On Attacking Future 5G Networks with Adversarial Examples : Survey
Zolotukhin, M., Zhang, D., Hämäläinen, T., & Miraghaei, P. (2023). On Attacking Future 5G Networks with Adversarial Examples : Survey. Network, 3(1), 39-90. https://doi.org/10.3390/network3010003
Published in
NetworkDate
2023Discipline
TekniikkaSecure Communications Engineering and Signal ProcessingEngineeringSecure Communications Engineering and Signal ProcessingCopyright
© 2022 by the authors. Licensee MDPI, Basel, Switzerland.
The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while operating on top of the same physical infrastructure. The recent progress in artificial intelligence and machine learning is theorized to be a potential answer to the arising resource allocation challenges. It is therefore expected that future generation mobile networks will heavily depend on its artificial intelligence components which may result in those components becoming a high-value attack target. In particular, a smart adversary may exploit vulnerabilities of the state-of-the-art machine learning models deployed in a 5G system to initiate an attack. This study focuses on the analysis of adversarial example generation attacks against machine learning based frameworks that may be present in the next generation networks. First, various AI/ML algorithms and the data used for their training and evaluation in mobile networks is discussed. Next, multiple AI/ML applications found in recent scientific papers devoted to 5G are overviewed. After that, existing adversarial example generation based attack algorithms are reviewed and frameworks which employ these algorithms for fuzzing stat-of-art AI/ML models are summarised. Finally, adversarial example generation attacks against several of the AI/ML frameworks described are presented.
...
Publisher
MDPI AGISSN Search the Publication Forum
2673-8732Keywords
Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/164836939
Metadata
Show full item recordCollections
Additional information about funding
The research did not receive specific funding but was performed as a part of the employment of the authors in Magister Solutions Ltd., Jyväskylä, Finland. The APC is also expected to be funded by Magister Solutions Ltd.License
Related items
Showing items with similar title or keywords.
-
On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples
Zolotukhin, Mikhail; Miraghaie, Parsa; Zhang, Di; Hämäläinen, Timo (Institute of Electrical and Electronics Engineers (IEEE), 2022)The use of artificial intelligence and machine learning is recognized as the key enabler for 5G mobile networks which would allow service providers to tackle the network complexity and ensure security, reliability and ... -
Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Peregrine Technical Solutions, 2020)Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine ... -
Artificial Intelligence for Cybersecurity : A Systematic Mapping of Literature
Wiafe, Isaac; Koranteng, Felix N.; Obeng, Emmanuel N.; Assyne, Nana; Wiafe, Abigail; Gulliver, Stephen R. (IEEE, 2020)Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can ... -
IoT -based adversarial attack's effect on cloud data platform services in a smart building context
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Academic Conferences International, 2020)IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's ... -
Taxonomy of generative adversarial networks for digital immunity of Industry 4.0 systems
Terziyan, Vagan; Gryshko, Svitlana; Golovianko, Mariia (Elsevier, 2021)Industry 4.0 systems are extensively using artificial intelligence (AI) to enable smartness, automation and flexibility within variety of processes. Due to the importance of the systems, they are potential targets for ...