2021 Joint European Conference on Networks and Communications &Amp; 6G Summit (EuCNC/6G Summit) 2021
DOI: 10.1109/eucnc/6gsummit51104.2021.9482503
|View full text |Cite
|
Sign up to set email alerts
|

AI and 6G Security: Opportunities and Challenges

Abstract: While 5G is well-known for network cloudification with micro-service based architecture, the next generation networks or the 6G era is closely coupled with intelligent network orchestration and management. Hence, the role of Artificial Intelligence (AI) is immense in the envisioned 6G paradigm. However, the alliance between 6G and AI may also be a doubleedged sword in many cases as AI's applicability for protecting or infringing security and privacy. In particular, the end-toend automation of future networks d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
44
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 144 publications
(76 citation statements)
references
References 31 publications
0
44
0
Order By: Relevance
“…The progress in cybersecurity research and innovative countermeasures will limit their occurrence probability. However, in case of success, their impact and the damage they will cause will be devastating, and orders of magnitude larger than their current level of damage (Siriwardhana et al, 2021).…”
Section: Malware and Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The progress in cybersecurity research and innovative countermeasures will limit their occurrence probability. However, in case of success, their impact and the damage they will cause will be devastating, and orders of magnitude larger than their current level of damage (Siriwardhana et al, 2021).…”
Section: Malware and Attacksmentioning
confidence: 99%
“…In fact, although AI techniques can be used to detect and mitigate security vulnerabilities and intrusions, advances in AI can also be used for perfecting the attacks targeting the systems described above. Thus, it can be a double-edged sword used for both attack and defense (Siriwardhana et al, 2021;Buchholz et al, 2022).…”
Section: Risksmentioning
confidence: 99%
“…The authors of [22] investigate the role of AI in IoT security for possible cyber attacks, emphasizing the model poisoning attack, i.e., where a machine learning model's training data are poisoned. The study [32] provides a comprehensive review of the opportunities and challenges in AI-based security and private provision as well as proposes solutions for 6G and beyond networks.…”
Section: Purpose and Contributionsmentioning
confidence: 99%
“…Their advantages are higher accuracy and diversity. Primarily, advanced ML algorithms and DL models can deal with different cybersecurity problems [81]: poisonous attacks by tampering training data with malicious samples, evasion attacks by injecting disorders and outliers to testing data to circumvent the learned model, API-based attacks to pilfer prediction outcomes, infrastructure physical attacks and communication tampering by interfering communication-computing connections and shutting AI systems down [84]. However, most existing ML-powered security mechanisms are unable to explain their final decisions and response actions.…”
Section: B Trust and Securitymentioning
confidence: 99%