Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task

被引:17
|
作者
Qiu, Jing [1 ]
Du, Lei [2 ]
Chen, Yuanyuan [3 ]
Tian, Zhihong [4 ,5 ]
Du, Xiaojiang [6 ]
Guizani, Mohsen [7 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
[2] Hebei Univ Sci & Technol, Shijiazhuang, Hebei, Peoples R China
[3] Guangzhou Univ, Guangzhou, Peoples R China
[4] Guangzhou Univ, Cyber Space Inst Adv Technol, Guangzhou, Peoples R China
[5] Carleton Univ, Ottawa, ON, Canada
[6] Temple Univ, Dept Comp & Informat Sci, Secur & Networking Lab, Philadelphia, PA 19122 USA
[7] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
来源
IEEE VEHICULAR TECHNOLOGY MAGAZINE | 2020年 / 15卷 / 03期
基金
中国国家自然科学基金;
关键词
Deep learning; Task analysis; Perturbation methods; 5G mobile communication; Trajectory; Data models; Spatiotemporal phenomena;
D O I
10.1109/MVT.2020.3002487
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of the Internet, the nextgeneration network (5G) has emerged. 5G can support a variety of new applications, such as the Internet of Things (IoT), virtual reality (VR), and the Internet of Vehicles. Most of these new applications depend on deep learning algorithms, which have made great advances in many areas of artificial intelligence (AI). However, researchers have found that AI algorithms based on deep learning pose numerous security problems. For example, deep learning is susceptible to a well-designed input sample formed by adding small perturbations to the original sample. This well-designed input with small perturbations, which are imperceptible to humans, is called an adversarial example. An adversarial example is similar to a truth example, but it can render the deep learning model invalid. In this article, we generate adversarial examples for spatiotemporal data. Based on the travel time estimation (TTE) task, we use two methods-white-box and blackbox attacks-to invalidate deep learning models. Experiment results show that the adversarial examples successfully attack the deep learning model and thus that AI security is a big challenge of 5G.
引用
收藏
页码:95 / 100
页数:6
相关论文
共 50 条
  • [31] Experimental Results for Artificial Intelligence-based Self-Organized 5G Networks
    Jiang, Wei
    Strufe, Mathias
    Schotten, Hans D.
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [32] Distributed Artificial Intelligence Solution for D2D Communication in 5G Networks
    Ioannou, Iacovos
    Vassiliou, Vasos
    Christophorou, Christophoros
    Pitsillides, Andreas
    IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 4232 - 4241
  • [33] Security for Smart Grid in 5G and Beyond Networks
    Sarmistha De Dutta
    Ramjee Prasad
    Wireless Personal Communications, 2019, 106 : 261 - 273
  • [34] Security for Smart Grid in 5G and Beyond Networks
    De Dutta, Sarmistha
    Prasad, Ramjee
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (01) : 261 - 273
  • [35] 5G Security Threat Assessment in Real Networks
    Park, Seongmin
    Kim, Daeun
    Park, Youngkwon
    Cho, Hyungjin
    Kim, Dowon
    Kwon, Sungmoon
    SENSORS, 2021, 21 (16)
  • [36] A Survey: Security and Privacy in 5G Vehicular Networks
    Saglam, Ezgi Tetik
    Bahtiyar, Serif
    2019 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2019, : 108 - 112
  • [37] Special issue on Advancements in 5G Networks Security
    Mazurczyk, Wojciech
    Bisson, Pascal
    Jover, Roger Piqueras
    Nakao, Koji
    Cabaj, Krzysztof
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 110 : 314 - 316
  • [38] Monitoring 5G networks in Security Operation Center
    Kecskes, Miklos Vilmos
    Orsos, Miklos
    Kail, Eszter
    Banati, Anna
    21ST IEEE INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS (CINTI), 2021, : 229 - 233
  • [39] Security Measures in IOT based 5G Networks
    Dey, A.
    Nandi, S.
    Sarkar, M.
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, : 561 - 566
  • [40] An artificial intelligence diabetes management architecture based on 5G
    Ruochen Huang
    Wei Feng
    Shan Lu
    Tao shan
    Changwei Zhang
    Yun Liu
    Digital Communications and Networks, 2024, 10 (01) : 75 - 82