DeepWiFi Cognitive WiFi With Deep Learning
DeepWiFi Cognitive WiFi With Deep Learning
DeepWiFi Cognitive WiFi With Deep Learning
Abstract—We present the DeepWiFi protocol, which hardens the baseline WiFi (IEEE 802.11ac) with deep learning and sustains high
throughput by mitigating out-of-network interference. DeepWiFi is interoperable with baseline WiFi and builds upon the existing WiFi’s
PHY transceiver chain without changing the MAC frame format. Users run DeepWiFi for: i) RF front end processing; ii) spectrum
sensing and signal classification; iii) signal authentication; iv) channel selection and access; v) power control; vi) modulation and coding
scheme (MCS) adaptation; and vii) routing. DeepWiFi mitigates the effects of probabilistic, sensing-based, and adaptive jammers. RF
front end processing applies a deep learning-based autoencoder to extract spectrum-representative features. Then a deep neural
network is trained to classify waveforms reliably as idle, WiFi, or jammer. Utilizing channel labels, users effectively access idle or
jammed channels, while avoiding interference with legitimate WiFi transmissions (authenticated by machine learning-based RF
fingerprinting) resulting in higher throughput. Users optimize their transmit power for low probability of intercept/detection and their
MCS to maximize link rates used by backpressure algorithm for routing. Supported by embedded platform implementation, DeepWiFi
provides major throughput gains compared to baseline WiFi and another jamming-resistant protocol, especially when channels are
likely to be jammed and the signal-to-interference-plus-noise-ratio is low.
Index Terms—WiFi, machine learning, deep learning, dynamic spectrum access, RF signal processing, signal classification,
signal authentication
1 INTRODUCTION
radios provide wireless communication sys- jammers. DeepWiFi leverages the advances in machine
C OGNITIVE
tems with the capability to perceive, learn and adapt to
spectrum dynamics. The existing communication systems
learning algorithms supported by emerging computational
capabilities. The scope of DeepWiFi is to show how these
such as WiFi can greatly benefit from design concepts of algorithms can be used to enhance the performance and
cognitive radio that cover various detection, classification, security in multi-hop mobile ad hoc networks (MANETs).
and prediction tasks. These cognitive radio tasks can be Potential application areas of DeepWiFi include internet-of-
potentially performed by machine learning that adapt with things (IoT), sensors, and first responder communications.
spectrum data without being explicitly programmed [1], [2], One key aspect of DeepWiFi is to support interoperability
[3], [4]. In particular, deep neural networks have strong poten- with baseline WiFi while refraining from any detrimental
tial to process and analyze rich spectrum data. Examples effect on baseline WiFi operations. For that purpose, Deep-
of deep learning applications for cognitive radio tasks WiFi uses the PHY transceiver chain of baseline WiFi and
include modulation classification with convolutional neural does not change its medium access control (MAC) frame for-
networks (CNNs) [5], spectrum sensing with CNNs [6] mat. The DeepWiFi protocol stack involves the physical
and generative adversarial networks (GANs) [7], and anti- (PHY), link/MAC, and network layer algorithms that oper-
jamming and power control with feedforward neural net- ate in a distributed manner. DeepWiFi supports multi-hop
works (FNNs) [8], [9]. routing compared to the standard use of IEEE 802.11ac that
In this paper, we present the DeepWiFi protocol that aims relies on access points to connect individual nodes. As
to harden the baseline IEEE 802.11ac WiFi with the appli- an extension, WiFi Direct can be utilized to support multi-
cation of machine learning (in particular, deep learning) hop communications [10] and the IEEE 802.11s amendment
to improve the throughput performance and enhance is specifically designed for mesh networking that incorpo-
its security in the presence of jammers causing out-of- rates multi-hop communications. While this paper presents
network interference. We consider three types of jammers that our findings using a WiFi setting, algorithms of DeepWiFi
are modeled as probabilistic, sensing-based, or adaptive can be extended to other frequency bands and waveforms
as well.
K. Davaslioglu, S. Soltani, and Y. E. Sagduyu are with Intelligent 1.1 Summary of Contributions
Automation Inc., Rockville, MD 20855 USA.
E-mail: {kdavaslioglu, ssoltani, ysagduyu}@i-a-i.com.
DeepWiFi consists of seven steps: 1) RF front end process-
T. Erpek is with Intelligent Automation Inc., Rockville, MD 20855 USA ing; 2) spectrum sensing and signal classification; 3) signal
and also with the Department of Electrical and Computer Engineering, Vir- authentication; 4) channel selection and access; 5) power
ginia Polytechnic Institute and State University, Arlington, VA 22203 USA. control for Low Probability of Intercept and low probability
E-mail: [email protected].
of detection (LPI/LPD); 6) modulation and coding scheme
Manuscript received 5 July 2018; revised 1 Oct. 2019; accepted 20 Oct. 2019. (MCS) adaptation; and 7) routing. The main contributions
Date of publication 28 Oct. 2019; date of current version 7 Jan. 2021.
(Corresponding author: Kemal Davaslioglu.) of this paper are the algorithms in steps 1-4, namely RF front
Digital Object Identifier no. 10.1109/TMC.2019.2949815 end processing; spectrum sensing and signal classification;
1536-1233 ß 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See ht_tps://www.ieee.org/publications/rights/index.html for more information.
430 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 20, NO. 2, FEBRUARY 2021
signal authentication; and channel selection and access. quickly to zero, whereas DeepWiFi can reliably identify
Steps 5-7 on power control, adaptive modulation and cod- channels for transmission and sustain its throughput. For 9
ing, and routing are used in other similar protocols and users operating over 40 channels, we show that there is no
included to provide the remaining functionalities (preserv- throughput loss for DeepWiFi when jamming likelihood is
ing the layered architecture of the protocol stack), imple- less than 60 percent and there is only 14 percent throughput
ment and assess the full protocol stack, and compare its loss when jamming likelihood is 80 percent. Finally, we
performance with other protocols. While executing these show that DeepWiFi outperforms a jamming-resistant MAC
steps, DeepWiFi controls the selection of transmit power, protocol called Jamming Defense (JADE) [12] and is robust
MCS ID, authenticated signal, channel ID, neighbor ID and against adaptive jammers.
flow ID, and provides the selections to the IEEE 802.11ac
transceiver chain.
