Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task

被引:17
|
作者
Qiu, Jing [1 ]
Du, Lei [2 ]
Chen, Yuanyuan [3 ]
Tian, Zhihong [4 ,5 ]
Du, Xiaojiang [6 ]
Guizani, Mohsen [7 ]
机构
[1] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Peoples R China
[2] Hebei Univ Sci & Technol, Shijiazhuang, Hebei, Peoples R China
[3] Guangzhou Univ, Guangzhou, Peoples R China
[4] Guangzhou Univ, Cyber Space Inst Adv Technol, Guangzhou, Peoples R China
[5] Carleton Univ, Ottawa, ON, Canada
[6] Temple Univ, Dept Comp & Informat Sci, Secur & Networking Lab, Philadelphia, PA 19122 USA
[7] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
来源
IEEE VEHICULAR TECHNOLOGY MAGAZINE | 2020年 / 15卷 / 03期
基金
中国国家自然科学基金;
关键词
Deep learning; Task analysis; Perturbation methods; 5G mobile communication; Trajectory; Data models; Spatiotemporal phenomena;
D O I
10.1109/MVT.2020.3002487
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the rapid development of the Internet, the nextgeneration network (5G) has emerged. 5G can support a variety of new applications, such as the Internet of Things (IoT), virtual reality (VR), and the Internet of Vehicles. Most of these new applications depend on deep learning algorithms, which have made great advances in many areas of artificial intelligence (AI). However, researchers have found that AI algorithms based on deep learning pose numerous security problems. For example, deep learning is susceptible to a well-designed input sample formed by adding small perturbations to the original sample. This well-designed input with small perturbations, which are imperceptible to humans, is called an adversarial example. An adversarial example is similar to a truth example, but it can render the deep learning model invalid. In this article, we generate adversarial examples for spatiotemporal data. Based on the travel time estimation (TTE) task, we use two methods-white-box and blackbox attacks-to invalidate deep learning models. Experiment results show that the adversarial examples successfully attack the deep learning model and thus that AI security is a big challenge of 5G.
引用
下载
收藏
页码:95 / 100
页数:6
相关论文
共 50 条
  • [41] 5G Core Network Framework Based on Artificial Intelligence
    Zhou, Shiyu
    Liu, Xiqing
    Fu, Dengsheng
    Cheng, Xinzhou
    Fu, Bin
    Zhao, Zhenqiao
    2020 IEEE INTL SYMP ON PARALLEL & DISTRIBUTED PROCESSING WITH APPLICATIONS, INTL CONF ON BIG DATA & CLOUD COMPUTING, INTL SYMP SOCIAL COMPUTING & NETWORKING, INTL CONF ON SUSTAINABLE COMPUTING & COMMUNICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2020), 2020, : 1460 - 1464
  • [42] Towards Security and Privacy Preservation in 5G Networks
    Nyangaresi, Vincent Omollo
    Abduljabbar, Zaid Ameen
    Al Sibahee, Mustafa A.
    Abduljaleel, Iman Qays
    Abood, Enas Wahab
    2021 29TH TELECOMMUNICATIONS FORUM (TELFOR), 2021,
  • [43] An artificial intelligence diabetes management architecture based on 5G
    Huang, Ruochen
    Feng, Wei
    Lu, Shan
    Shan, Tao
    Zhang, Changwei
    Liu, Yun
    DIGITAL COMMUNICATIONS AND NETWORKS, 2024, 10 (01) : 75 - 82
  • [44] Artificial Intelligence in Beyond 5G and 6G Reliable Communications
    Nauman A.
    Nguyen T.N.
    Qadri Y.A.
    Nain Z.
    Cengiz K.
    Kim S.W.
    IEEE Internet of Things Magazine, 2022, 5 (01): : 73 - 78
  • [45] Edge artificial intelligence-based affinity task offloading under resource adjustment in a 5G network
    Jin Wang
    Applied Intelligence, 2022, 52 : 8167 - 8188
  • [46] Edge artificial intelligence-based affinity task offloading under resource adjustment in a 5G network
    Jin, Wang
    APPLIED INTELLIGENCE, 2022, 52 (07) : 8167 - 8188
  • [47] Revolutionizing connectivity: Unleashing the power of 5G wireless networks enhanced by artificial intelligence for a smarter future
    Pandi, Samuthira, V
    Uthayakumar, G. S.
    Aishwarya, D.
    Karthikeyan, S.
    Kamatchi, S.
    Gopinath, N.
    RESULTS IN ENGINEERING, 2024, 22
  • [48] An architecture and performance evaluation framework for artificial intelligence solutions in beyond 5G radio access networks
    Georgios P. Koudouridis
    Qing He
    György Dán
    EURASIP Journal on Wireless Communications and Networking, 2022
  • [49] An architecture and performance evaluation framework for artificial intelligence solutions in beyond 5G radio access networks
    Koudouridis, Georgios P.
    He, Qing
    Dan, Gyorgy
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)
  • [50] Artificial intelligence linear regression model for mobility robustness optimization algorithm in 5G cellular networks*
    Saad, Sawsan Ali
    Shayea, Ibraheem
    Ahmed, Nada M. O. Sid
    ALEXANDRIA ENGINEERING JOURNAL, 2024, 89 (125-148) : 125 - 148