Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task

被引:17
|
作者
Qiu, Jing [1 ]
Du, Lei [2 ]
Chen, Yuanyuan [3 ]
Tian, Zhihong [4 ,5 ]
Du, Xiaojiang [6 ]
Guizani, Mohsen [7 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
[2] Hebei Univ Sci & Technol, Shijiazhuang, Hebei, Peoples R China
[3] Guangzhou Univ, Guangzhou, Peoples R China
[4] Guangzhou Univ, Cyber Space Inst Adv Technol, Guangzhou, Peoples R China
[5] Carleton Univ, Ottawa, ON, Canada
[6] Temple Univ, Dept Comp & Informat Sci, Secur & Networking Lab, Philadelphia, PA 19122 USA
[7] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
来源
IEEE VEHICULAR TECHNOLOGY MAGAZINE | 2020年 / 15卷 / 03期
基金
中国国家自然科学基金;
关键词
Deep learning; Task analysis; Perturbation methods; 5G mobile communication; Trajectory; Data models; Spatiotemporal phenomena;
D O I
10.1109/MVT.2020.3002487
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of the Internet, the nextgeneration network (5G) has emerged. 5G can support a variety of new applications, such as the Internet of Things (IoT), virtual reality (VR), and the Internet of Vehicles. Most of these new applications depend on deep learning algorithms, which have made great advances in many areas of artificial intelligence (AI). However, researchers have found that AI algorithms based on deep learning pose numerous security problems. For example, deep learning is susceptible to a well-designed input sample formed by adding small perturbations to the original sample. This well-designed input with small perturbations, which are imperceptible to humans, is called an adversarial example. An adversarial example is similar to a truth example, but it can render the deep learning model invalid. In this article, we generate adversarial examples for spatiotemporal data. Based on the travel time estimation (TTE) task, we use two methods-white-box and blackbox attacks-to invalidate deep learning models. Experiment results show that the adversarial examples successfully attack the deep learning model and thus that AI security is a big challenge of 5G.
引用
收藏
页码:95 / 100
页数:6
相关论文
共 50 条
  • [21] A Systematic Analysis of 5G Networks With a Focus on 5G Core Security
    Tang, Qiang
    Ermis, Orhan
    Nguyen, Cu D.
    De Oliveira, Alexandre
    Hirtzig, Alain
    IEEE ACCESS, 2022, 10 : 18298 - 18319
  • [22] Security for 5G Mobile Wireless Networks
    Fang, Dongfeng
    Qian, Yi
    Hu, Rose Qingyang
    IEEE ACCESS, 2018, 6 : 4850 - 4874
  • [23] Use of 5G networks in security technologies
    Dostalova, Petra
    Hromada, Martin
    PRZEGLAD ELEKTROTECHNICZNY, 2023, 99 (08): : 87 - 91
  • [24] Security Trust Zone in 5G Networks
    Han, Bin
    Wong, Stan
    Mannweiler, Christian
    Dohler, Mischa
    Schotten, Hans D.
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT 2017), 2017,
  • [25] Security and Privacy Aspects in 5G Networks
    Panwar, Nisha
    Sharma, Shantanu
    2020 IEEE 19TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2020,
  • [26] Artificial Intelligence-Based Discontinuous Reception for Energy Saving in 5G Networks
    Memon, Mudasar Latif
    Maheshwari, Mukesh Kumar
    Saxena, Navrati
    Roy, Abhishek
    Shin, Dong Ryeol
    ELECTRONICS, 2019, 8 (07)
  • [27] Generative adversarial networks enhanced location privacy in 5G networks
    Youyang QU
    Jingwen ZHANG
    Ruidong LI
    Xiaoning ZHANG
    Xuemeng ZHAI
    Shui YU
    Science China(Information Sciences), 2020, 63 (12) : 41 - 52
  • [28] Generative adversarial networks enhanced location privacy in 5G networks
    Qu, Youyang
    Zhang, Jingwen
    Li, Ruidong
    Zhang, Xiaoning
    Zhai, Xuemeng
    Yu, Shui
    SCIENCE CHINA-INFORMATION SCIENCES, 2020, 63 (12)
  • [29] Generative adversarial networks enhanced location privacy in 5G networks
    Youyang Qu
    Jingwen Zhang
    Ruidong Li
    Xiaoning Zhang
    Xuemeng Zhai
    Shui Yu
    Science China Information Sciences, 2020, 63
  • [30] Artificial intelligence control for trust-based detection of attackers in 5G social networks
    Kaur, Davinder
    Uslu, Suleyman
    Durresi, Mimoza
    Durresi, Arjan
    COMPUTATIONAL INTELLIGENCE, 2024, 40 (01)