There are three tasks that are enhanced by the use of 1.2 Related Work
machine learning in the DeepWiFi protocol. Jamming and anti-jamming mechanisms with machine
learning are studied in [8], [9] in which an adversarial user
1) RF front end processing: Each user applies autoencoding builds a deep learning based classifier to predict if there
to the in-phase and quadrature (I/Q) components of will be a successful transmission (replied with ACK mes-
the data collected on sensed channels and extracts sages) or not (no ACK) using an exploratory (inference)
spectrum features. The I/Q data can be collected by attack to jam data transmissions. A transmitter in return can
using additional receivers or extracted by using firm- launch a causative attack to poison jammer’s classifier (by
ware dispatches on existing WiFi chips such as dis- adding controlled perturbations to transmit decisions) as a
cussed in [11]. We show that autoencoding achieves defense mechanism. Similar to [8], [9], DeepWiFi considers
low reconstruction loss (0.2 percent) in dimensionality users with jamming capabilities. The difference is that
reduction compared to other methods such as Prin- DeepWiFi identifies jammed channels and enables trans-
cipal Component Analysis (PCA) and t-distributed missions (by adapting the MCS) even under jamming
Stochastic Neighbor Embedding (t-SNE). The outputs instead of backing off (which would be the case in the base-
of the RF front end processing are input to the signal line WiFi). There is also a rich literature on modulation rec-
classification module. ognition studies that distinguish signals with different
2) Spectrum sensing and signal classification: Each user modulation schemes. These related studies include earlier
applies deep learning (FNN or CNN) to the features work in [13], [14] that use cyclic spectrum characteristics
obtained by RF front end processing in order to clas- extracted from raw signal and more recent efforts in [5], [15]
sify each channel as idle (I), jammed (J) or used by that use the raw I/Q samples as inputs using CNN. Since a
another WiFi device (W). We show that both FNN frame may consist of multiple modulations (in the preamble
and CNN achieve over 98 percent accuracy, whereas and data portions) and modulations may change across
the accuracy of Support Vector Machine (SVM) is short MAC frames (5.484 msec in IEEE 802.11ac [16]), the
limited to 66 percent. problem in DeepWiFi is different from [5], [15] and focused
3) Signal authentication: Each user applies machine on classifying waveforms (chunked into frames) within the
learning-based RF fingerprinting to authenticate sig- frame time rather than simple modulations that remain
nals. Radio hardware effects on RF signals are used as fixed over longer periods of time. Note that overall process-
features to detect outliers. We show that the detec- ing overhead for the front end processing, signal classifica-
tion accuracy by Minimum Covariance Determinant tion, and signal authentication of DeepWiFi is measured as
(MCD) is close to 90 percent, whereas SVM and Isola- 0.1546 msec (2.8 percent of 802.11ac frame) to process each
tion Forest can only achieve around 69 and 70 percent sample. Furthermore, we note that the conventional energy
accuracy, respectively. This signal authentication capa- detectors for spectrum sensing cannot be applied in our
bility of DeepWiFi protects WiFi against replay attacks. framework because they cannot distinguish busy and jam-
4) Channel access: As opposed to baseline WiFi (where a ming signals such that an adversary can easily create a jam-
user backs off regardless of the type of interference), ming signal with the same energy characteristics to fool an
each user in DeepWiFi runs the signal classification, energy detector.
backs off when the interference is from another user There are several characteristics that can be used for RF
participating in DeepWiFi protocol, or does not back fingerprinting. One can focus on transient [17] or the
off when the interference is from a jammer. This steady-state [18], [19] behavior of the transmitted signal. For
way, DeepWiFi users continue communications (in a example, [17] studied the unique transient characteristics of
degraded mode) and still achieve a non-zero through- a transmitter, which are often attributed to RF amplifier, fre-
put (instead of backing off) through adaptation of quency synthesizer modules, and modulator subsystems.
power, modulation, and coding scheme. The duration of the transient behavior changes depending
In this paper, a distributed network of users running on the type and model of the transmitter. Also, as a device
DeepWiFi is simulated in the presence of probabilistic and ages, its transient behavior can change [17]. In DeepWiFi,
sensing-based jammers. MATLAB WLAN Toolbox is used we opt not to use transient behavior as a feature since it is
to generate realistic WiFi signals and channels. Simulation highly susceptible to noise and interference effects and
results show that as the jamming effect (either intentional requires precise timing of when the signal transmission has
adversarial jamming or in the form of out-of-network inter- started. Instead, DeepWiFi uses steady-state characteristics
ference) increases, the throughput of baseline WiFi drops between a transmitter and a receiver pair such as frequency
DAVASLIOGLU ET AL.: DEEPWIFI: COGNITIVE WIFI WITH DEEP LEARNING 431
and timing synchronization offset, both of which are often The rest of the paper is organized as follows. Section 2
attributed to the radio’s oscillator, power amplifier, and describes the system model. The DeepWiFi protocol over-
digital-to-analog converter. There are two relevant studies view is given in Section 3. RF front end processing of Deep-
that use steady-state characteristics similar to this paper. WiFi is described in Section 4.1. This is followed by the
First, in [18], three instantaneous signal characteristics such description of spectrum sensing and signal classification
as the amplitude, phase, and frequency of the signal are of DeepWiFi in Section 4.2. RF fingerprinting is applied in
used. After a preprocessing step (removal of the mean and Section 4.3 to authenticate signals in DeepWiFi. Section 4.4
normalization), their features (such as the variance, skew- describes channel selection and channel access of DeepWiFi.
ness, and kurtosis) are extracted within predefined window It is followed by the descriptions of power control for LPI/
sizes [18]. Second, the frequency offset, magnitude and LPD and MCS adaptation of DeepWiFi in Sections 4.5 and
phase offset, distance vector, and I/Q origin offset are 4.6, respectively. Section 4.7 presents the routing extension
used in [19] as features for RF fingerprinting, and weighted of DeepWiFi. Simulation setting is described in Section 5.
voting classifiers and maximum likelihood classifier are Performance results of DeepWiFi and baseline WiFi are pre-
developed for fingerprinting. In DeepWiFi, we use machine sented in Section 6. The implementation, overhead, and
learning for signal authentication purposes. complexity aspects of DeepWiFi are discussed in Section 7.
Ad hoc networking over WiFi has two standards, Section 8 concludes the paper.
namely, the ad hoc mode in 802.11 and its successor
WiFi Direct. The ad hoc mode (IBSS) is one of the two
modes of operation in the 802.11 standard, the other 2 SYSTEM MODEL
mode being the commonly used mode of infrastructure- 2.1 Network Setting
based mode (IM-BSS). The IBSS mode enables direct A wireless multi-hop network of n users is considered. Each
communication between any devices without the need user may act as the source, the destination, or the relay for
for an access point (AP). This standard has been evolved packet traffic. Each source i generates unicast packets for traf-
to what is known as WiFi Direct that is considered to be fic flow sij , addressed to destination j with rate rij . While
the main standard of ad hoc networking over WiFi, par- DeepWiFi algorithms do not require synchronization, we con-
ticularly, using Android smartphones [20]. Google has sider slotted time in discrete time simulation and follow the
developed a peer-to-peer (P2P) framework, WiFi P2P, 802.11ac MAC’s synchronization that uses the synchronizing
that complies with WiFi Direct standard. Devices after timers in the preamble of a frame (Non-HT Training Field
Android 4.0 (API level 14) can discover other devices [16]). Each user i holds a separate queue (with length Qsi ðtÞ at
and connect directly to each other via WiFi without an time slot t) for every packet flow s. Packets in each queue are
intermediate AP, when both devices support WiFi P2P served in a first-come-first-served (FCFS) fashion. Packets are
[21]. The APIs include calls for peer discovery, request, allocated to 802.11ac MAC frames before transmission. If the
and connection, all of which are defined in the WifiP2P- queue length is smaller than the frame, zero padding is used
Manager class (see [21] for more details). A related work for the missing data part. If the queue length is greater than
that uses WiFi direct in ad hoc mode and implements the frame, packets in the queue are partitioned into multiple
multi-hop routing is [10], which improves multi-group frames before transmission. There are m channels available.
