AI and 6G Security: Opportunities and Challenges: June 2021
AI and 6G Security: Opportunities and Challenges: June 2021
net/publication/350824466
CITATION READS
1 1,726
4 authors:
Some of the authors of this publication are also working on these related projects:
5G-CHAMPION : 5G Communication with a Heterogeneous, Agile Mobile network in the Pyeongchang wInter Olympic competitioN View project
All content following this page was uploaded by Madhusanka Liyanage on 21 April 2021.
Abstract—While 5G is well-known for network cloudification “sub-networks” such as in-body networks will emerge, which
with micro-service based architecture, the next generation net- generally operate in a standalone fashion while benefiting from
works or the 6G era is closely coupled with intelligent network the wide area network.
orchestration and management. Hence, the role of Artificial
Intelligence (AI) is immense in the envisioned 6G paradigm. 6G will take the network softwarization/cloudification into
However, the alliance between 6G and AI may also be a double- network intelligentization, revolutionizing wireless networks
edged sword in many cases as AI’s applicability for protecting from connected things to “connected intelligence” [1], [2].
or infringing security and privacy. In particular, the end-to- Hence, AI becomes an integral part of the network, which
end automation of future networks demands proactive threats
plays a crucial role. The distributed heterogeneous networks
discovery, application of mitigation intelligent techniques and
making sure the achievement of self-sustaining networks in 6G. require ubiquitous AI services to ensure the fulfilment of
Therefore, to consolidate and solidify the role of AI in securing 6G goals. Intelligent wireless communications, closed-loop
6G networks, this article presents how AI can be leveraged in optimization of networks, big data analytics for 6G emphasize
6G security, possible challenges and solutions. the use of AI in diverse aspects of 6G networks.
Index Terms—6G, 6G Security, Artificial Intelligence, Machine
Learning, Intelligent Security
Beyond 2030 wireless applications will demand much
higher data rates (up to 1 Tb/s), extremely low end-to-
I. I NTRODUCTION TO 6G end latency (< 1 ms), extremely high end-to-end reliabil-
ity (99.99999%) [1], [2]. Moreover, 6G networks will comprise
As the realization of digital transformation expected with a collection of heterogeneous dense networks embedded with
5G networks has already begun and continue to evolve over connected intelligence and utilize hyper-connected cloudifica-
this decade, the 6G communication era envisions how hu- tion. Service provision for extreme requirements with complex
mans will interact with the digital virtual worlds beyond 6G networks requires sophisticated security mechanisms. The
2030. Future networks must possess novel technologies that security systems designed for 5G using the concepts of SDN
enable the digital virtual worlds with connected intelligence, and NFV should be further improved to cater to the security
to address the communication and networking challenges demands in 6G [5]. The end-to-end automation of future
beyond 2030. While the conventional applications such as networks demands proactive threats discovery, intelligent mit-
multimedia streaming will remain, literature envisions new igation techniques, and self-sustaining networks in 6G. Hence,
application domains for 6G systems such as multisensory the end-to-end security design leveraging AI techniques is
extended reality (XR) applications, Connected Robotics and essential to autonomously identify and respond to potential
Autonomous Systems (CRAS), and wireless Brain-Computer threats based on network anomalies rather than cryptographic
Interactions (BCI) [1]. Holographic telepresence, eHealth in- methods. This paper discusses the role of AI in the security
cluding in-body networks are a few other 6G use cases [2] provision of 6G networks.
that demand extremely high data rates, ultra-low latency and The remainder of the paper is organized as follows: Section
ultra-reliability. II outlines the security threat landscape in 6G. Section III
The evolution of 6G application domains calls for an discusses the role of AI in 6G security and privacy. Section IV
innovative network architecture beyond current network de- highlights the issues and possible solutions. Finally, Section V
signs [3]. An open and distributed reference framework for concludes the paper.
6G architectural building blocks defined by Nokia Bell Labs
comprises four major interworking components [4]. These are II. S ECURITY T HREAT L ANDSCAPE OF 6G
platform, functional, specialized, and orchestration, covering
the physical layer to the service layer with the following distin- This section presents the security issues of 6G networks.
guishing features. The “het-cloud” is a heterogeneous cloud Pre-6G security explains the security issues inherited from
environment that eases the creation, placement and scaling 5G to 6G. The section also discusses security issues resulting
of dynamic cloud services. 5G core network service-based from architectural changes and novel technologies used in 6G.
architecture will extend to the Radio Access Network (RAN), Figure 1 illustrates possible attacks on different layers of the
named “RAN-core convergence”. It will harmonize the RAN 6G architecture. Figure 2 depicts a summary of how this paper
and core functions to create simpler networks [4]. Even smaller presents the security threat landscape of 6G.
Intelligent
AI-enabled Functions Smart City Transportaion Smart Industry Smart Health
Application Layer
Smart
Control Layer
Task Policy
Scheduling Learning
Intelligent Edge
at Edge
Knowledge Feature
Discovery Extraction
Sensing Layer
Data Statue
Intelligent
Collection Detection
Environment
Measurement
Monitoring
Fig. 3: AI’s role as an Enabler, Defender, Offender and a Target in 6G Intelligent Transportation.
Algorithm Poisoning
Differential Privacy
Blockchain with AI
Intrusion Detection
Machine Learning
for Authentication
and Authorization
Dataset Poisoning
Model Extraction
Privacy using AI
Model Poisoning
Model Inversion
Service oriented
Adversarial ML
Anomaly based
Model Evasion
Homomorphic
Quantum ML
Potential 6G Applications
Multisensory Extended Reality (XR) H M M H M M L M H M H H M M
Connected Robotics and Autonomous Systems (CRAS) H H H H H M M H H H H H H M
Wireless Brain-Computer Interactions (BCI) M M L L M H H L H M H H H H
Smart Grid 2.0 H M H L M L L H H H H H H M
Industry 5.0 H H M M H M M M H M H H H M