Secure artificial intelligence at the edge

被引:0
作者
Sehatbakhsh, Nader [1 ]
Pamarti, Sudhakar [1 ]
Roychowdhary, Vwani [1 ]
Iyer, Subramanian [1 ]
机构
[1] Univ Calif Los Angeles, Dept Elect & Comp Engn, Los Angeles, CA 90095 USA
来源
PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES | 2025年 / 383卷 / 2288期
关键词
edge computing; artificial intelligence; sensor security; systemic attacks; NETWORKS;
D O I
10.1098/rsta.2023.0398
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Sensors for the perception of multimodal stimuli-ranging from the five senses humans possess and beyond-have reached an unprecedented level of sophistication and miniaturization, raising the prospect of making man-made large-scale complex systems that can rival nature a reality. Artificial intelligence (AI) at the edge aims to integrate such sensors with real-time cognitive abilities enabled by recent advances in AI. Such AI progress has only been achieved by using massive computing power which, however, would not be available in most distributed systems of interest. Nature has solved this problem by integrating computing, memory and sensing functionalities in the same hardware so that each part can learn its environment in real time and take local actions that lead to stable global functionalities. While this is a challenging task by itself, it would raise a new set of security challenges when implemented. As in nature, malicious agents can attack and commandeer the system to perform their own tasks. This article aims to define the types of systemic attacks that would emerge, and introduces a multiscale framework for combatting them. A primary thesis is that edge AI systems have to deal with unknown attack strategies that can only be countered in real time using low-touch adaptive learning systems. This article is part of the theme issue 'Emerging technologies for future secure computing platforms'.
引用
收藏
页数:10
相关论文
共 14 条
  • [1] Leveraging social networks to fight spam
    Boykin, PO
    Roychowdhury, VP
    [J]. COMPUTER, 2005, 38 (04) : 61 - +
  • [2] Sensor Network Security: A Survey
    Chen, Xiangqian
    Makki, Kia
    Yen, Kang
    Pissinou, Niki
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02): : 52 - 73
  • [3] Social learning spreads knowledge about dangerous humans among American crows
    Cornell, Heather N.
    Marzluff, John M.
    Pecoraro, Shannon
    [J]. PROCEEDINGS OF THE ROYAL SOCIETY B-BIOLOGICAL SCIENCES, 2012, 279 (1728) : 499 - 508
  • [4] Enabling Covert Body Area Network using Electro-Quasistatic Human Body Communication
    Das, Debayan
    Maity, Shovan
    Chatterjee, Baibhab
    Sen, Shreyas
    [J]. SCIENTIFIC REPORTS, 2019, 9 (1)
  • [5] Ding AY, 2022, ACM SIGCOMM COMP COM, V52, P28
  • [6] AI computing reaches for the edge
    Iyer, Subramanian S.
    Roychowdhury, Vwani
    [J]. SCIENCE, 2023, 382 (6668) : 263 - 264
  • [7] Collaborative spam filtering using e-mail networks
    Kong, Joseph S.
    Rezaei, Behnam A.
    Sarshar, Nima
    Roychowdhury, Vwani P.
    Boykin, P. Oscar
    [J]. COMPUTER, 2006, 39 (08) : 67 - +
  • [8] Manipulation of Host Behavior by Parasitic Insects and Insect Parasites
    Libersat, Frederic
    Delago, Antonia
    Gal, Ram
    [J]. ANNUAL REVIEW OF ENTOMOLOGY, 2009, 54 : 189 - 207
  • [9] Ecological networks and their fragility
    Montoya, Jose M.
    Pimm, Stuart L.
    Sole, Ricard V.
    [J]. NATURE, 2006, 442 (7100) : 259 - 264
  • [10] Parasitoid wasp venom manipulates host innate behavior via subtype-specific dopamine receptor activation
    Nordio, Stefania
    Kaiser, Maayan
    Adams, Michael E.
    Libersat, Frederic
    [J]. JOURNAL OF EXPERIMENTAL BIOLOGY, 2022, 225 (06)