link connectivity with low overhead. Note that WiFi At any given time slot, a user may select one of these channels
Direct, as defined in the standard, does not support to transmit packets. Users share these channels for data trans-
multi-hop communications, but recent work such as [10] missions and control information exchanges. There is no cen-
has shown that multi-hop routing can be implemented tralized controller. Users make their own decisions in a
using WiFi Direct. With the four novel contributions of Deep- distributed setting. There are nJ jammers that aim to interfere
WiFi focused on PHY and MAC layers (as highlighted in with transmissions. Without loss of generality, each jammer is
Section 2), DeepWiFi is designed to support both single-hop assigned to one of the channels (i.e., nJ ¼ m). There are three
and multi-hop communications. The routing approach in types of jammers:
DeepWiFi differs from [10] such that routing based on the
backpressure algorithm uses both queue and channel Probabilistic (random) jammer: The jammer is turned
information. on with fixed jamming probability pJ at any given
The RF preprocessing step in DeepWiFi utilizes autoen- time slot.
coders [22], [23]. In the literature, there are several studies that Static sensing-based jammer: The jammer is turned on
use autoencoders to extract features in a high dimensional if it detects a signal on the channel using a constant
space and provide a feature representation of the data, and sensing threshold t, else it is turned on with the
then train a separate classifier using these features (e.g., [24]). probability of jamming pJ at any given time slot.
In this paper, we also use the same semi-supervised approach. Adaptive jammer: This jammer is a sensing-based jam-
Other prepossessing methods such as Short Time Fourier mer where channel sensing threshold is adaptively
Transformation, Choi-Williams Transformation, and Gabor adjusted. If the jammer senses a signal on the chan-
Wavelet Transformation have been used in [25] to preprocess nel, it is turned on.
I/Q data before running them through a CNN. In this paper, Both the static and adaptive jammers use channel sensing
our preprocessing step is data-driven and consists of a denois- measurements to make jamming decisions. The sensing
ing autoencoder that is shown to suppress noise in the input threshold is constant for the static sensing-based jammer,
to the deep learning classifier and results in a small recon- while the adaptive jammer changes the threshold by observ-
struction loss. ing the actions of the transmitter in a given time window.
432 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 20, NO. 2, FEBRUARY 2021
TABLE 1
Delay Models
Model
Parameter A B C D E F
Breakpoint distance (m) 5 5 5 10 20 30
RMS delay spread (ns) 0 15 30 50 100 150
Maximum delay (ns) 0 80 200 390 730 1050
Rician K-factor (dB) 0 0 0 3 6 6
Number of taps 1 9 14 18 18 18
Number of clusters 1 2 2 3 4 6
the captured signal as noise (idle), WiFi signal, or jammer through the channel. Then, we add white Gaussian
signal. Features are the I/Q data received over time (output noise. The output is stored in the training data as the
of Step 1). There are three potential labels assigned to jammer signal samples with label (J).
each channel: idle (I), another WiFi device (W), and jammed 12000 samples are generated using different channel mod-
(J). Training data is collected offline and training is per- els. 80 percent of data is used for training and 20 percent is
formed offline. The trained classifier is loaded to each allocated to testing. Training data set includes signals gener-
user offline. Only neural network weights and biases are ated under six different channel conditions (2000 samples
stored in the memory. Each radio individually runs its per channel model).
classifier online.
4.2.2 Simple Machine Learning Classifiers
4.2.1 Signal Classes (I), (W), and (J)
For benchmark comparison, we evaluate the performance of
For training and testing phases, signals of each label are SVM classifier in signal classification. As its performance
generated as follows: depends on the kernel type and hyperparameters used, the
1) Noise: The background noise for WiFi is between hyperparameters are tuned for the best accuracy. Two of
80 dB and 100 dB. To emulate such a case, we the most common kernels, linear kernel and radial basis
choose a number uniformly at random between function (RBF) kernel, are used. For the RBF kernel, there
80 dB and 100 dB in the frequency domain and are two parameters that are considered, C and g. The
then take the inverse Fourier transform to obtain parameter C is common in all SVM kernel types and it
the time samples. The output is stored in the trades off misclassification of training examples against sim-
training data as the background noise samples with plicity of decision surface. When C is a small number, the
label (I). decision surface is smoother, and a high C puts more
2) WiFi Legitimate Signal: We use the MATLAB WLAN emphasis on classifying all training examples correctly. So
System Toolbox to generate the WiFi signal includ- C trades error penalty for stability. The second parameter g
ing the preamble and payload. We consider the fol- is the free parameter of Gaussian RBF, Kðxi ; xj Þ ¼ expðg
lowing parameters: jjxi xj jj2 ÞÞ where g > 0. It defines the influence of each
a) Center frequency: 5.25 GHz, training example. A larger g has smaller variance affecting
b) Channel Bandwidth: 20 MHz, only the closer neighbors. For hyperparameter tuning,
c) TX-RX distance: 5 m (default value; we vary the C ¼ ½0:0001; 0:001; 0:01; 0:1; 1:0; 10:0; 100:0; 1000:0 is used
SINR in simulations), for linear kernel, and g with the same C values for the
d) Normalize Path Gains: True, Gaussian RBF kernel. In the evaluation step, we implement
e) Transmit antenna spacing: 0.5 wavelength (default), k-fold cross-validation to calculate cross-validation accu-
f) Receive antenna spacing: 0.5 wavelength (default), racy and set k as 10. Using a grid search, we obtain the score
g) Packet format: VHT, of best performing model. The best performance is achieved
h) Scrambler initialization: 93 (default), using RBF kernel with C ¼ 1:0 and g ¼ 0:1, which achieves
i) Channel coding: BCC (binary convolutional only 66 percent accuracy.
coding),
j) APEP Length: 1, 4.2.3 Deep Learning Classifiers
k) PSDU Length: 36 (default; PSDU length is the We design two deep neural networks architectures, FNN
number of bytes carried in the user payload. For and CNN, for the signal classification task that achieves
a single user, the PSDU length is scalar integer small memory footprint, high accuracy, and low inference
from 1 to 220 1), time. These deep neural networks are implemented in Ten-
l) Long guard interval length: 800 ns, sorFlow using the Keras library [31]. Backpropagation is
m) Short guard interval length: 400 ns, applied to train the neural network using a cross entropy
n) A-MPDU Length: 256 bytes, P
loss function that is defined as L ¼ m i¼1 bi log ðyi Þ, where
o) Number of transmit antennas: 1, b ¼ fbi gm
i¼1 is a binary indicator of ground truth such that
p) Number of spatial streams transmitted: 1, and for a sample from label k, bk ¼ 1 whereas the other entries
q) MCS: Varying between 0-9. are all zeros. The neural network prediction is denoted by
y ¼ fyi gm
i¼1 . In both architectures, we used the ADAM opti-
We generate channel coefficients using the specific chan- mizer [32] with the learning rate of 105 .
