Professional Documents
Culture Documents
Abstract—Traditional physical (PHY) layer protocols contain can quickly degrade in unknown or attacked channels. A fully
chains of signal processing blocks that have been mathemat- resilient P2P link would need to use dynamic signal processing
ically optimized to transmit information bits efficiently over capabilities coupled with autonomous machine intelligence
noisy channels. Unfortunately, this same optimality encourages
arXiv:1908.11218v1 [eess.SP] 29 Aug 2019
ubiquity in wireless communication technology and enhances the to overcome drastic changes in the channel. This approach
potential for catastrophic cyber or physical attacks due to prolific can be achieved with software-defined radios (SDRs) and
knowledge of underlying physical layers. Additionally, optimal machine learning (ML) and is intriguing in that it addresses the
signal processing for one channel medium may not work for developing requirements of dynamic channels while increasing
another without significant changes in the software protocol. diversity and resilience. SDR and ML have seen increased
Any truly resilient communications protocol must be capable
of immediate redeployment to meet quality of service (QoS) use in the development of modern digital communications
demands in a wide variety of possible channel media. Contrary schemes including machine modems. The versatility of SDRs
to many traditional approaches which use immutable man-made [5] to reconfigure radio links adaptively is used to increase
signal processing blocks, this work proposes generating real-time the testing and development of digital communications. ML -
blocks ad hoc through a machine learning framework, so-called the composing of machines to continuously improve (or learn)
deepmod, that is only relevant to the particular channel medium
being used. With this approach, traditional signal processing with experience [6] - has been applied across a broad scope
blocks are replaced with machine learning graphs which are of scientific and technological fields.
trained, used, and discarded as needed. Our experiments show ML has been shown to be influential in signal processing
that deepmod, using the same machine intelligence, converges to applications such as computer and machine vision [7]–[9],
viable communication links over vastly different channels includ- anomaly detection [10]–[12], and natural language processing
ing: radio frequency (RF), powerline communications (PLC), and
acoustic channels. [13]–[15]. In traditional systems, a “machine” is built as a
Index Terms—physical layer, machine learning, digital com- solution to a mathematical system model. However, many
munications, tactical networks practical applications are exceedingly complex which create
cases where a mathematical model may not be easily for-
I. I NTRODUCTION mulated or implemented. Here, an algorithm can be used
to build a machine by incorporating data which may be
M ODERN digital communications systems are rooted in
networks of basic point-to-point (P2P) enabled devices.
To ensure performance of these systems, various quality of
coupled with system models, regardless of their completeness.
Currently, the use of multiple layers of ML algorithms to
improve performance and broaden generalization, known as
service (QoS) metrics must be addressed to ensure user satis-
deep learning [16], is garnering the attention and focus of the
faction. These QoS metrics range from security (e.g. low prob-
research community.
ability of detection, intercept, and/or exploitation [LPI, LPD,
SDRs are flexible and can dynamically alter functionality
LPE]) [1] in tactical networks to latency [2], [3], assurance,
across the protocol stack which creates numerous areas of
and throughput [4] in more traditional networks; however, QoS
research interests and capabilities. Recent prevalence of 4th
A. Anderson is with Oak Ridge National Laboratory and joint faculty generation wireless techniques at the PHY layer has redirected
with the Department of Electrical and Computer Engineering, Tennessee Tech SDR research to multiple-input multiple output (MIMO) an-
University, Cookeville, TN, 38505 USA e-mail: aanderson@tntech.edu. tenna systems and orthogonal frequency-division multiplexing
S. Young, F. Reed, and J. M. Vann are with Oak Ridge National Laboratory,
Oak Ridge, Tennessee email: [youngsr, reedfk, vannjm]@ornl.gov (OFDM) applications. Similarly, SDRs are being used to
This Research was sponsored by the Laboratory Directed Research and investigate spectrum use optimization through congitive radio,
Development Program of Oak Ridge National Laboratory, managed by UT- dynamic spectrum access [17], and software-defined network-
Battelle, LLC, for the U.S. Department of Energy. This manuscript has been
authored by UT-Battelle, LLC, under Contract No. DE-AC0500OR22725 ing at and above the MAC layer. In applications and complex
with the U.S. Department of Energy. The United States Government retains concepts such as 5th generation wireless communications [18],
and the publisher, by accepting the article for publication, acknowledges the flexibility and breadth of SDR approaches become ideal
that the United States Government retains a nonexclusive, paid-up, irrevo-
cable, worldwide license to publish or reproduce the published form of this for low cost rapid prototyping.
manuscript, or allow others to do so, for the United States Government By coupling the innovative capabilities of both SDR and
purposes. The Department of Energy will provide public access to these ML, formerly impractical and computationally intensive tasks
results of federally sponsored research in accordance with the DOE Public
Access Plan(http://energy.gov/downloads/doe-public-access-plan).The authors in communication systems are being accomplished on easily
are with the Oak Ridge National Laboratory, Oak Ridge, TN 37831 USA. portable computational platforms. These couplings of SDR and
Fig. 1: Example receiver processing blocks for A) a traditional PHY, B) a machine learning enabled PHY, and C) the proposed
deepmod self-taught PHY.
