AI for beyond 5G networks : a cyber-security defense or offense enabler?
|Author:||Benzäıd, Chafika1; Taleb, Tarik1,2,3|
1Aalto University, Espoo, Finland
2University of Oulu, Oulu, Finland
3Sejong University, Seoul, South Korea
|Online Access:||PDF Full Text (PDF, 0.9 MB)|
|Persistent link:|| http://urn.fi/urn:nbn:fi-fe202102255948
Institute of Electrical and Electronics Engineers,
|Publish Date:|| 2021-02-25
Artificial intelligence (AI) is envisioned to play a pivotal role in empowering intelligent, adaptive and autonomous security management in 5G and beyond networks, thanks to its potential to uncover hidden patterns from a large set of time-varying multi-dimensional data, and deliver faster and accurate decisions. Unfortunately, AI’s capabilities and vulnerabilities make it a double-edged sword that may jeopardize the security of future networks. This article sheds light on how AI may impact the security of 5G and its successor from its posture of defender, offender or victim, and recommends potential defenses to safeguard from malevolent AI while pointing out their limitations and adoption challenges.
|Pages:||140 - 147|
|Type of Publication:||
A1 Journal article – refereed
|Field of Science:||
213 Electronic, automation and communications engineering, electronics
This work was supported in part by the European Union’s Horizon 2020 research and innovation programme under the INSPIRE-5Gplus project (Grant No. 871808) and MonB5G project (Grant No. 871780); the Academy of Finland Project 6Genesis Flagship (Grant No. 318927); and CSN (Grant No. 311654).
|EU Grant Number:||
(871808) INSPIRE-5Gplus - INtelligent Security and PervasIve tRust for 5G and Beyond
|Academy of Finland Grant Number:||
318927 (Academy of Finland Funding decision)
© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.