nel model (as discussed in Section 2.2) and pass the WiFi
signal through the channel. Then, we add white Gaussian
noise. The output is stored in the training data as the WiFi 4.2.4 FNN
signal samples with label (W). We tune the hyperparameters of the FNN (such as the num-
3) Jammer Signal: In the time domain, we first generate ber of layers, number of neurons per layer and activation
normally distributed random numbers with zero functions). We use rectified linear unit (ReLU) as the activa-
mean and variance of one. Then we up-sample these tion function on neural network layer outputs that performs
samples to a selected carrier with a bandwidth that the fðxÞ ¼ maxð0; xÞ operation. The advantages of using
is the same as the WiFi signal. We generate channel ReLU activation function is that it is a bit faster to compute
coefficients using the same channel models dis- than other activation functions in hardware and its does not
cussed in Section 2.2 and pass the jammer signal suffer from vanishing gradient problem since it does not
436 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 20, NO. 2, FEBRUARY 2021
TABLE 2 TABLE 3
Confusion Matrix for the FNN Confusion Matrix for the CNN
TABLE 4 TABLE 6
Confusion Matrix for MCD Confusion Matrix for the Isolation Forest
Outlier Detection Method
Predicted Label
(A) (O) Predicted Label
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
differentiate. These offsets are kept constant throughout dif- xÞ ¼ ðxx m x ÞT S1
MDðx x ðx x mx Þ, where m x and
ferent SNR and channel realizations. To introduce ampli-
tude and phase imbalance, 1 dB and 10 degrees increments S1
x are the mean and covariance of data x .
are added between users such that jth user has j dB and Suppose there are ten signatures, six of which are autho-
10 j degrees imbalance. rized and four are unauthorized (unseen) signatures. Table 4
presents the confusion matrix of MCD outlier detection that
achieves the average accuracy of 89.8 percent. We also present
4.3.4 Outlier Detection
the confusion matrix of one-class SVM with n ¼ 0:2 and isola-
To authorize the signals, we first use a simple outlier detec- tion forest methods in Tables 5 and 6, respectively. The two
tion method in which the objective is to identify which sig- classifiers achieve only 70.0 and 69.1 percent accuracy, respec-
natures are authorized and which are not. We test and tively, in the same order as before. In Step 2, we use supervised
evaluate the performance of three different methods: (i) one- classification and employ RBF-kernel based SVM with C ¼ 1
class SVM [36], (ii) isolation forest [37], and (iii) Minimum and g ¼ 0:1 parameters, which achieves 100 percent accuracy.
Covariance Determinant (MCD) [38], [39] methods. Our
results show that MCD, also known as the elliptic envelope
method, outperforms the other two methods. In what fol- 4.4 Step 4: Channel Selection and Channel Access
lows, we briefly describe all three methods and then present Input: The set of channel labels and SINR from Step 2.
the performance evaluation results. Output: The ID of the channel selected for transmission.
Each user individually starts scanning the set of m chan-
One-class SVM is an unsupervised outlier detection nels (with a random initialization) and classifies each chan-
method. It learns a frontier delimiting the contour of nel as (I), (W) or (J) with the deep learning-based classifier
initial observations. If a new observation lays within (as described in Step 3).
the frontier-delimited subspace, it is as coming from
the same population (an authorized signature). Oth- 1) If channel i is classified as (I), the user transmits and
erwise, if they lay outside the frontier, it is an outlier breaks the scanning loop.
(an unauthorized signature). The parameter n is the 2) Else if channel i is classified as (W), the user backs-
margin of the One-Class SVM that determines the off (with exponential timer) and counts down from
probability of finding a new, but regular, observation 2k 1 (where k is the timer window).
outside the frontier. 3) Else if channel i is classified as (J), it is added to a
Isolation forest isolates observations by randomly possible list for data transmission and the user scans
selecting a feature and then randomly selecting a the next channel.
split value between the maximum and minimum Note that the third step does not exist in the baseline
values of the selected feature. This recursive parti- WiFi that treats channels (W) and (J) the same way and
tioning can be represented by a tree structure and backs off on all of these channels. At the end of scanning
the number of splittings required to isolate a sample channels, each user performs the following:
is equivalent to the path length from the root user to
1) If there is no (I) channel (channels are either (W) and
the terminating user. This path length, averaged
(J)), the user selects the channel (J) with the best
over a forest of such random trees, is a measure of
SINR and transmits
normality and our decision function.
2) If there is no channel (I) and (J), i.e., all channels are
MCD fits an elliptic envelope such that any data
(W), while back-off counter is not zero, the user waits
point outside the ellipse is an outlier. It is a highly
for one time slot and reduces all counters by 1.
robust estimator of multivariate distributions [38].
3) If any back-off counter is zero, the user senses that
It uses the Mahalanobis distance such that
channel.
If the channel is (I), the user transmits on that
TABLE 5 channel.
Confusion Matrix for the One-Class SVM Method Else, the user resets the back-off counter and uni-
formly selects a random number between 0 and
Predicted Label
2kþ1 1.
(A) (O)
(A) 22.8% 16.7%
4.5 Step 5: Power Control for LPI/LPD
True Label (O) 13.3% 47.2%
Input: The ID and SINR of the selected channel from Step 4.
DAVASLIOGLU ET AL.: DEEPWIFI: COGNITIVE WIFI WITH DEEP LEARNING 439
TABLE 7
MCSs and Corresponding Rates for IEEE 802.11ac With One
Spatial Stream (GI Stands for Guard Interval)
channel. We consider the MCSs defined for the Very High where ½þ ¼ maxð; 0Þ. Then, we define the spectrum utility
Throughput (VHT) scheme of 802.11ac, as shown in Table 7.
We label the generated samples at the receiver with the þ
s s
MCS scheme that gives the best error rate and throughput Uij ðtÞ ¼ cij ðtÞ Qi ij ðtÞ Qj ij ðtÞ (8)
trade-off. By design, we want lower MCS level (index) for
lower SINR and higher MCS level for higher SINR. This for user i transmitting to user j, where cij ðtÞ is the rate on link
approach provides an effective link adaptation. We deter- ði; jÞ at time t (depending on transmit power from Step 5 and
mine a table that assigns the best MCS for a given SINR. MCS from Step 6). User i transmits to the selected neighbor
This table is pre-loaded to each user that adapts its MCS j ðtÞ that yields the maximum spectrum utility, i.e.,
according to the measured SINR. To build up this table, we
initially generate the transmitted signal using a high MCS j ðtÞ ¼ argmaxj2Ni Uij ðtÞ; (9)
level. We transmit the signal over the channel and add
noise. We estimate the channel at the receiver using the pre- where Ni is the set of the next hop candidates for user i to select
amble and equalize the signal. The equalized samples are from. Each user uses the data channel (in-band) to exchange
then used to demodulate the signal. Thus, we obtain the control information with its neighbors. There is no separate
packet error rate by comparing the transmitted and received control channel. Users asynchronously make decisions in a
bits. If the packet error rate is not zero, we reduce the MCS distributed setting by using the following four phases [41]:
level and repeat the same procedure. If there are still errone-
1) neighborhood discovery and channel estimation,
ous bits at the receiver for MCS 0, then we keep the MCS as
2) exchange of flow information updates and execution
0. Fig. 8 shows the best MCS levels (when 256, 512, and 1024
of the backpressure algorithm,
bytes of data payload are used, respectively) to maximize
3) transmission decision negotiation, and
the rate depending on the SINR.