ML result in a directional shift of modern communications powerline communications (PLC), and radio frequency (RF)
systems such as in adaptive equalization [19], [20], spectrum channels - all without changing software. Holistic in that, at the
sensing for cognitive radio [21], protocol identification [22], transmitter, information bits are converted directly to samples2
and network optimization [23]. Deep learning has been applied by the machine (deepmod); and, at the receiver, samples
in Rayleigh fading channels for massive MIMO systems [24], are mapped to classes using deepmod and then converted to
been shown to synthesize modulation where the channel is bit estimates. Rather than replacing some individual signal
previously unknown in adversarial networks [25], and has processing blocks, deepmod creates and learns the entire
been applied as an autoencoder for OFDM schemes with software portion of the PHY layer in a self-taught manner.
non-linear amplifiers [26]. At the physical layer, ML is used
II. S YSTEM M ODEL
in place of specific digital communications blocks such as:
pulse-shaping filters, channel filters, serializers, forward-error To scope the presentation of this work, this paper focuses on
correcting codes, and so on. Instead, network graphs are used the point-to-point (P2P) link where both Users are enabled for
to govern the operations of these blocks at the transmitter full duplex communications. The P2P channel then consists of
and receiver [27]–[29]. The neural networks, or flow graphs1 , two Users each equipped with an appropriate transducer (e.g.
are “trained” at their respective transmitter or receiver. After antenna) for that channel. This transducer is used to convey
training, the learned machines, coupled with traditional com- energy representing information over an unknown channel
munication blocks, are used for the PHY layer ML schemes. yi = hi (fi (xi )) + ηi (1)
In contrast to these discussed PHY techniques, this paper
proposes the use of SDRs and ML in an attempt to replace x̂i = gi (yi ) (2)
all traditional signal processing blocks in order to create an where xi are the information bits destined for User i. These
expendable, yet resilient, communication scheme. A realistic bits are transformed to samples through PHY processing fi (·)
framework is presented, referred to as deep modulation or to then be transmitted over-the-air by the SDR. The channel
deepmod, that can be used to generate a temporary PHY layer hi (·) corrupts the samples in some unknown manner and also
based on the channel and requirements of the communicating includes adding ηi as additive white Gaussian noise (AWGN)
nodes. Upon the arrival of communication disruption or attack, with variance n2std . For simplicity, (1) assumes received sam-
such as a jammer, the graphs can be retrained allowing the ples yi are processed at baseband and signal magnitudes are
nodes to recover communication. The link protocol is gen- bounded by unity. Estimates of information-bearing bits (2)
erated ad hoc and satisfies the current channel requirements. are recovered through further processing, gi (·), at the receive
This protocol can be disposed of when: communication ends, User.
periodically, or during an attack. As a result, two nodes
create a unique communication chain that satisfies throughput A. Traditional PHY
requirements and can be discarded for a new and unique chain The traditional approach to wireless communications is to
in the future. find optimal bulk processing at the transmitter and receiver,
Novelty: To the best of our knowledge, we show for the fi (·) and gi (·), respectively, given some fixed distribution of
first time a single machine learner able to create a holistic, the channel conditions hi (·) and noise power n2std . Often,
self-taught P2P PHY that can communicate over acoustic, samples pass through a long chain of signal processing in
order to correctly encode and decode the bits [30]. Fig. 1(A)
1 There is some ambiguity over the term “network” between the machine
learning and communications communities. For clarity, “network”, by itself, 2 More ambiguity between communications and machine learning com-
refers to the communications network while we use the word “graph” to refer munities. “Samples” is used for those values generated by the SDR while
to the learning network. “examples” is instead used for inputs into ML graphs.
