2023
DOI: 10.1109/ojvt.2022.3229229
|View full text |Cite
|
Sign up to set email alerts
|

How to Attack and Defend NextG Radio Access Network Slicing With Reinforcement Learning

Abstract: In this paper, reinforcement learning (RL) for network slicing is considered in next generation (NextG) radio access networks, where the base station (gNodeB) allocates resource blocks (RBs) to the requests of user equipments and aims to maximize the total reward of accepted requests over time. Based on adversarial machine learning, a novel over-the-air attack is introduced to manipulate the RL algorithm and disrupt NextG network slicing. The adversary observes the spectrum and builds its own RL based surrogat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 59 publications
0
7
0
Order By: Relevance
“…Similar to this, in Ref. [3], the C-RAN architecture is discussed. More precisely, a thorough analysis of how resources is allocated in such an RAN architecture.…”
Section: Related Workmentioning
confidence: 67%
“…Similar to this, in Ref. [3], the C-RAN architecture is discussed. More precisely, a thorough analysis of how resources is allocated in such an RAN architecture.…”
Section: Related Workmentioning
confidence: 67%
“…Attackers can deliberately design input data to manipulate the model output and produce inaccurate decisions, posing a significant risk to the integrity of AI models. In the context of RRM, a novel RL-based network slicing framework is proposed to enable the base station to allocate resource blocks (RBs) based on the user's request [11]. However, the victim RL algorithm is shown to be vulnerable to adversarial attacks, where an attacker can observe the spectrum RBs and build a surrogate model to maximize the number of failed requests, thus compromising the algorithm's reward.…”
Section: Sensitivity Analysismentioning
confidence: 99%
“…Jamming attacks disrupt the wireless signals of terminals, making it impossible to recover accurate information [3]. Smart jammers, which have emerged in recent years, can launch even more threatening attacks by learning terminal communication strategies [4]. Many studies on anti-jamming resource allocation methods have achieved certain results and have shown good performance in dealing with conventional jamming attacks.…”
Section: Introductionmentioning
confidence: 99%