4) data transmission.
4.7 Step 7: Routing
5 SIMULATION SETTING FOR NETWORK-LEVEL
Input: The set of link rates (given from Step 6) from a given
user to its neighbors (note that the set of queue lengths of PERFORMANCE EVALUATION
the user and its neighbors are obtained through information There are n ¼ 9 users, m ¼ 40 channels, and 5 flows gener-
exchange in Step 7). ated at each simulation time. There are nJ ¼ 40 jammers,
440 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 20, NO. 2, FEBRUARY 2021
Fig. 9. Network topology for simulations. Fig. 10. Throughput of individual users (when pJ ¼ 0:7) for fixed SINR
(0 dB).
each assigned to one channel. Each random jammer is inde-
Consider the following metrics to measure the
pendently turned on with the probability of jamming pJ on
performance:
every simulation time, where pJ is varied between 0 to 1
with 0.05 increments. The received SINR (due to jammer (1) Average throughput (Mb/s) per user: The average
and noise) is also varied with 1 dB increments. Each user i throughput rate that each user can achieve during
generates traffic to a randomly selected destination j. The the simulation.
traffic rate is randomly selected from [0,1] Mb/s with aver- (2) Cumulative throughput: The average throughput of
age rate rij ¼ 500 kbps for a source-destination pair ði; jÞ. the network for all users during the simulation.
The simulator is implemented in MATLAB. Simulation
time is 100 seconds. The baseline WiFi features are imple- 6 PERFORMANCE RESULTS
mented using the MATLAB WLAN System Toolbox. The
deep learning code is implemented in TensorFlow. 6.1 Probabilistic (Random) Jammer
We compare the performance of DeepWiFi with the First, we fix the SINR to 0 dB and start with random jammers.
baseline WiFi (without deep learning or jamming resis- The throughput of individual users (when pJ ¼ 0:7) for fixed
tance) and jamming-resistant MAC protocol JADE [12]. SINR (0 dB) is shown in Fig. 10. The end-to-end network
JADE is asymptotically optimal in the presence of adap- throughput is shown in Fig. 11 as a function of pJ . For small
tive adversarial jamming. As the baseline WiFi is not pJ , both DeepWiFi and baseline WiFi achieve the same
designed to mitigate any jamming, its comparison with throughput, since all users can find idle channels without
DeepWiFi quantifies the effect of jamming defense. In internal or external interference. JADE is run with its default
DeepWiFi, we use the exponential backoff defined in the parameters according to [12]. Due to its small channel
IEEE 802.11ac standard. The comparison of DeepWiFi access probability initialization, JADE starts off worse than
with JADE quantifies the difference in the channel access the baseline WiFi and DeepWiFi. As pJ increases beyond 0.3,
and different solutions spaces. Channel access in JADE the throughput of baseline WiFi starts dropping sharply,
does not differentiate between a WiFi or a jamming sig- while DeepWiFi sustains its throughput and provides major
nal, whereas DeepWiFi does. Therefore, the solution throughput gains relative to baseline WiFi. For pJ 0:5,
spaces are different. We show that DeepWiFi achieves JADE resists to jamming better than the baseline WiFi by
major performance improvement over the baseline WiFi adjusting the channel access probability and outperforms it
and JADE. In all three algorithms, we use adaptive mod- while performing worse than DeepWiFi. Even when all
ulation and coding and backpressure routing algorithm
for a fair comparison.
The network topology is shown in Fig. 9 where we
deployed nine users uniformly at random over a given
area. Since friendly users do not interfere with each other
due to the backoff mechanism and signal classification,
their locations do not affect the system performance. The
friendly users (DeepWiFi or baseline WiFi) are labeled
with IDs 1-9. Each link represents the set of neighbors
(depending on the SINR threshold less than 0 dB). The 40
jammers are depicted as users without links on the right
and top of Fig. 9 (with user ID 10-49). Each jammer is
responsible to jam a single channel (out of 40 channels).
For instance, jammers with ID 10, 11, 12 would respec-
tively jam channels 1, 2, 3 and so on. When the jammer is
on (off), it is depicted as a red (blue) user. Fig. 11. Cumulative throughput as a function of pJ for fixed SINR (0 dB).
DAVASLIOGLU ET AL.: DEEPWIFI: COGNITIVE WIFI WITH DEEP LEARNING 441
channels are jammed all the time (with pJ ¼ 1), DeepWiFi can channel greater than or equal to a threshold t, that is
achieve the network end-to-end throughput close to 70 Mbs, ðnÞ
ri t, else it is turned on with a fixed probability of jam-
while the throughputs of baseline WiFi and JADE are zero ming, pJ .
(note that fluctuations are due to randomness in channels and In our experiments, the power detection threshold of
interference effects). DeepWiFi activates more links than base- sensing-based jammer is varied from 2 dB to 10 dB with 1 dB
line WiFi and JADE, as users back off on the jammed channels increments. Fig. 13 shows the average individual throughput
in both schemes, whereas DeepWiFi allows users to transmit (Mb/s) of DeepWiFi, JADE, and baseline when sensing-based
on the jammed channels (if no idle channel available) in the jammers are on, pJ ¼ 0:7 and t J ¼ 5 dB. We observe that the
degraded mode. We start changing the SINR due to jammer sensing-based jammer reduces the throughput of baseline
and noise effects. The cumulative throughput is shown in WiFi to zero as users end up backing off indefinitely. Next,
Fig. 12 as a function of SINR at pJ ¼ 0:8. The cumulative we present the results for transmit power control to DeepWiFi
throughput slowly increases with SINR for all schemes and to demonstrate the LPI/LPD capability. DeepWiFi with trans-
DeepWiFi outperforms others over all SINRs. Also, note that mit power control for LPI/LPD can avoid jammers by operat-
the cumulative throughput term in this paper accounts for ing below t J . Fig. 14 shows the histogram of transmit power
multiple hops across the network and represents the end-to- per user. We observe that about half of the transmissions are
end network throughput. with low power to provide LPI/LPD capability, whereas the
other half are with high power to support communication
6.2 Static Sensing-Based Jammer over the jammed channels. As a result, DeepWiFi with LPI/
So far, we considered random (probabilistic) jammers that LPD can achieve higher rates higher compared to baseline
are turned on with some fixed probability. Next, we evalu- WiFi, JADE, and DeepWiFi without LPI/LPD. Fig. 15 shows
ate the effect of sensing-based jammers and the perfor- the average individual throughput (Mb/s) of DeepWiFi and
mance of power control for LPI/LPD. Here, we consider a baseline WiFi when sensing-based jammers are on, pJ ¼ 0:7,
static jammer that has a constant sensing threshold t, t J ¼ 2 dB, and the transmit power is adjusted for LPI/LPD.
whereas an adaptive jammer (discussed in Section 6.3 can We observe that as the jammer becomes more reactive, i.e.,
ðnÞ
dynamically adjust its sensing threshold. Let rk denote the the detection threshold of jammer t J decreases from 10 dB to
jammer’s received signal on channel n at time k. The static 2 dB, the throughput of DeepWiFi and JADE decrease while
sensing-based jammer turns on if it detects a signal on the the baseline WiFi’s throughput diminishes completely.