shows what gi (·) may look like at the receiver for a traditional
approach to PHY layer processing. Raw samples are deframed
according to some bursty traffic pattern. The carrier frequency
offset (CFO) and timing mismatch, due to sensitive differences
in User hardware, are recovered and corrected. Corrected
samples are matched filtered and passed through an automatic
gain controller (AGC) in case of multilevel modulation. After
phase correction, the symbols are demodulated into bits and
then corrected based on whatever forward error correction
(FEC) was used at the transmitter. Though traditional PHYs
may differ in order and types of processing from that shown
in Fig. 1(A); in general, each operation used on the data is
“optimal” with regards to some metric such as bit-error rate
(BER) or throughput for the given channel. Unfortunately, it
is straightforward to alter hi (·) or ηi sufficiently, through an
attack, an incidental interferer, or failure [31], such that the
optimal traditional processing also fails.
and then tested at a different set of SNRs. First consider the signal processing blocks. For example, adaptive AGCs are
convergence behavior of deepmod in the RF channel as shown often used in software for multi-level modulations such as
in Fig. 9. For these results the environment is fixed at RF while QAM. This is done in traditional schemes so that symbol
the train SNR is swept from 0 to 10 dB for various test SNR magnitudes are bounded by unity for detection purposes.
values. A valid conclusion is that the training time required Analogously, deepmod contains tanh activation functions,
for convergence decreases with increased test SNR. It is also whose magnitude outputs are bounded by unity, that can result
shown that the system converges to the CER performance in similar behavior if training dictates such. Fully connected
based on the train SNR value; however, this does not answer layers within the CNN have similar mathematical operations to
the question of CER performance as a function of train SNR. traditional filters where weights are learned rather than preset
as in matched filters. The comparisons can go on; however, the
The results of this second experiment are shown in Fig.
key concern is that traditional digital communication systems
10 where a cross-section of the CER performance curve is
use human optimized blocks to find fi (·) from (1) to convert
shown for swept train SNR. It may be surprising to note that
bits to samples and gi (·) from (2), to convert samples to bits.
the performance of each test SNR is roughly convex as a
When deepmod is given sufficient depth in its CNN it can
function of the training SNR rather than strictly increasing or
simply learn the functions fi (·) and gi (·), on its own, through
decreasing. Training at maximum SNR is not necessarily the
the training methodology described in this work.
optimal hyperparameter setting. This is easier to understand by
considering the two edge cases: no noise (infinite train SNR)
or no signal (zero train SNR). With no signal, the machine V. C ONCLUSION
obviously cannot learn anything about the PHY layer and per- Deep modulation, or deepmod, is a machine learning frame-
formance will be poor; however, a similar phenomenon occurs work designed to replace much of the traditional signal
with no noise. At infinite SNR, the waveforms (representing processing blocks at the PHY layer by creating a machine
classes) imagined by deepmod converge quickly to a solution that is self-taught in how to exchange information over an
that satisfy the machine’s cost functions. Limited noise is too unknown channel. Deepmod-enabled Users initialize with a set
easy on the machine. The best learning takes place when of unique classes (waveforms) to transmit data over the current
deepmod must work at producing waveforms that function in channel medium. With the assistance of a specially designed
noise - even if such learning never converges to perfection. critic graph, these waveforms converge quickly to a set of
This idea is not too dissimilar from data augmentation [38] decodeable classes at the receiver. It was shown experimentally
in computer vision and image machine learning algorithms that deepmod can be used to successfully transmit bit-bearing
where training images are intentionally distorted by a variety classes / waveforms across an unknown channel - even
of operations (cropping, shearing, rotating, etc.) to improve across different media such as RF, acoustic, or PLC chan-
machine learnability. nels. These media represent radically different environments
Finally, at first glance, it seems incredible that deepmod is from frequency-flat to frequency-selective channels as well
able to relearn transmit and receive processing chains on its as narrow- and wideband spectrum usage. Deepmod then has
own. However, the CNN that defines deepmod is equipped an inherent attribute of resilience as well as adaptability for
with all the functionality required to reproduce traditional just-in-time communications as the same machine can learn
to communicate over different channels given the appropriate [19] B. Widrow, J. R. Glover, J. M. McCool, J. Kaunitz, C. S. Williams,
hardware transducer. R. H. Hearn, J. R. Zeidler, J. E. Dong, and R. C. Goodlin, “Adaptive
noise cancelling: Principles and applications,” Proceedings of the IEEE,
vol. 63, no. 12, pp. 1692–1716, 1975.
R EFERENCES [20] M. Ibnkahla, “Applications of neural networks to digital
communications–a survey,” Signal processing, vol. 80, no. 7, pp.
[1] G. Cirincione, R. Govindan, S. Krishnamurthy, T. F. L. Porta, and 1185–1215, 2000.
