Examining Machine Learning for 5G and Beyond Through an Adversarial Lens

被引:15
作者
Usama, Muhammad [1 ]
Ilahi, Inaam [1 ]
Qadir, Junaid [1 ]
Mitra, Rupendra Nath [2 ]
Marina, Mahesh K. [2 ]
机构
[1] Informat Technol Univ, Lahore 54000, Pakistan
[2] Univ Edinburgh, Edinburgh EH8 9YL, Midlothian, Scotland
关键词
5G mobile communication; Modulation; Computational modeling; Security; Context modeling; Cloud computing; Signal to noise ratio; 5G and Beyond Mobile Networks; Adversarial Machine Learning; Security I;
D O I
10.1109/MIC.2021.3049190
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Spurred by the recent advances in deep learning to harness rich information hidden in large volumes of data and to tackle problems that are hard to model/solve (e.g., resource allocation problems), there is currently tremendous excitement in the mobile networks domain around the transformative potential of data-driven artificial intelligence/machine learning (AI/ML) based network automation, control and analytics for 5G and beyond. In this article, we present a cautionary perspective on the use of AI/ML in the 5G context by highlighting the adversarial dimension spanning multiple types of ML (supervised/unsupervised/reinforcement learning) and support this through three case studies. We also discuss approaches to mitigate this adversarial ML risk, offer guidelines for evaluating the robustness of ML models, and call attention to issues surrounding ML oriented research in 5G more generally.
引用
收藏
页码:26 / 34
页数:9
相关论文
共 50 条
  • [1] Blockchain and Federated Learning for 5G Beyond
    Lu, Yunlong
    Huang, Xiaohong
    Zhang, Ke
    Maharjan, Sabita
    Zhang, Yan
    IEEE NETWORK, 2021, 35 (01): : 219 - 225
  • [2] Machine Learning for Intelligent Authentication in 5G and Beyond Wireless Networks
    Fang, He
    Wang, Xianbin
    Tomasin, Stefano
    IEEE WIRELESS COMMUNICATIONS, 2019, 26 (05) : 55 - 61
  • [3] How to Make 5G Communications "Invisible": Adversarial Machine Learning for Wireless Privacy
    Kim, Brian
    Sagduyu, Yalin E.
    Davaslioglu, Kemal
    Erpek, Tugba
    Ulukus, Sennur
    2020 54TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2020, : 763 - 767
  • [4] Security for 5G and Beyond
    Ahmad, Ijaz
    Shahabuddin, Shahriar
    Kumar, Tanesh
    Okwuibe, Jude
    Gurtov, Andrei
    Ylianttila, Mika
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) : 3682 - 3722
  • [5] Machine Learning Protocol for Secure 5G Handovers
    Vincent Omollo Nyangaresi
    Anthony Joachim Rodrigues
    Silvance Onyango Abeka
    International Journal of Wireless Information Networks, 2022, 29 : 14 - 35
  • [6] Machine Learning Protocol for Secure 5G Handovers
    Nyangaresi, Vincent Omollo
    Rodrigues, Anthony Joachim
    Abeka, Silvance Onyango
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2022, 29 (01) : 14 - 35
  • [7] A Survey on Machine Learning-Based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks
    Boualouache, Abdelwahab
    Engel, Thomas
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (02): : 1128 - 1172
  • [8] Identifying DDoS Attack using Split-Machine Learning System in 5G and Beyond Networks
    Rawal, Bharat S.
    Patel, Sudhanshu
    Sathiyanarayanan, Mithileysh
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [9] 5G Vehicular Network Resource Management for Improving Radio Access Through Machine Learning
    Tayyaba, Sahrish Khan
    Khattak, Hasan Ali
    Almogren, Ahmad
    Shah, Munam Ali
    Din, Ikram Ud
    Alkhalifa, Ibrahim
    Guizani, Mohsen
    IEEE ACCESS, 2020, 8 : 6792 - 6800
  • [10] Design and Simulation of a Hybrid Architecture for Edge Computing in 5G and Beyond
    Rahimi, Hamed
    Picaud, Yvan
    Singh, Kamal Deep
    Madhusudan, Giyyarpuram
    Costanzo, Salvatore
    Boissier, Olivier
    IEEE TRANSACTIONS ON COMPUTERS, 2021, 70 (08) : 1213 - 1224