Fig. 16. Cumulative throughput (Mb/s) as a function of pJ when the num- Fig. 17. Cumulative throughput (Mb/s) as a function of pJ in the presence
ber of channels is less than the number of users in the presence of static of adaptive jammers.
sensing-based jammers.
Fig. 17 shows the performance of DeepWiFi, baseline,
We also evaluate DeepWiFi when there are more and JADE under adaptive jamming. We took the initial
users than available channels. We consider 9 users and 9 sensing threshold as t 0 ¼ 1, weighting constant as w ¼ 1,
traffic flows sharing 6 channels. Fig. 16 presents the and step size constant D ¼ 0:5. We observe that the cumu-
cumulative throughput as a function of jamming proba- lative throughput reduces significantly in the presence of
bility pJ for DeepWiFi, baseline WiFi, and JADE. We adaptive jammers in all cases, while DeepWiFi still pro-
observe a linear decrease in cumulative throughput as vides the best performance compared to the baseline WiFi
the jamming probability increases. Note that the cumula- and JADE.
tive throughput of DeepWiFi depends on the jamming Overall, the results evaluated in the presence of three dif-
probability, the number of users, number of channels, ferent types of jammers indicate that DeepWiFi provides
backoff mechanism, jamming power, and signal classifi- reliable and robust communication.
cation accuracy. Comparing Figs. 11 and 16, we observe
that the slope of cumulative throughput versus jamming
7 IMPLEMENTATION, COMPLEXITY,
probability shows logarithmic-like behavior when there
are fewer users than channels, whereas the slope is AND OVERHEAD ASPECTS
almost linear when there are more users than channels DeepWiFi can be implemented in the kernel or in the WiFi
(i.e., effect of congestion increases). card. Open-source firmwares such as Nexmon [11] can
extract the I/Q data out of the WiFi such that the I/Q data
6.3 Adaptive Jammer can be processed in the kernel. System-on-chip (SOC) solu-
Next, we consider the adaptive jammer that dynamically tions built for IoT such as Qualcomm QCS603 / QCS605
adjusts the sensing threshold t t at time t by observing the [42] can be also used to extract the I/Q data that can be
channel access patterns of WiFi users. The channel utiliza- processed in the kernel (or can be moved to an additional
tion on channel n (as the jammer perceives it) at time k is FPGA or ARM for further processing). These SOCs include
ðnÞ
1ðrk t k Þ, where 1ðxÞ denotes the indicator function, that 802.11ac WiFi and a neural processing engine (for deep
is, 1 when x is True and 0 otherwise. At time t, the adap- learning) integrated in the chip that can be used for RF com-
tive jammer’s utility function that includes the channel uti- munication and deep learning. The training is usually per-
lization and its own power consumption is defined as formed offline and the trained models are ported to the
kernel or to the other platforms for inference.
N
1 X t X ðnÞ DeepWiFi can get the training data in two possible ways.
gðrðtÞ; pðtÞÞ ¼ 1ðrk t k Þ þ w pk ;
T0 k¼tT þ1 n¼1 First, channels and signals can be generated by MATLAB
0
WLAN Toolbox (as discussed in Section 2.2), and they can
(10) be used to build the training data. Second, a real 802.11.ac
where pk is the jamming power at time k and w 0 is a WiFi card can be used to make over-the-air transmissions
weighting constant to balance the tradeoff between jammer that are captured by an SDR, and the channels and signals
power consumption and WiFi channel utilization. The vec- can be used for training.
tors rðtÞ and pðtÞ denote the received signal and transmit To evaluate the time complexity and overhead, we
power values of the jammer, respectively, over a time win- implemented each deep learning task in a low-cost embed-
dow of T0 time instances ending at time t and N channels, ded system, NVIDIA Jetson Nano Developer Kit [43]. For
ðnÞ
namely rðtÞ ¼ frk ; 1 n N; t T0 þ 1 k tg and an efficient deployment, we converted the Tensorflow code
pðtÞ ¼ fpk ; t T0 þ 1 k tg. At time t, the jammer trans- to TensorRT [44], inference optimizer for NVIDIA’s embed-
mits when its received signal on channel n is greater than or ded systems. We repeated the tests 1000 times to calculate
ðnÞ
equal to its sensing threshold, namely rt t t . Using a suf- the average inference time. For example, front end process-
ficiently small step size constant D > 0, the adaptive jam- ing of each data sample takes 0.09 msec. A typical frame in
D
mer updates its sensing threshold as t tþ1 ¼ tDtþ if the 802.11ac standard is 5.484 msec. [16]. Hence, the front
þ t
gðrðt 1Þ; pðt 1ÞÞ > gðrðtÞ; pðtÞÞ, else t tþ1 ¼ t t t . end processing time is measured as small as 1.6 percent of
DAVASLIOGLU ET AL.: DEEPWIFI: COGNITIVE WIFI WITH DEEP LEARNING 443
the 802.11 frame. The reported processing time is for the features by machine learning and authenticates legitimate
case when there is already data available to be processed. WiFi signals. Using these signal labels on sensed channels,
As the performance of the off-the-shelf hardware can be DeepWiFi supports users to use idle channels, back-off on
degraded when there are other processes (such as other channels used by legitimate WiFi signals, and access (if
WiFi operations) running in the background, we used needed in the degraded mode) channels that are occupied
the stress ng software[45] to stress test the memory by signals other than legitimated WiFis. DeepWiFi users
use of the embedded GPU by generating background pro- optimize their transmit powers for LPI/LPD and their MCS
cesses emulating high load conditions. We observed that to maximize link rates, and their routing decisions by back-
the processing time for deep learning operations increased pressure algorithm. We simulated DeepWiFi in a distrib-
33 percent but remained small relative to MAC frame uted network using the channels and signals generated by
length. Note that the overhead and processing times on MATLAB WLAN Toolbox. We showed that DeepWiFi
embedded platforms can be further reduced by customized helps WiFi users sustain their throughput with major per-
ASIC chips and FPGAs. formance gain relative to baseline WiFi and another jam-
For the signal classification task, we observed that the ming-resistant MAC protocol especially when channels are
FNN model takes 0.009 msec on average to predict each likely to be jammed and the SINR is low.
sample point. On the other hand, the CNN model takes
0.035 msec to predict a sample over 1000 repetitions. As a
ACKNOWLEDGMENTS
comparison between the FNN and CNN models, both archi-
tectures have similar performance. Since the CNN architec- This effort is supported by the U.S. Army under contract
ture has more layers, it takes approximately four times W91CRB-17-P-0068. The content of the information does not
longer to process a single waveform in inference time. necessarily reflect the position or the policy of the U.S. Gov-
CNNs in return have a smaller footprint on the hardware. ernment, and no official endorsement should be inferred.
