper also presents the performance of the proposed defensive distillation mitigation method for each adversarial attack against the channel estimation model. The results indicated that the proposed mitigation method can defend the DL-based channel estimation models against adversarial attacks in NextG networks.
△ Less
Submitted 12 August, 2022;
originally announced August 2022.
-
Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case
Authors:
Febrianti Wibawa,
Ferhat Ozgur Catak,
Salih Sarp,
Murat Kuzlu,
Umit Cali
Abstract:
Medical data is often highly sensitive in terms of data privacy and security concerns. Federated learning, one type of machine learning techniques, has been started to use for the improvement of the privacy and security of medical data. In the federated learning, the training data is distributed across multiple machines, and the learning process is performed in a collaborative manner. There are se…
▽ More
Medical data is often highly sensitive in terms of data privacy and security concerns. Federated learning, one type of machine learning techniques, has been started to use for the improvement of the privacy and security of medical data. In the federated learning, the training data is distributed across multiple machines, and the learning process is performed in a collaborative manner. There are several privacy attacks on deep learning (DL) models to get the sensitive information by attackers. Therefore, the DL model itself should be protected from the adversarial attack, especially for applications using medical data. One of the solutions for this problem is homomorphic encryption-based model protection from the adversary collaborator. This paper proposes a privacy-preserving federated learning algorithm for medical data using homomorphic encryption. The proposed algorithm uses a secure multi-party computation protocol to protect the deep learning model from the adversaries. In this study, the proposed algorithm using a real-world medical dataset is evaluated in terms of the model performance.
△ Less
Submitted 16 April, 2022;
originally announced April 2022.
-
The Adversarial Security Mitigations of mmWave Beamforming Prediction Models using Defensive Distillation and Adversarial Retraining
Authors:
Murat Kuzlu,
Ferhat Ozgur Catak,
Umit Cali,
Evren Catak,
Ozgur Guler
Abstract:
The design of a security scheme for beamforming prediction is critical for next-generation wireless networks (5G, 6G, and beyond). However, there is no consensus about protecting the beamforming prediction using deep learning algorithms in these networks. This paper presents the security vulnerabilities in deep learning for beamforming prediction using deep neural networks (DNNs) in 6G wireless ne…
▽ More
The design of a security scheme for beamforming prediction is critical for next-generation wireless networks (5G, 6G, and beyond). However, there is no consensus about protecting the beamforming prediction using deep learning algorithms in these networks. This paper presents the security vulnerabilities in deep learning for beamforming prediction using deep neural networks (DNNs) in 6G wireless networks, which treats the beamforming prediction as a multi-output regression problem. It is indicated that the initial DNN model is vulnerable against adversarial attacks, such as Fast Gradient Sign Method (FGSM), Basic Iterative Method (BIM), Projected Gradient Descent (PGD), and Momentum Iterative Method (MIM), because the initial DNN model is sensitive to the perturbations of the adversarial samples of the training data. This study also offers two mitigation methods, such as adversarial training and defensive distillation, for adversarial attacks against artificial intelligence (AI)-based models used in the millimeter-wave (mmWave) beamforming prediction. Furthermore, the proposed scheme can be used in situations where the data are corrupted due to the adversarial examples in the training data. Experimental results show that the proposed methods effectively defend the DNN models against adversarial attacks in next-generation wireless networks.
△ Less
Submitted 16 February, 2022;
originally announced February 2022.
-
Cybersecurity of Renewable Energy Data and Applications Using Distributed Ledger Technology
Authors:
Umit Cali,
Murat Kuzlu,
Manisa Pipattanasomporn,
Onur Elma,
Ramesh Reddi
Abstract:
Renewable energy sources (RES) are among the most popular emerging energy resources during the past two decades. Many countries have introduced various energy policy instruments, such as renewable energy certificates (RECs), to support the growth of RES. RECs are tradable non-tangible assets, which have a monetary value. Tracking and certification of the origin of an energy resource regardless of…
▽ More
Renewable energy sources (RES) are among the most popular emerging energy resources during the past two decades. Many countries have introduced various energy policy instruments, such as renewable energy certificates (RECs), to support the growth of RES. RECs are tradable non-tangible assets, which have a monetary value. Tracking and certification of the origin of an energy resource regardless of its type (e.g., a conventional power plant or RES) is a critical operation. In addition to the certification of origin, trading transactions are needed to be performed using a secure method. Energy industry participants need to secure the data and applications related to RECs. Distributed ledger technology (DLT) is a perfect framework that can support such REC functionalities. This paper addresses the cybersecurity aspects in REC trading using Blockchain and a distributed ledger technology, considering detailed cybersecurity perspectives.
△ Less
Submitted 21 October, 2021;
originally announced October 2021.