P. Mohapatra, “Impact of security properties on the quality of infor- [21] M. Bkassiny, Y. Li, and S. K. Jayaweera, “A survey on machine-
mation in tactical military networks,” in 2010 - MILCOM 2010 Military learning techniques in cognitive radios,” IEEE Communications Surveys
Communications Conference, Oct 2010, pp. 1–6. & Tutorials, vol. 15, no. 3, pp. 1136–1159, 2013.
[22] S. Hu, Y.-d. Yao, and Z. Yang, “Mac protocol identification using
[2] S. R. O’Melia, R. Khazan, and D. Utin, “Efficient transmission of dod
support vector machines for cognitive radio networks,” IEEE Wireless
pki certificates in tactical networks,” in 2011 - MILCOM 2011 Military
Communications, vol. 21, no. 1, pp. 52–60, 2014.
Communications Conference, Nov 2011, pp. 1739–1747.
[23] M. Zorzi, A. Zanella, A. Testolin, M. D. F. De Grazia, and M. Zorzi,
[3] W. B. Cottle and R. G. Ehrenberg, “Strategies for integrating very high
“Cognition-based networks: A new perspective on network optimization
latency modems into a deployed milsatcom network while assuring high
using learning and distributed intelligence,” IEEE Access, vol. 3, pp.
levels of reliability,” in 2010 - MILCOM 2010 Military Communications
1512–1530, 2015.
Conference, Oct 2010, pp. 1942–1947.
[24] R.-F. Liao, H. Wen, J. Wu, H. Song, F. Pan, and L. Dong, “The rayleigh
[4] J. Nightingale, Q. Wang, J. M. A. Calero, I. Owens, F. T. Johnsen, fading channel prediction via deep learning,” Wireless Communications
T. H. Bloebaum, and M. Manso, “Reliable full motion video services in and Mobile Computing, vol. 2018, 2018.
disadvantaged tactical radio networks,” in 2016 International Conference [25] T. J. O’Shea, T. Roy, N. West, and B. C. Hilburn, “Physical layer
on Military Communications and Information Systems (ICMCIS), May communications system design over-the-air using adversarial networks,”
2016, pp. 1–9. in 2018 26th European Signal Processing Conference (EUSIPCO).
[5] L. Goeller and D. Tate, “A technical review of software defined radios: IEEE, 2018, pp. 529–532.
Vision, reality, and current status,” in 2014 IEEE Military Communica- [26] A. Felix, S. Cammerer, S. Dörner, J. Hoydis, and S. Ten Brink, “OFDM-
tions Conference, Oct 2014, pp. 1466–1470. autoencoder for end-to-end learning of communications systems,” in
[6] T. M. Mitchell, “Machine learning. 1997,” Burr Ridge, IL: McGraw Hill, 2018 IEEE 19th International Workshop on Signal Processing Advances
vol. 45, no. 37, pp. 870–877, 1997. in Wireless Communications (SPAWC). IEEE, 2018, pp. 1–5.
[7] H. Kuang, X. Zhang, Y. J. Li, L. L. H. Chan, and H. Yan, “Night- [27] T. J. O’Shea and J. Hoydis, “An introduction to machine learning
time vehicle detection based on bio-inspired image enhancement and communications systems,” ArXiv e-prints, Feb. 2017.
weighted score-level feature fusion,” IEEE Transactions on Intelligent [28] T. OShea and J. Hoydis, “An introduction to deep learning for the
Transportation Systems, vol. 18, no. 4, pp. 927–936, April 2017. physical layer,” IEEE Transactions on Cognitive Communications and
[8] T. T. Dhivyaprabha, P. Subashini, and M. Krishnaveni, “Computational Networking, vol. 3, no. 4, pp. 563–575, Dec 2017.
intelligence based machine learning methods for rule-based reasoning [29] S. Drner, S. Cammerer, J. Hoydis, and S. t. Brink, “Deep learning based
in computer vision applications,” in 2016 IEEE Symposium Series on communication over the air,” IEEE Journal of Selected Topics in Signal
Computational Intelligence (SSCI), Dec 2016, pp. 1–8. Processing, vol. 12, no. 1, pp. 132–143, Feb 2018.
[9] M. Allodi, A. Broggi, D. Giaquinto, M. Patander, and A. Prioletti, [30] J. G. Proakis, “Digital communications,” McGraw-Hill, New York, 1995.