Note that the difference in hardware footprint is expected
since the FNNs use fully connected layers to reduce dimen- REFERENCES
sions from one layer to another, whereas the CNNs employ [1] C. Clancy, J. Hecker, E. Stuntebeck, and T. O’Shea, “Applications
convolutional layers that utilize feature maps in a sliding of machine learning to cognitive radio networks,” IEEE Wireless
window manner. For more discussion on the number of Commun., vol. 14, no. 4, pp. 47–52, Aug. 2007.
[2] K. Thilina, K. W. Choi, N. Saquib, and E. Hossain, “Machine learn-
parameters in FNN and CNN models, we refer the reader ing techniques for cooperative spectrum sensing in cognitive
to [33, p. 357]. radio networks,” IEEE J. Selected Areas Commun., vol. 31, no. 11,
For the signal authentication task, the MCD outlier detec- pp. 2209–2221, Nov. 2013.
tion takes 0.0556 msec, one-class SVM takes 52.813 msec, [3] M. Alsheikh, S. Lin, D. Niyato, and H. Tan, “Machine learning in
wireless sensor networks: Algorithms, strategies, and applications,”
and isolation forest takes 33.521 msec. IEEE Commun. Surveys Tutorials, vol. 16, no. 4, pp. 1996–2018,
Adding these components, we observe that the overall Apr. 2014.
processing overhead for the front end processing, signal [4] M. Chen, U. Challita, W. Saad, C. Yin, and M. Debbah, “Machine
learning for wireless networks with artificial intelligence: A
classification using FNN, and signal authentication using tutorial on neural networks,” 2017, arXiv:1710.02913.
MCD is 0.1546 msec, which is only 2.8 percent of the [5] T. O’Shea, J. Corgan, and C. Clancy, “Convolutional radio modu-
802.11ac frame. lation recognition networks,” in Proc. Int. Conf. Eng. Appl. Neural
For the routing overhead, the backpressure algorithm Netw., 2016, pp. 213–226.
[6] W. Lee, M. Kim, D. Cho, and R. Schober, “Deep sensing: Coopera-
exchanges typical messages as in the regular distance-vector tive spectrum sensing based on convolutional neural networks,”
routing algorithms. There is no closed form expression for 2017, arXiv:1705.08164.
the number of message exchanges and the exact number [7] K. Davaslioglu and Y. E. Sagduyu, “Generative adversarial learn-
depends on the network and traffic conditions. The back- ing for spectrum sensing,” in Proc. IEEE Int. Conf. Commun.,
May 2018, pp. 1–6.
pressure algorithm was implemented with SDRs in [46] that [8] Y. Shi, Y. E. Sagduyu, T. Erpek, K. Davaslioglu, Z. Lu, and J. Li,
empirically evaluated the number of message exchanges. “Adversarial deep learning for cognitive radio security: Jamming
attack and defense strategies,” in Proc. IEEE Int. Conf. Commun.
Workshops, 2018, pp. 1–6.
8 CONCLUSION [9] T. Erpek, Y. E. Sagduyu, and Y. Shi, “Deep learning for launching
and mitigating wireless jamming attacks,” IEEE Trans. Cogn.
We presented the DeepWiFi protocol that applies machine Commun. Netw., vol. 5, no. 1, pp. 2–14, Mar. 2019.
learning, and in particular deep learning to adapt WiFi to [10] C. Funai, C. Tapparello, and W. Heinzelman, “Enabling multi-hop
ad hoc networks through WiFi Direct multi-group networking,”
spectrum dynamics and provides major throughput gains in Proc. IEEE Conf. Comput. Netw. Commun., 2017, pp. 491–497.
compared to baseline WiFi and another jamming-resistant [11] M. Schulz, D. Wegemer, and M. Hollick, “Nexmon: Build your
MAC protocol. DeepWiFi is designed to mitigate out-of- own Wi-Fi testbeds with low-level MAC and PHY-Access using
firmware patches on off-the-shelf mobile devices,” in Proc. Proc.
network interference effects from probabilistic and sensing- 11th Workshop Wireless Netw. Testbeds Exp. Eval. Characterization,
based jammers. Built upon the PHY transceiver chain of 2017, pp. 59–66.
IEEE 802.11ac, DeepWiFi provides the decision parameters [12] A. Richa, C. Scheideler, S. Schmid, and J. Zhang, “A jamming-
to WiFi transceiver without changing the PHY and the resistant mac protocol for multi-hop wireless networks,” in Dis-
tributed Computing. Berlin, Germany: Springer, 2010, pp. 179–193.
MAC frame format. DeepWiFi applies deep learning-based [13] W. A. Gardner and C. M. Spooner, “Cyclic spectral analysis for
autoencoder to extract features and applies deep neural net- signal detection and modulation recognition,” in Proc. IEEE
works (FNN or CNN) to classify signals as WiFi, jammed, Military Commun. Conf., 1988, pp. 419–424.
or idle. The signals classified as WiFi are further processed [14] A. Nandi and E. Azzouz, “Modulation recognition using artificial
neural networks,” Signal Process., vol. 56, no. 2, pp. 165–175, 1997.
through RF fingerprinting that identifies hardware-based
444 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 20, NO. 2, FEBRUARY 2021
[15] T. J. O’Shea and N. West, “Radio machine learning dataset [43] “Jetson Nano Developer Kit,” NVIDIA, Mar. 19, 2019, Accessed:
generation with GNU radio,” in Proc. GNU Radio Conf., 2016, pp. 1–6. Mar. 19, 2019. [Online]. Available: https://developer.nvidia.
[16] M. S. Gast, 802.11ac Survival Guide. Newton, MA, USA: O’Reilly, com/embedded/jetson-nano-developer-kit
2013. [44] “NVIDIA TensorRT Programmable Inference Accelerator,” NVI-
[17] O. Ureten and N. Serinken, “Wireless security through RF finger- DIA, Mar. 27, 2018, Accessed: May 1, 2018. [Online]. Available:
printing,” Can. J. Elect. Comput. Eng., vol. 32, pp. 27–33, 2007. https://developer.nvidia.com/tensorrt
[18] B. Ramsey, M. Temple, and B. Mullins, “PHY foundation for [45] “Stress-ng,” Ubuntu Wiki, Dec. 18, 2018, Accessed: Oct. 1, 2019.
multi-factor ZigBee node authentication,” in Proc. IEEE Global [Online]. Available: https://wiki.ubuntu.com/Kernel/Reference/
Commun. Conf., 2012, pp. 795–800. stress-ng
[19] A. Candore, O. Kocabas, and F. Koushanfar, “Robust stable radio- [46] S. Soltani, Y. Sagduyu, Y. Shi, J. Li, J. Feldman, and J. Matyjas,
metric fingerprinting for wireless devices,” in Proc. IEEE Int. “Distributed cognitive radio network architecture, SDR imple-
Workshop Hardware-Oriented Security Trust, 2009, pp. 43–49. mentation and emulation testbed,” in Proc. IEEE Military Commun.
