Security risks and countermeasures of adversarial attacks on AI-driven applications in 6G networks: A survey

被引:2
作者
Hoang, Van-Tam [1 ]
Ergu, Yared Abera [1 ]
Nguyen, Van-Linh [1 ,2 ]
Chang, Rong-Guey [1 ,2 ]
机构
[1] Natl Chung Cheng Univ, Dept Comp Sci & Informat Engn, Chiayi, Taiwan
[2] Natl Chung Cheng Univ, Adv Inst Mfg High Tech Innovat, Chiayi, Taiwan
关键词
6G networks; Adversarial attacks; Adversarial defenses; Deep neural network; AI-powered 6G applications; O-RAN vulnerabilities; Noise perturbation; Adversarial anomaly detection; 5G NETWORKS; EXAMPLES; PRIVACY; COMMUNICATION; OPTIMIZATION; RECOGNITION; GENERATION; ALLOCATION; DEFENSE; MIMO;
D O I
10.1016/j.jnca.2024.104031
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of sixth-generation (6G) networks is expected to start a new era in mobile networks, characterized by unprecedented high demands on dense connectivity, ultra-reliability, low latency, and high throughput. Artificial intelligence (AI) is at the forefront of this progress, optimizing and enabling intelligence for essential 6G functions such as radio resource allocation, slicing, service offloading, and mobility management. However, AI is subject to a wide range of security risks, most notably adversarial attacks. Recent studies, inspired by computer vision and natural language processing, show that adversarial attacks have significantly reduced performance and caused incorrect decisions in wireless communications, jeopardizing the perspective of transforming AI-based 6G core networks. This survey presents a thorough investigation into the landscape of adversarial attacks and defenses in the realm of AI-powered functions within classic wireless networks, open radio access networks (O-RAN), and 6G networks. Two key findings are as follows. First, by leveraging shared wireless networks, attackers can provide noise perturbation or signal sampling for interference, resulting in misclassification in AI-based channel estimation and signal classification. From these basic weaknesses, 6G introduces new threat vectors from AI-based core functionalities, such as malicious agents in federated learning- based service offloading and adversarial attacks on O-RAN near-real-time RIC (xApp). Second, adversarial training, trustworthy mmWave/Terahertz datasets, adversarial anomaly detection, and quantum technologies for adversarial defenses are the most promising strategies for mitigating the negative effects of the attacks. This survey also identifies possible future research topics for adversarial attacks and countermeasures in 6G AI-enabled technologies.
引用
收藏
页数:31
相关论文
共 50 条
  • [31] A survey on advancements in blockchain-enabled spectrum access security for 6G cognitive radio IoT networks
    Al-Matari, Nassmah Y.
    Zahary, Ammar T.
    A. Al-Shargabi, Asma
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [32] Enabling technologies for AI empowered 6G massive radio access networks
    Shahjalal, Md.
    Kim, Woojun
    Khalid, Waqas
    Moon, Seokjae
    Khan, Murad
    Liu, ShuZhi
    Lim, Suhyeon
    Kim, Eunjin
    Yun, Deok-Won
    Lee, Joohyun
    Lee, Won-Cheol
    Hwang, Seung-Hoon
    Kim, Dongkyun
    Lee, Jang-Won
    Yu, Heejung
    Sung, Youngchul
    Jang, Yeong Min
    ICT EXPRESS, 2023, 9 (03): : 341 - 355
  • [33] AI-RAN in 6G Networks: State-of-the-Art and Challenges
    Khan, Naveed Ali
    Schmid, Stefan
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 294 - 311
  • [34] Lifecycle Management of Trustworthy AI Models in 6G Networks: the Reason Approach
    Parra-Ullauri, Juan
    Zhou, Xueqing
    Moazzeni, Shadi
    Hussain, Rasheed
    Vasilakos, Xenofon
    Wu, Yulei
    Baby, Renjith
    Hassan Mahmud, M. M.
    Incorvaia, Gabriele
    Hond, Darryl
    Asgari, Hamid
    Tassi, Andrea
    Warren, Daniel
    Simeonidou, Dimitra
    IEEE WIRELESS COMMUNICATIONS, 2025, 32 (02) : 42 - 51
  • [35] 6G Driven Fast Computational Networking Framework for Healthcare Applications
    Srinivasu, Parvathaneni Naga
    Ijaz, Muhammad Fazal
    Shafi, Jana
    Wozniak, Marcin
    Sujatha, R.
    IEEE ACCESS, 2022, 10 : 94235 - 94248
  • [36] A survey on metaverse-empowered 6G wireless systems: A security perspective
    Khan, Latif U.
    Guizani, Mohsen
    Yaqoob, Ibrar
    Niyato, Dusit
    Al-Fuqaha, Ala
    Hong, Choong Seon
    INTERNET OF THINGS, 2024, 28
  • [37] A Secure Deep Autoencoder-based 6G Channel Estimation to Detect/Mitigate Adversarial Attacks
    Oleiwi, Haider W.
    Mhawi, Doaa N.
    Al-Raweshidy, H. S.
    2023 5TH GLOBAL POWER, ENERGY AND COMMUNICATION CONFERENCE, GPECOM, 2023, : 530 - 535
  • [38] Survey on Digital Twin Edge Networks (DITEN) Toward 6G
    Tang, Fengxiao
    Chen, Xuehan
    Rodrigues, Tiago Koketsu
    Zhao, Ming
    Kato, Nei
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2022, 3 : 1360 - 1381
  • [39] A Survey of Computational Intelligence for 6G: Key Technologies, Applications and Trends
    Ji, Baofeng
    Wang, Yanan
    Song, Kang
    Li, Chunguo
    Wen, Hong
    Menon, Varun G.
    Mumtaz, Shahid
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (10) : 7145 - 7154
  • [40] Artificial Intelligence in 6G Wireless Networks: Opportunities, Applications, and Challenges
    Alhammadi, Abdulraqeb
    Shayea, Ibraheem
    El-Saleh, Ayman A.
    Azmi, Marwan Hadri
    Ismail, Zool Hilmi
    Kouhalvandi, Lida
    Saad, Sawan Ali
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2024, 2024