-
Analysis of False Data Injection Impact on AI based Solar Photovoltaic Power Generation Forecasting
Authors:
S. Sarp,
M. Kuzlu,
U. Cali,
O. Elma,
O. Guler
Abstract:
The use of solar photovoltaics (PV) energy provides additional resources to the electric power grid. The downside of this integration is that the solar power supply is unreliable and highly dependent on the weather condition. The predictability and stability of forecasting are critical for the full utilization of solar power. This study reviews and evaluates various machine learning-based models f…
▽ More
The use of solar photovoltaics (PV) energy provides additional resources to the electric power grid. The downside of this integration is that the solar power supply is unreliable and highly dependent on the weather condition. The predictability and stability of forecasting are critical for the full utilization of solar power. This study reviews and evaluates various machine learning-based models for solar PV power generation forecasting using a public dataset. Furthermore, The root mean squared error (RMSE), mean squared error (MSE), and mean average error (MAE) metrics are used to evaluate the results. Linear Regression, Gaussian Process Regression, K-Nearest Neighbor, Decision Trees, Gradient Boosting Regression Trees, Multi-layer Perceptron, and Support Vector Regression algorithms are assessed. Their responses against false data injection attacks are also investigated. The Multi-layer Perceptron Regression method shows robust prediction on both regular and noise injected datasets over other methods.
△ Less
Submitted 11 October, 2021;
originally announced October 2021.
-
Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction
Authors:
Ferhat Ozgur Catak,
Evren Catak,
Murat Kuzlu,
Umit Cali,
Devrim Unal
Abstract:
6G -- sixth generation -- is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning algorithms have been applied widely in various fields, such as healthcare, transportation, energy, autonomous car, and many more. Those algorithms have been also using in communication technologies to improve the system performance in terms o…
▽ More
6G -- sixth generation -- is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning algorithms have been applied widely in various fields, such as healthcare, transportation, energy, autonomous car, and many more. Those algorithms have been also using in communication technologies to improve the system performance in terms of frequency spectrum usage, latency, and security. With the rapid developments of machine learning techniques, especially deep learning, it is critical to take the security concern into account when applying the algorithms. While machine learning algorithms offer significant advantages for 6G networks, security concerns on Artificial Intelligent (AI) models is typically ignored by the scientific community so far. However, security is also a vital part of the AI algorithms, this is because the AI model itself can be poisoned by attackers. This paper proposes a mitigation method for adversarial attacks against proposed 6G machine learning models for the millimeter-wave (mmWave) beam prediction using adversarial learning. The main idea behind adversarial attacks against machine learning models is to produce faulty results by manipulating trained deep learning models for 6G applications for mmWave beam prediction. We also present the adversarial learning mitigation method's performance for 6G security in mmWave beam prediction application with fast gradient sign method attack. The mean square errors (MSE) of the defended model under attack are very close to the undefended model without attack.
△ Less
Submitted 23 July, 2021; v1 submitted 9 May, 2021;
originally announced May 2021.
-
Internet of Predictable Things (IoPT) Framework to Increase Cyber-Physical System Resiliency
Authors:
Umit Cali,
Murat Kuzlu,
Vinayak Sharma,
Manisa Pipattanasomporn,
Ferhat Ozgur Catak
Abstract:
During the last two decades, distributed energy systems, especially renewable energy sources (RES), have become more economically viable with increasing market share and penetration levels on power systems. In addition to decarbonization and decentralization of energy systems, digitalization has also become very important. The use of artificial intelligence (AI), advanced optimization algorithms,…
▽ More
During the last two decades, distributed energy systems, especially renewable energy sources (RES), have become more economically viable with increasing market share and penetration levels on power systems. In addition to decarbonization and decentralization of energy systems, digitalization has also become very important. The use of artificial intelligence (AI), advanced optimization algorithms, Industrial Internet of Things (IIoT), and other digitalization frameworks makes modern power system assets more intelligent, while vulnerable to cybersecurity risks. This paper proposes the concept of the Internet of Predictable Things (IoPT) that incorporates advanced data analytics and machine learning methods to increase the resiliency of cyber-physical systems against cybersecurity risks. The proposed concept is demonstrated using a cyber-physical system testbed under a variety of cyber attack scenarios as a proof of concept (PoC).
△ Less
Submitted 19 January, 2021;
originally announced January 2021.
-
Performance Evaluation of Communication Technologies and Network Structure for Smart Grid Applications
Authors:
Desong Bian,
Murat Kuzlu,
Manisa Pipattanasomporn,
Saifur Rahman,
Di Shi
Abstract:
Design of an effective and reliable communication network supporting smart grid applications requires a selection of appropriate communication technologies and protocols. The objective of this paper is to study and quantify the capabilities of an Advanced Metering Infrastructure (AMI) to support the simultaneous operation of major smart grid functions. These include smart metering, price-induced c…
▽ More
Design of an effective and reliable communication network supporting smart grid applications requires a selection of appropriate communication technologies and protocols. The objective of this paper is to study and quantify the capabilities of an Advanced Metering Infrastructure (AMI) to support the simultaneous operation of major smart grid functions. These include smart metering, price-induced controls, distribution automation, demand response and electric vehicle charging/discharging applications in terms of throughput and latency. OPNET is used to simulate the performance of selected communication technologies and protocols. Research findings indicate that smart grid applications can operate simultaneously by piggybacking on an existing AMI infrastructure and still achieve their latency requirements.
△ Less
Submitted 31 January, 2019;
originally announced January 2019.