“Machine learning in tracking associations with stereo vision and lidar [31] A. L. Anderson, S. R. Young, T. P. Karnowski, and M. Vann, “Deepmod:
observations for an autonomous vehicle,” in 2016 IEEE Intelligent An over-the-air trainable machine modem for resilient PHY layer
Vehicles Symposium (IV), June 2016, pp. 648–653. communications,” 2018 - MILCOM 2018 Military Communications
[10] A. Valdes, R. Macwan, and M. Backes, “Anomaly detection in electrical Conference, 10 2018.
substation circuits via unsupervised machine learning,” in 2016 IEEE [32] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley,
17th International Conference on Information Reuse and Integration S. Ozair, A. Courville, and Y. Bengio, “Generative adversarial nets,” in
(IRI), July 2016, pp. 500–505. Advances in neural information processing systems, 2014, pp. 2672–
[11] R. Z. A. Mohd, M. F. Zuhairi, A. Z. A. Shadil, and H. Dao, “Anomaly- 2680.
based nids: A review of machine learning methods on malware detec- [33] M. Abadi, A. Agarwal, P. Barham, E. Brevdo, Z. Chen, C. Citro, G. S.
tion,” in 2016 International Conference on Information and Communi- Corrado, A. Davis, J. Dean, M. Devin, S. Ghemawat, I. Goodfellow,
cation Technology (ICICTM), May 2016, pp. 266–270. A. Harp, G. Irving, M. Isard, Y. Jia, R. Jozefowicz, L. Kaiser,
[12] J. Murphree, “Machine learning anomaly detection in large systems,” in M. Kudlur, J. Levenberg, D. Mané, R. Monga, S. Moore, D. Murray,
2016 IEEE AUTOTESTCON, Sept 2016, pp. 1–9. C. Olah, M. Schuster, J. Shlens, B. Steiner, I. Sutskever, K. Talwar,
[13] K. Kandasamy and P. Koroth, “An integrated approach to spam classi- P. Tucker, V. Vanhoucke, V. Vasudevan, F. Viégas, O. Vinyals,
fication on twitter using url analysis, natural language processing and P. Warden, M. Wattenberg, M. Wicke, Y. Yu, and X. Zheng,
machine learning techniques,” in Electrical, Electronics and Computer “TensorFlow: Large-scale machine learning on heterogeneous systems,”
Science (SCEECS), 2014 IEEE Students’ Conference on, March 2014, 2015, software available from tensorflow.org. [Online]. Available:
pp. 1–5. http://tensorflow.org/
[14] J. T. Pollettini, H. C. Pessotti, A. P. Filho, E. E. S. Ruiz, and M. S. A. [34] GNU Radio Website, accessed May 2018. [Online]. Available:
Junior, “Applying natural language processing, information retrieval http://www.gnuradio.org
and machine learning to decision support in medical coordination in [35] M. S. Facina, H. A. Latchman, H. V. Poor, and M. V. Ribeiro,
an emergency medicine context,” in 2015 IEEE 28th International “Cooperative in-home power line communication: Analyses based on
Symposium on Computer-Based Medical Systems, June 2015, pp. 316– a measurement campaign,” IEEE Transactions on Communications,
319. vol. 64, no. 2, pp. 778–789, 2016.
[15] S. Lakhanpal, A. Gupta, and R. Agrawal, “Discover trending domains [36] S. Liu, B. Gou, H. Li, and R. Kavasseri, “Power-line communication
using fusion of supervised machine learning with natural language channel characteristics under transient model,” IEEE Transactions on
processing,” in 2015 18th International Conference on Information Power Delivery, vol. 29, no. 4, pp. 1701–1708, 2014.
Fusion (Fusion), July 2015, pp. 893–900. [37] M. Barbeau, “Weak signal underwater communications in the ultra low
[16] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, frequency band,” in Proceedings of the GNU Radio Conference, vol. 2,
no. 7553, pp. 436–444, 2015. no. 1, 2017, pp. 8–8.
[17] P. V. Kumar and M. L. N. Sai, “SDR based MIMO link adaptation [38] S. C. Wong, A. Gatt, V. Stamatescu, and M. D. McDonnell, “Under-
for cognitive radio application,” in 2014 International Conference on standing data augmentation for classification: when to warp?” in 2016
Communication and Signal Processing, April 2014, pp. 577–581. International Conference on Digital Image Computing: Techniques and
[18] T. Wirth, M. Mehlhose, J. Pilz, R. Lindstedt, D. Wieruch, B. Holfeld, Applications (DICTA). IEEE, 2016, pp. 1–6.
and T. Haustein, “An advanced hardware platform to verify 5g wireless
communication concepts,” in 2015 IEEE 81st Vehicular Technology
Conference (VTC Spring), May 2015, pp. 1–5.