When Industrial Radio Security Meets AI: Opportunities and Challenges

被引:0
作者
Li, Weiwei [1 ,2 ]
Chen, Guorong [1 ]
Zhang, Xianming [2 ]
Wang, Ning [3 ]
Lv, Shichao [4 ,5 ]
Huang, Jingjing [6 ,7 ]
机构
[1] Chongqing Univ Sci & Technol, Sch Intelligent Technol & Engn, Chongqing 401331, Peoples R China
[2] Chongqing Technol & Business Univ, Engn Res Ctr Waste Oil Recovery Technol & Equipmen, Minist Educ, Chongqing 400067, Peoples R China
[3] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, Beijing 100195, Peoples R China
[5] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100195, Peoples R China
[6] Beijing SaiXi Technol Dev Co LLC, Beijing 100007, Peoples R China
[7] China Elect Standardizat Inst, Beijing 100007, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
Security; Wireless communication; Communication system security; Wireless sensor networks; Wireless networks; Eavesdropping; Jamming; Artificial intelligence (AI); industrial radio security; machine learning; physical-layer security (PLS); PHYSICAL LAYER AUTHENTICATION; ADVERSARIAL ATTACKS; SPOOFING DETECTION; WIRELESS NETWORKS; ANTENNA SELECTION; 5G; INTERNET; IDENTIFICATION; THINGS;
D O I
10.1109/TII.2024.3413320
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid development of artificial intelligence (AI) has brought about revolutionary changes to industrial wireless networks. Meanwhile, these AI models have also incurred a more complex security environment. This article will investigate the new situations that may arise in the industrial radio security under the support of AI technologies. First, typical radio threats and the uniqueness of industrial wireless networks are introduced. We then review existing industrial wireless physical-layer security schemes based on various AI models from the perspective of countering these radio threats. From the attackers' perspective, three typical case studies are introduced, in which AI technologies will aid in jamming, spoofing, and eavesdropping attacks. Finally, we discussed the openness issues and potential solutions in industrial radio security. This article is of significant in understanding the current status of AI-based industrial radio security, as well as the main problems and challenges. This investigation can promote the healthy development of smart factories and future industries.
引用
收藏
页码:11854 / 11865
页数:12
相关论文
共 67 条
[1]   Communications Security in Industry X: A Survey [J].
Ahmad, Ijaz ;
Rodriguez, Felipe ;
Kumar, Tanesh ;
Suomalainen, Jani ;
Jagatheesaperumal, Senthil Kumar ;
Walter, Stefan ;
Asghar, Muhammad Zeeshan ;
Li, Gaolei ;
Papakonstantinou, Nikolaos ;
Ylianttila, Mika ;
Huusko, Jyrki ;
Sauter, Thilo ;
Harjula, Erkki .
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 :982-1025
[2]   The Challenges of Artificial Intelligence in Wireless Networks for the Internet of Things: Exploring Opportunities for Growth [J].
Ahmad, Ijaz ;
Shahabuddin, Shahriar ;
Sauter, Thilo ;
Harjula, Erkki ;
Kumar, Tanesh ;
Meisel, Marcus ;
Juntti, Markku ;
Ylianttila, Mika .
IEEE INDUSTRIAL ELECTRONICS MAGAZINE, 2021, 15 (01) :16-29
[3]   A Novel Machine Learning Aided Antenna Selection Scheme for MIMO Internet of Things [J].
An, Wannian ;
Zhang, Peichang ;
Xu, Jiajun ;
Luo, Huancong ;
Huang, Lei ;
Zhong, Shida .
SENSORS, 2020, 20 (08)
[4]  
[Anonymous], 2017, IEEE Wireless Communications and Networking Conference (WCNC)
[5]  
Arjoune Y, 2020, 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P1010, DOI [10.1109/CCWC47524.2020.9031175, 10.1109/ccwc47524.2020.9031175]
[6]   A survey on adversarial attacks and defences [J].
Chakraborty, Anirban ;
Alam, Manaar ;
Dey, Vishal ;
Chattopadhyay, Anupam ;
Mukhopadhyay, Debdeep .
CAAI TRANSACTIONS ON INTELLIGENCE TECHNOLOGY, 2021, 6 (01) :25-45
[7]   Deep Learning for Launching and Mitigating Wireless Jamming Attacks [J].
Erpek, Tugba ;
Sagduyu, Yalin E. ;
Shi, Yi .
IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2019, 5 (01) :2-14
[8]   Learning-Aided Physical Layer Authentication as an Intelligent Process [J].
Fang, He ;
Wang, Xianbin ;
Hanzo, Lajos .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (03) :2260-2273
[9]  
Ferdowsi Aidin., 2018, 2018 IEEE International Conference on Communications (ICC), P1
[10]   Artificial Intelligence-Based Cyber Security in the Context of Industry 4.0-A Survey [J].
Goncalves de Azambuja, Antonio Joao ;
Plesker, Christian ;
Schuetzer, Klaus ;
Anderl, Reiner ;
Schleich, Benjamin ;
Almeida, Vilson Rosa .
ELECTRONICS, 2023, 12 (08)