2021
DOI: 10.48550/arxiv.2106.02494
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Network and Physical Layer Attacks and countermeasures to AI-Enabled 6G O-RAN

Abstract: Artificial intelligence (AI) will play an increasing role in cellular network deployment, configuration and management. This paper examines the security implications of AI-driven 6G radio access networks (RANs). While the expected timeline for 6G standardization is still several years out, pre-standardization efforts related to 6G security are already ongoing and will benefit from fundamental and experimental research. The Open RAN (O-RAN) describes an industry-driven open architecture and interfaces for build… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Incorporating AI/ML in O-RAN architecture, known as the intelligence pillar, also adds a new surface threat targeting AI/ML-related functions in O-RAN. Other works have also discussed the new security challenges of using AI/ML in mobile networks [105,106]. Another additional threat surface comes from using open-source code.…”
Section: Open Ran Field Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…Incorporating AI/ML in O-RAN architecture, known as the intelligence pillar, also adds a new surface threat targeting AI/ML-related functions in O-RAN. Other works have also discussed the new security challenges of using AI/ML in mobile networks [105,106]. Another additional threat surface comes from using open-source code.…”
Section: Open Ran Field Issuesmentioning
confidence: 99%
“…Hopefully, the O-RAN Alliance can develop a secure architecture, framework, and guidelines for its Open RAN standards. Other references have also discussed some defense mechanisms to increase software security in addition to these requirements and protocols, such as authentication and access control, cryptography, secure virtualization, anonymity and obfuscation, resilience assurance, lightweight security based on the physical layer, and intrusion detection mechanisms [103,106,110,111]. SFG has also made modeling and analysis of security threats in the O-RAN architecture in [104].…”
Section: Open Ran Field Issuesmentioning
confidence: 99%