[20] Wi-Fi Alliance, “P2P Technical Group, Wi-Fi Peer-to-Peer (P2P) Conf., Oct. 2015, pp. 438–443.
Technical Specication v1.7,” Accessed: Jul. 2016. [Online]. Avail-
able: https://www.wi-fi.org/discover-wi-fi/specifications Kemal Davaslioglu received the PhD degree in
[21] Android Developers, “Wi-Fi Peer-to-Peer,” Jul. 30, 2013. [Online]. electrical and computer engineering from the
Available: http://developer.android.com/guide/topics/ University of California, Irvine. He is a senior
connectivity/wifip2p.html research scientist at Intelligent Automation Inc.
[22] P. Vincent, H. Larochelle, Y. Bengio, and P.-A. Manzagol, “Extracting (IAI). He held long-term internships at Broadcom
and composing robust features with denoising autoencoders,” in Proc. Inc., Irvine, CA, where he worked on beamform-
Int. Conf. Mach. Learn., 2008, Art. no. 10961103. ing algorithms and 60 GHz channel characteriza-
[23] P. Vincent et al., “Stacked denoising autoencoders: Learning use- tion. His research interests include resource
ful representations in a deep network with a local denoising allocation in wireless networks, machine learning,
criterion,” J. Mach. Learn. Res., vol. 11, pp. 3371–3408, 2010. adversarial learning, and security. He is the co-
[24] D. P. Kingma, D. J. Rezende, S. Mohamed, and M. Welling, “Semi- author of the IEEE HST 2018 Best Paper Award.
supervised learning with deep generative models,” in Proc.
Advances Neural Inf. Process. Syst., Oct. 2014, pp. 3581–3589. Sohraab Soltani received the PhD degree in
[25] O. A. Topal, S. Gecgel, E. M. Eksioglu, and G. K. Kurt, computer science from Michigan State Univer-
“Identification of smart jammers: Learning based approaches sity, East Lansing, Michigan. He is a lead scien-
using wavelet representation,” 2019, arXiv:1901.09424. tist at Intelligent Automation Inc. His research
[26] C. Funai, C. Tapparello, and W. Heinzelman, “Supporting multi- interests include wireless communications, cog-
hop device-to-device networks through WiFi direct multi-group nitive radio, ad hoc and sensor networks, and
networking,” 2015, arXiv:1601.00028. wireless system implementation. He imple-
[27] I. T. Jolliffe, Principal Component Analysis. Berlin, Germany: mented a broad set of wireless (PHY, MAC, and
Springer, 2002. network layer) technologies on various radio plat-
[28] L. J. P. van der Maaten and G. Hinton, “Visualizing high-dimensional forms and executed in-lab and field tests.
data using t-SNE,” J. Mach. Learn. Res., vol. 9, pp. 2579–2605, 2008.
[29] L. Li, K. Jamieson, G. DeSalvo, A. Rostamizadeh, and A. Talwalkar,
“Hyperband: A novel bandit-based approach to hyperparameter Tugba Erpek received the MSc degree in electri-
optimization,” J. Mach. Learn. Res., vol. 18, pp. 1–52, 2018. cal and computer engineering from George
[30] J. Xie, L. Xu, and E. Chen, “Image denoising and inpainting with Mason University, Fairfax, Virginia, and the PhD
deep neural networks,” in Proc. 25th Int. Conf. Neural Inf. Process. degree in electrical engineering from the Virginia
Syst., 2012, pp. 341–349. Polytechnic Institute and State University,
[31] M. Abadi et al., “Tensorflow: A system for large-scale machine Blacksburg, Virginia. She is a senior research
learning,” in Proc. Symp. Operating Syst. Design Implementation, engineer at Intelligent Automation Inc. Her
2016, pp. 265–283. [Online]. Available: tensorflow.org research interests include wireless communica-
[32] D. P. Kingma and J. Ba, “Adam: A method for stochastic tions, machine learning, resource allocation,
optimization,” 2014, arXiv:1412.6980. dynamic spectrum access, and cognitive radio.
[33] A. Geron, Hands-on Machine Learning with Scikit-Learn and
Tensorflow. Newton, MA, USA: O’Reilly Media, Mar. 2017.
[34] Mathworks, “Joint sampling rate and carrier frequency offset Yalin E. Sagduyu received the PhD degree in
tracking,” Sep. 15, 2016, Accessed: Feb. 2, 2018. [Online]. Avail- electrical and computer engineering from the Univer-
able: https://www.mathworks.com/help/wlan/examples/joint- sity of Maryland, College Park. He is the director of
sampling-rate-and-carrier-frequency-offset-tracking.html networks and security at Intelligent Automation Inc.
[35] Mathworks, “iqcoef2imbal function,” Sep. 15, 2016, Accessed: Feb. 2,
His research interests include networks, communi-
2018. [Online]. Available: https://www.mathworks.com/help/
cations, and machine learning. He chaired work-
comm/ref/iqcoef2imbal.html shops at ACM MobiCom, ACM WiSec, IEEE CNS,
[36] B. Schlkopf et al., “Estimating the support of a high-dimensional and IEEE ICNP, served as track chair at IEEE
distribution,” Neural Comput., vol. 13, pp. 1443–1471, 2001. PIMRC, IEEE MILCOM, and IEEE GlobalSIP,
[37] F. T. Liu, K. M. Ting, and Z. Zhou, “Isolation forest,” in Proc. 8th and served on the organizing committee of IEEE
IEEE Int. Conf. Data Mining, 2008, pp. 413–422. GLOBECOM. He received the IEEE HST 2018 Best
[38] M. Hubert and M. Debruyne, “Minimum covariance determi-
Paper Award. He is a senior member of the IEEE.
nant,” Advanced Rev., vol. 2, pp. 36–43, 2010.
[39] P. Rousseeuw and K. V. Driessen, “A fast algorithm for the mini-
mum covariance determinant estimator,” Technometrics, vol. 41,
pp. 212–223, 1999. " For more information on this or any other computing topic,
[40] L. Tassiulas and A. Ephremides, “Stability properties of con- please visit our Digital Library at www.computer.org/csdl.
strained queueing systems and scheduling policies for maximum
throughput in multihop radio networks,” IEEE Trans. Autom.
Control, vol. 37, no. 12, pp. 1936–1948, Dec. 1992.
[41] S. Soltani et al., “Joint network coding and backpressure algo-
rithm for cognitive radio networks,” in Proc. IEEE Military Com-
mun. Conf., 2017, pp. 858–863.
[42] “Qualcomm QCS605 SoC,” Qualcomm, Apr. 11, 2018, Accessed:
Nov. 14, 2018. [Online]. Available: https://www.qualcomm.
com/products/qcs605